From sle-container-updates at lists.suse.com Wed Jan 3 08:06:33 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 3 Jan 2024 09:06:33 +0100 (CET) Subject: SUSE-CU-2024:7-1: Recommended update of suse/sle15 Message-ID: <20240103080633.3B9ADFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:7-1 Container Tags : suse/sle15:15.1 , suse/sle15:15.1.6.2.859 Container Release : 6.2.859 Severity : moderate Type : recommended References : 1029961 1158830 1206798 1209122 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-container-updates at lists.suse.com Wed Jan 3 08:07:48 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 3 Jan 2024 09:07:48 +0100 (CET) Subject: SUSE-CU-2024:8-1: Recommended update of suse/sle15 Message-ID: <20240103080748.85050FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:8-1 Container Tags : suse/sle15:15.2 , suse/sle15:15.2.9.5.388 Container Release : 9.5.388 Severity : moderate Type : recommended References : 1029961 1158830 1206798 1209122 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-container-updates at lists.suse.com Wed Jan 3 08:08:52 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 3 Jan 2024 09:08:52 +0100 (CET) Subject: SUSE-CU-2024:9-1: Recommended update of suse/sle15 Message-ID: <20240103080852.D8E4AFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:9-1 Container Tags : bci/bci-base:15.3 , bci/bci-base:15.3.17.20.232 , suse/sle15:15.3 , suse/sle15:15.3.17.20.232 Container Release : 17.20.232 Severity : moderate Type : recommended References : 1029961 1158830 1206798 1209122 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-container-updates at lists.suse.com Thu Jan 4 08:05:16 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 4 Jan 2024 09:05:16 +0100 (CET) Subject: SUSE-CU-2024:32-1: Recommended update of suse/sle-micro/5.1/toolbox Message-ID: <20240104080516.143A3FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.1/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:32-1 Container Tags : suse/sle-micro/5.1/toolbox:12.1 , suse/sle-micro/5.1/toolbox:12.1-2.2.521 , suse/sle-micro/5.1/toolbox:latest Container Release : 2.2.521 Severity : moderate Type : recommended References : 1029961 1158830 1206798 1209122 ----------------------------------------------------------------- The container suse/sle-micro/5.1/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - container:sles15-image-15.0.0-17.20.232 updated From sle-container-updates at lists.suse.com Thu Jan 4 08:05:45 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 4 Jan 2024 09:05:45 +0100 (CET) Subject: SUSE-CU-2024:33-1: Recommended update of suse/sle-micro/5.2/toolbox Message-ID: <20240104080545.44C7FFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.2/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:33-1 Container Tags : suse/sle-micro/5.2/toolbox:12.1 , suse/sle-micro/5.2/toolbox:12.1-6.2.343 , suse/sle-micro/5.2/toolbox:latest Container Release : 6.2.343 Severity : moderate Type : recommended References : 1029961 1158830 1206798 1209122 ----------------------------------------------------------------- The container suse/sle-micro/5.2/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - container:sles15-image-15.0.0-17.20.232 updated From sle-container-updates at lists.suse.com Fri Jan 5 08:03:54 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:03:54 +0100 (CET) Subject: SUSE-CU-2024:36-1: Recommended update of suse/sle-micro/5.5/toolbox Message-ID: <20240105080354.A5D23FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.5/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:36-1 Container Tags : suse/sle-micro/5.5/toolbox:12.1 , suse/sle-micro/5.5/toolbox:12.1-2.2.127 , suse/sle-micro/5.5/toolbox:latest Container Release : 2.2.127 Severity : moderate Type : recommended References : 1029961 1158830 1206798 1209122 ----------------------------------------------------------------- The container suse/sle-micro/5.5/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - container:sles15-image-15.0.0-36.5.69 updated From sle-container-updates at lists.suse.com Fri Jan 5 08:04:25 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:04:25 +0100 (CET) Subject: SUSE-CU-2024:37-1: Recommended update of suse/ltss/sle15.4/sle15 Message-ID: <20240105080425.0A302FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.4/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:37-1 Container Tags : suse/ltss/sle15.4/bci-base:15.4 , suse/ltss/sle15.4/bci-base:15.4.2.4 , suse/ltss/sle15.4/sle15:15.4 , suse/ltss/sle15.4/sle15:15.4.2.4 Container Release : 2.4 Severity : important Type : recommended References : 1029961 1158830 1206798 1209122 1216987 ----------------------------------------------------------------- The container suse/ltss/sle15.4/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4962-1 Released: Fri Dec 22 13:45:06 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) This update also ships curl to the INSTALLER channel. ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - curl-8.0.1-150400.5.41.1 updated - libcurl4-8.0.1-150400.5.41.1 updated - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-container-updates at lists.suse.com Fri Jan 5 08:04:49 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:04:49 +0100 (CET) Subject: SUSE-CU-2024:39-1: Recommended update of suse/389-ds Message-ID: <20240105080449.AA627FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/389-ds ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:39-1 Container Tags : suse/389-ds:2.2 , suse/389-ds:2.2-17.2 , suse/389-ds:latest Container Release : 17.2 Severity : moderate Type : recommended References : 1214980 ----------------------------------------------------------------- The container suse/389-ds was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:26-1 Released: Thu Jan 4 11:15:24 2024 Summary: Recommended update for mozilla-nss Type: recommended Severity: moderate References: 1214980 This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1 * regenerate NameConstraints test certificates. * add OSXSAVE and XCR0 tests to AVX2 detection. The following package changes have been done: - libfreebl3-3.90.1-150400.3.35.2 updated - mozilla-nss-certs-3.90.1-150400.3.35.2 updated - mozilla-nss-3.90.1-150400.3.35.2 updated - libsoftokn3-3.90.1-150400.3.35.2 updated - mozilla-nss-tools-3.90.1-150400.3.35.2 updated From sle-container-updates at lists.suse.com Fri Jan 5 08:07:59 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:07:59 +0100 (CET) Subject: SUSE-CU-2024:50-1: Recommended update of bci/nodejs Message-ID: <20240105080759.E94C5FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:50-1 Container Tags : bci/node:18 , bci/node:18-13.1 , bci/nodejs:18 , bci/nodejs:18-13.1 Container Release : 13.1 Severity : important Type : recommended References : 1216987 1217354 1217479 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4962-1 Released: Fri Dec 22 13:45:06 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) This update also ships curl to the INSTALLER channel. ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4970-1 Released: Mon Dec 25 09:48:21 2023 Summary: Recommended update for icu73_2 Type: recommended Severity: moderate References: 1217354,1217479 This update for icu73_2 fixes the following issue: - ships 32bit icu library on SLES 15 SP3 to complement the ICU 69 32bit libraries. The following package changes have been done: - libcurl4-8.0.1-150400.5.41.1 updated - libicu73_2-ledata-73.2-150000.1.7.1 updated - libicu73_2-73.2-150000.1.7.1 updated - container:sles15-image-15.0.0-36.5.69 updated From sle-container-updates at lists.suse.com Fri Jan 5 08:08:24 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:08:24 +0100 (CET) Subject: SUSE-CU-2024:53-1: Recommended update of bci/openjdk-devel Message-ID: <20240105080824.2CED2FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:53-1 Container Tags : bci/openjdk-devel:11 , bci/openjdk-devel:11-11.5 Container Release : 11.5 Severity : moderate Type : recommended References : 1214980 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:26-1 Released: Thu Jan 4 11:15:24 2024 Summary: Recommended update for mozilla-nss Type: recommended Severity: moderate References: 1214980 This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1 * regenerate NameConstraints test certificates. * add OSXSAVE and XCR0 tests to AVX2 detection. The following package changes have been done: - libfreebl3-3.90.1-150400.3.35.2 updated - mozilla-nss-certs-3.90.1-150400.3.35.2 updated - mozilla-nss-3.90.1-150400.3.35.2 updated - libsoftokn3-3.90.1-150400.3.35.2 updated - container:bci-openjdk-11-15.5.11-12.2 updated From sle-container-updates at lists.suse.com Fri Jan 5 08:08:40 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:08:40 +0100 (CET) Subject: SUSE-CU-2024:54-1: Recommended update of bci/openjdk Message-ID: <20240105080840.EC2BCFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:54-1 Container Tags : bci/openjdk:11 , bci/openjdk:11-12.2 Container Release : 12.2 Severity : moderate Type : recommended References : 1214980 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:26-1 Released: Thu Jan 4 11:15:24 2024 Summary: Recommended update for mozilla-nss Type: recommended Severity: moderate References: 1214980 This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1 * regenerate NameConstraints test certificates. * add OSXSAVE and XCR0 tests to AVX2 detection. The following package changes have been done: - libfreebl3-3.90.1-150400.3.35.2 updated - mozilla-nss-certs-3.90.1-150400.3.35.2 updated - mozilla-nss-3.90.1-150400.3.35.2 updated - libsoftokn3-3.90.1-150400.3.35.2 updated From sle-container-updates at lists.suse.com Fri Jan 5 08:09:01 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:09:01 +0100 (CET) Subject: SUSE-CU-2024:56-1: Recommended update of bci/openjdk-devel Message-ID: <20240105080901.14929FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:56-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-13.5 , bci/openjdk-devel:latest Container Release : 13.5 Severity : moderate Type : recommended References : 1214980 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:26-1 Released: Thu Jan 4 11:15:24 2024 Summary: Recommended update for mozilla-nss Type: recommended Severity: moderate References: 1214980 This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1 * regenerate NameConstraints test certificates. * add OSXSAVE and XCR0 tests to AVX2 detection. The following package changes have been done: - libfreebl3-3.90.1-150400.3.35.2 updated - mozilla-nss-certs-3.90.1-150400.3.35.2 updated - mozilla-nss-3.90.1-150400.3.35.2 updated - libsoftokn3-3.90.1-150400.3.35.2 updated - container:bci-openjdk-17-15.5.17-13.2 updated From sle-container-updates at lists.suse.com Fri Jan 5 08:09:18 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:09:18 +0100 (CET) Subject: SUSE-CU-2024:57-1: Recommended update of bci/openjdk Message-ID: <20240105080918.AEF67FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:57-1 Container Tags : bci/openjdk:17 , bci/openjdk:17-13.2 , bci/openjdk:latest Container Release : 13.2 Severity : moderate Type : recommended References : 1214980 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:26-1 Released: Thu Jan 4 11:15:24 2024 Summary: Recommended update for mozilla-nss Type: recommended Severity: moderate References: 1214980 This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1 * regenerate NameConstraints test certificates. * add OSXSAVE and XCR0 tests to AVX2 detection. The following package changes have been done: - libfreebl3-3.90.1-150400.3.35.2 updated - mozilla-nss-certs-3.90.1-150400.3.35.2 updated - mozilla-nss-3.90.1-150400.3.35.2 updated - libsoftokn3-3.90.1-150400.3.35.2 updated From sle-container-updates at lists.suse.com Fri Jan 5 08:09:39 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:09:39 +0100 (CET) Subject: SUSE-CU-2024:59-1: Recommended update of suse/pcp Message-ID: <20240105080939.BAA9EFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/pcp ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:59-1 Container Tags : suse/pcp:5 , suse/pcp:5-19.4 , suse/pcp:5.2 , suse/pcp:5.2-19.4 , suse/pcp:5.2.5 , suse/pcp:5.2.5-19.4 , suse/pcp:latest Container Release : 19.4 Severity : moderate Type : recommended References : 1214980 ----------------------------------------------------------------- The container suse/pcp was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:26-1 Released: Thu Jan 4 11:15:24 2024 Summary: Recommended update for mozilla-nss Type: recommended Severity: moderate References: 1214980 This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1 * regenerate NameConstraints test certificates. * add OSXSAVE and XCR0 tests to AVX2 detection. The following package changes have been done: - libfreebl3-3.90.1-150400.3.35.2 updated - mozilla-nss-certs-3.90.1-150400.3.35.2 updated - mozilla-nss-3.90.1-150400.3.35.2 updated - libsoftokn3-3.90.1-150400.3.35.2 updated From sle-container-updates at lists.suse.com Fri Jan 5 08:10:35 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:10:35 +0100 (CET) Subject: SUSE-CU-2024:64-1: Recommended update