SUSE-CU-2024:3652-1: Security update of bci/bci-init

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Wed Aug 14 07:09:04 UTC 2024


SUSE Container Update Advisory: bci/bci-init
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2024:3652-1
Container Tags        : bci/bci-init:15.5 , bci/bci-init:15.5.25.8
Container Release     : 25.8
Severity              : moderate
Type                  : security
References            : 1159034 1194818 1222285 1226463 1227138 CVE-2024-5535 
-----------------------------------------------------------------

The container bci/bci-init was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:2887-1
Released:    Tue Aug 13 10:52:45 2024
Summary:     Recommended update for util-linux
Type:        recommended
Severity:    moderate
References:  1159034,1194818,1222285
This update for util-linux fixes the following issues:

- agetty: Prevent login cursor escape (bsc#1194818).
- Document unexpected side effects of lazy destruction (bsc#1159034).
- Don't delete binaries not common for all architectures. Create an
  util-linux-extra subpackage instead, so users of third party
  tools can use them (bsc#1222285).
- agetty: Prevent login cursor escape (bsc#1194818).
- Document unexpected side effects of lazy destruction (bsc#1159034).
- Don't delete binaries not common for all architectures. Create an
  util-linux-extra subpackage instead, so users of third party
  tools can use them (bsc#1222285).
- agetty: Prevent login cursor escape (bsc#1194818).
- Document unexpected side effects of lazy destruction (bsc#1159034).
- Don't delete binaries not common for all architectures. Create an
  util-linux-extra subpackage instead, so users of third party
  tools can use them (bsc#1222285).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:2891-1
Released:    Tue Aug 13 11:39:53 2024
Summary:     Security update for openssl-1_1
Type:        security
Severity:    moderate
References:  1226463,1227138,CVE-2024-5535
This update for openssl-1_1 fixes the following issues:

- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)

Other fixes:
- Build with no-afalgeng (bsc#1226463)


The following package changes have been done:

- libuuid1-2.37.4-150500.9.14.2 updated
- libsmartcols1-2.37.4-150500.9.14.2 updated
- libblkid1-2.37.4-150500.9.14.2 updated
- libfdisk1-2.37.4-150500.9.14.2 updated
- libopenssl1_1-1.1.1l-150500.17.34.1 updated
- libopenssl1_1-hmac-1.1.1l-150500.17.34.1 updated
- libmount1-2.37.4-150500.9.14.2 updated
- util-linux-2.37.4-150500.9.14.2 updated
- container:sles15-image-15.0.0-36.14.13 updated


More information about the sle-container-updates mailing list