of suse/sle15 Message-ID: <20240105081035.35D63FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:64-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.69 , suse/sle15:15.5 , suse/sle15:15.5.36.5.69 Container Release : 36.5.69 Severity : moderate Type : recommended References : 1029961 1158830 1206798 1209122 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-container-updates at lists.suse.com Sat Jan 6 08:03:11 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 6 Jan 2024 09:03:11 +0100 (CET) Subject: SUSE-CU-2024:65-1: Recommended update of suse/sle15 Message-ID: <20240106080311.197F2FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:65-1 Container Tags : suse/sle15:15.1 , suse/sle15:15.1.6.2.860 Container Release : 6.2.860 Severity : moderate Type : recommended References : 1212160 1215294 1216412 1217593 1217873 1218291 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:42-1 Released: Fri Jan 5 14:47:55 2024 Summary: Recommended update for libzypp, zypper Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libzypp, zypper fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - tools/DownloadFiles: use standard zypp progress bar - Fix ProgressBar's calculation of the printed tag position - Fix usage of deprecated CURL features - Stop using boost version 1 timer library (bsc#1215294) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - Make sure reboot-needed is remembered until next boot (bsc#1217873) The following package changes have been done: - libzypp-17.31.27-150100.3.125.1 updated - zypper-1.14.68-150100.3.93.2 updated From sle-container-updates at lists.suse.com Tue Jan 9 08:03:48 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Tue, 9 Jan 2024 09:03:48 +0100 (CET) Subject: SUSE-CU-2024:75-1: Recommended update of suse/rmt-server Message-ID: <20240109080348.652D6FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-server ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:75-1 Container Tags : suse/rmt-server:2.14 , suse/rmt-server:2.14-12.3 , suse/rmt-server:latest Container Release : 12.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/rmt-server was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:03:19 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:03:19 +0100 (CET) Subject: SUSE-CU-2024:78-1: Security update of suse/sle-micro/5.3/toolbox Message-ID: <20240110080319.AD80AFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.3/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:78-1 Container Tags : suse/sle-micro/5.3/toolbox:12.1 , suse/sle-micro/5.3/toolbox:12.1-5.2.288 , suse/sle-micro/5.3/toolbox:latest Container Release : 5.2.288 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.3/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:04:35 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:04:35 +0100 (CET) Subject: SUSE-CU-2024:80-1: Security update of suse/sle-micro/5.4/toolbox Message-ID: <20240110080435.38314FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.4/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:80-1 Container Tags : suse/sle-micro/5.4/toolbox:12.1 , suse/sle-micro/5.4/toolbox:12.1-4.2.186 , suse/sle-micro/5.4/toolbox:latest Container Release : 4.2.186 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.4/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:04:51 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:04:51 +0100 (CET) Subject: SUSE-CU-2024:81-1: Recommended update of suse/sle-micro/5.5/toolbox Message-ID: <20240110080451.B2852FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.5/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:81-1 Container Tags : suse/sle-micro/5.5/toolbox:12.1 , suse/sle-micro/5.5/toolbox:12.1-2.2.132 , suse/sle-micro/5.5/toolbox:latest Container Release : 2.2.132 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/sle-micro/5.5/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:05:31 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:05:31 +0100 (CET) Subject: SUSE-CU-2024:82-1: Recommended update of suse/ltss/sle15.4/sle15 Message-ID: <20240110080531.1A9FDFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.4/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:82-1 Container Tags : suse/ltss/sle15.4/bci-base:15.4 , suse/ltss/sle15.4/bci-base:15.4.2.5 , suse/ltss/sle15.4/sle15:15.4 , suse/ltss/sle15.4/sle15:15.4.2.5 Container Release : 2.5 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/ltss/sle15.4/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:05:47 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:05:47 +0100 (CET) Subject: SUSE-CU-2024:83-1: Recommended update of suse/389-ds Message-ID: <20240110080547.E06C4FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/389-ds ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:83-1 Container Tags : suse/389-ds:2.2 , suse/389-ds:2.2-17.5 , suse/389-ds:latest Container Release : 17.5 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/389-ds was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:05:48 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:05:48 +0100 (CET) Subject: SUSE-CU-2024:84-1: Security update of suse/389-ds Message-ID: <20240110080548.8C274FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/389-ds ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:84-1 Container Tags : suse/389-ds:2.2 , suse/389-ds:2.2-17.7 , suse/389-ds:latest Container Release : 17.7 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/389-ds was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:06:05 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:06:05 +0100 (CET) Subject: SUSE-CU-2024:85-1: Recommended update of bci/dotnet-aspnet Message-ID: <20240110080605.B3A34FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:85-1 Container Tags : bci/dotnet-aspnet:6.0 , bci/dotnet-aspnet:6.0-18.32 , bci/dotnet-aspnet:6.0.25 , bci/dotnet-aspnet:6.0.25-18.32 Container Release : 18.32 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:06:06 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:06:06 +0100 (CET) Subject: SUSE-CU-2024:86-1: Security update of bci/dotnet-aspnet Message-ID: <20240110080606.50C84FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:86-1 Container Tags : bci/dotnet-aspnet:6.0 , bci/dotnet-aspnet:6.0-19.1 , bci/dotnet-aspnet:6.0.25 , bci/dotnet-aspnet:6.0.25-19.1 Container Release : 19.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:06:24 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:06:24 +0100 (CET) Subject: SUSE-CU-2024:88-1: Security update of bci/dotnet-aspnet Message-ID: <20240110080624.3E994FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:88-1 Container Tags : bci/dotnet-aspnet:7.0 , bci/dotnet-aspnet:7.0-19.1 , bci/dotnet-aspnet:7.0.14 , bci/dotnet-aspnet:7.0.14-19.1 , bci/dotnet-aspnet:latest Container Release : 19.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:06:23 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:06:23 +0100 (CET) Subject: SUSE-CU-2024:87-1: Recommended update of bci/dotnet-aspnet Message-ID: <20240110080623.B1391FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:87-1 Container Tags : bci/dotnet-aspnet:7.0 , bci/dotnet-aspnet:7.0-18.33 , bci/dotnet-aspnet:7.0.14 , bci/dotnet-aspnet:7.0.14-18.33 , bci/dotnet-aspnet:latest Container Release : 18.33 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:06:28 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:06:28 +0100 (CET) Subject: SUSE-CU-2024:89-1: Recommended update of bci/bci-busybox Message-ID: <20240110080628.36931FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-busybox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:89-1 Container Tags : bci/bci-busybox:15.5 , bci/bci-busybox:15.5.13.2 , bci/bci-busybox:latest Container Release : 13.2 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/bci-busybox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:06:38 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:06:38 +0100 (CET) Subject: SUSE-CU-2024:90-1: Recommended update of suse/registry Message-ID: <20240110080638.8312FFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/registry ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:90-1 Container Tags : suse/registry:2.8 , suse/registry:2.8-16.3 , suse/registry:latest Container Release : 16.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/registry was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:07:00 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:00 +0100 (CET) Subject: SUSE-CU-2024:91-1: Recommended update of bci/dotnet-sdk Message-ID: <20240110080700.1A63DFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:91-1 Container Tags : bci/dotnet-sdk:6.0 , bci/dotnet-sdk:6.0-17.33 , bci/dotnet-sdk:6.0.25 , bci/dotnet-sdk:6.0.25-17.33 Container Release : 17.33 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:07:00 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:00 +0100 (CET) Subject: SUSE-CU-2024:92-1: Security update of bci/dotnet-sdk Message-ID: <20240110080700.B0F61FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:92-1 Container Tags : bci/dotnet-sdk:6.0 , bci/dotnet-sdk:6.0-18.1 , bci/dotnet-sdk:6.0.25 , bci/dotnet-sdk:6.0.25-18.1 Container Release : 18.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:07:22 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:22 +0100 (CET) Subject: SUSE-CU-2024:93-1: Recommended update of bci/dotnet-sdk Message-ID: <20240110080722.92B47FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:93-1 Container Tags : bci/dotnet-sdk:7.0 , bci/dotnet-sdk:7.0-19.32 , bci/dotnet-sdk:7.0.14 , bci/dotnet-sdk:7.0.14-19.32 , bci/dotnet-sdk:latest Container Release : 19.32 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:07:23 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:23 +0100 (CET) Subject: SUSE-CU-2024:94-1: Security update of bci/dotnet-sdk Message-ID: <20240110080723.398B5FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:94-1 Container Tags : bci/dotnet-sdk:7.0 , bci/dotnet-sdk:7.0-20.1 , bci/dotnet-sdk:7.0.14 , bci/dotnet-sdk:7.0.14-20.1 , bci/dotnet-sdk:latest Container Release : 20.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:07:41 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:41 +0100 (CET) Subject: SUSE-CU-2024:96-1: Security update of bci/dotnet-runtime Message-ID: <20240110080741.B6FA6FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:96-1 Container Tags : bci/dotnet-runtime:6.0 , bci/dotnet-runtime:6.0-18.1 , bci/dotnet-runtime:6.0.25 , bci/dotnet-runtime:6.0.25-18.1 Container Release : 18.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:07:41 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:41 +0100 (CET) Subject: SUSE-CU-2024:95-1: Recommended update of bci/dotnet-runtime Message-ID: <20240110080741.1E387FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:95-1 Container Tags : bci/dotnet-runtime:6.0 , bci/dotnet-runtime:6.0-17.33 , bci/dotnet-runtime:6.0.25 , bci/dotnet-runtime:6.0.25-17.33 Container Release : 17.33 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:07:59 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:59 +0100 (CET) Subject: SUSE-CU-2024:97-1: Recommended update of bci/dotnet-runtime Message-ID: <20240110080759.DB530FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:97-1 Container Tags : bci/dotnet-runtime:7.0 , bci/dotnet-runtime:7.0-19.33 , bci/dotnet-runtime:7.0.14 , bci/dotnet-runtime:7.0.14-19.33 , bci/dotnet-runtime:latest Container Release : 19.33 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:08:00 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:08:00 +0100 (CET) Subject: SUSE-CU-2024:98-1: Security update of bci/dotnet-runtime Message-ID: <20240110080800.83AD5FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:98-1 Container Tags : bci/dotnet-runtime:7.0 , bci/dotnet-runtime:7.0-20.1 , bci/dotnet-runtime:7.0.14 , bci/dotnet-runtime:7.0.14-20.1 , bci/dotnet-runtime:latest Container Release : 20.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 08:08:12 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:08:12 +0100 (CET) Subject: SUSE-CU-2024:99-1: Recommended update of bci/golang Message-ID: <20240110080812.76ACEFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:99-1 Container Tags : bci/golang:1.20 , bci/golang:1.20-2.5.4 , bci/golang:oldstable , bci/golang:oldstable-2.5.4 Container Release : 5.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:39:44 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:39:44 +0100 (CET) Subject: SUSE-CU-2024:99-1: Recommended update of bci/golang Message-ID: <20240110133944.33A47FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:99-1 Container Tags : bci/golang:1.20 , bci/golang:1.20-2.5.4 , bci/golang:oldstable , bci/golang:oldstable-2.5.4 Container Release : 5.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:39:56 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:39:56 +0100 (CET) Subject: SUSE-CU-2024:100-1: Recommended update of bci/golang Message-ID: <20240110133956.0C9FBFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:100-1 Container Tags : bci/golang:1.20-openssl , bci/golang:1.20-openssl-9.4 , bci/golang:oldstable-openssl , bci/golang:oldstable-openssl-9.4 Container Release : 9.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:40:17 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:17 +0100 (CET) Subject: SUSE-CU-2024:101-1: Recommended update of bci/golang Message-ID: <20240110134017.E8B34FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:101-1 Container Tags : bci/golang:1.21 , bci/golang:1.21-1.5.4 , bci/golang:latest , bci/golang:stable , bci/golang:stable-1.5.4 Container Release : 5.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:40:18 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:18 +0100 (CET) Subject: SUSE-CU-2024:102-1: Security update of bci/golang Message-ID: <20240110134018.C740CFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:102-1 Container Tags : bci/golang:1.21 , bci/golang:1.21-1.5.6 , bci/golang:latest , bci/golang:stable , bci/golang:stable-1.5.6 Container Release : 5.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:40:29 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:29 +0100 (CET) Subject: SUSE-CU-2024:103-1: Recommended update of bci/golang Message-ID: <20240110134029.85013FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:103-1 Container Tags : bci/golang:1.21-openssl , bci/golang:1.21-openssl-9.4 , bci/golang:latest , bci/golang:stable-openssl , bci/golang:stable-openssl-9.4 Container Release : 9.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:40:30 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:30 +0100 (CET) Subject: SUSE-CU-2024:104-1: Security update of bci/golang Message-ID: <20240110134030.5D00AFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:104-1 Container Tags : bci/golang:1.21-openssl , bci/golang:1.21-openssl-9.6 , bci/golang:latest , bci/golang:stable-openssl , bci/golang:stable-openssl-9.6 Container Release : 9.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:40:51 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:51 +0100 (CET) Subject: SUSE-CU-2024:105-1: Recommended update of bci/bci-init Message-ID: <20240110134051.8C1FCFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-init ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:105-1 Container Tags : bci/bci-init:15.5 , bci/bci-init:15.5.11.4 , bci/bci-init:latest Container Release : 11.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/bci-init was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:40:52 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:52 +0100 (CET) Subject: SUSE-CU-2024:106-1: Security update of bci/bci-init Message-ID: <20240110134052.19D54FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-init ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:106-1 Container Tags : bci/bci-init:15.5 , bci/bci-init:15.5.11.6 , bci/bci-init:latest Container Release : 11.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/bci-init was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:41:00 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:00 +0100 (CET) Subject: SUSE-CU-2024:107-1: Recommended update of bci/bci-minimal Message-ID: <20240110134100.A9FBEFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-minimal ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:107-1 Container Tags : bci/bci-minimal:15.5 , bci/bci-minimal:15.5.14.3 , bci/bci-minimal:latest Container Release : 14.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/bci-minimal was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:41:16 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:16 +0100 (CET) Subject: SUSE-CU-2024:108-1: Recommended update of suse/nginx Message-ID: <20240110134116.00F2FFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/nginx ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:108-1 Container Tags : suse/nginx:1.21 , suse/nginx:1.21-6.4 , suse/nginx:latest Container Release : 6.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/nginx was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:41:16 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:16 +0100 (CET) Subject: SUSE-CU-2024:109-1: Security update of suse/nginx Message-ID: <20240110134116.D7964FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/nginx ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:109-1 Container Tags : suse/nginx:1.21 , suse/nginx:1.21-6.6 , suse/nginx:latest Container Release : 6.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/nginx was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:41:36 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:36 +0100 (CET) Subject: SUSE-CU-2024:110-1: Recommended update of bci/nodejs Message-ID: <20240110134136.DA324FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:110-1 Container Tags : bci/node:18 , bci/node:18-13.4 , bci/nodejs:18 , bci/nodejs:18-13.4 Container Release : 13.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:41:37 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:37 +0100 (CET) Subject: SUSE-CU-2024:111-1: Security update of bci/nodejs Message-ID: <20240110134137.BE1EEFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:111-1 Container Tags : bci/node:18 , bci/node:18-13.6 , bci/nodejs:18 , bci/nodejs:18-13.6 Container Release : 13.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:41:43 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:43 +0100 (CET) Subject: SUSE-CU-2024:112-1: Recommended update of bci/nodejs Message-ID: <20240110134143.6244DFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:112-1 Container Tags : bci/node:20 , bci/node:20-3.4 , bci/node:latest , bci/nodejs:20 , bci/nodejs:20-3.4 , bci/nodejs:latest Container Release : 3.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:41:44 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:44 +0100 (CET) Subject: SUSE-CU-2024:113-1: Security update of bci/nodejs Message-ID: <20240110134144.3B79BFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:113-1 Container Tags : bci/node:20 , bci/node:20-3.6 , bci/node:latest , bci/nodejs:20 , bci/nodejs:20-3.6 , bci/nodejs:latest Container Release : 3.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:42:11 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:42:11 +0100 (CET) Subject: SUSE-CU-2024:114-1: Recommended update of bci/openjdk-devel Message-ID: <20240110134211.03D1AFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:114-1 Container Tags : bci/openjdk-devel:11 , bci/openjdk-devel:11-11.11 Container Release : 11.11 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:bci-openjdk-11-15.5.11-12.5 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:42:11 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:42:11 +0100 (CET) Subject: SUSE-CU-2024:115-1: Security update of bci/openjdk-devel Message-ID: <20240110134211.CDC2DFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:115-1 Container Tags : bci/openjdk-devel:11 , bci/openjdk-devel:11-11.14 Container Release : 11.14 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:bci-openjdk-11-15.5.11-12.7 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:42:34 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:42:34 +0100 (CET) Subject: SUSE-CU-2024:116-1: Recommended update of bci/openjdk Message-ID: <20240110134234.1BF8CFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:116-1 Container Tags : bci/openjdk:11 , bci/openjdk:11-12.5 Container Release : 12.5 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:42:34 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:42:34 +0100 (CET) Subject: SUSE-CU-2024:117-1: Security update of bci/openjdk Message-ID: <20240110134234.F1BDFFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:117-1 Container Tags : bci/openjdk:11 , bci/openjdk:11-12.7 Container Release : 12.7 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:43:00 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:43:00 +0100 (CET) Subject: SUSE-CU-2024:118-1: Recommended update of bci/openjdk-devel Message-ID: <20240110134300.690FBFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:118-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-13.10 , bci/openjdk-devel:latest Container Release : 13.10 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:bci-openjdk-17-15.5.17-13.5 updated From sle-container-updates at lists.suse.com Wed Jan 10 13:43:01 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:43:01 +0100 (CET) Subject: SUSE-CU-2024:119-1: Security update of bci/openjdk-devel Message-ID: <20240110134301.52BACFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:119-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-13.14 , bci/openjdk-devel:latest Container Release : 13.14 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:bci-openjdk-17-15.5.17-13.7 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:03:35 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:03:35 +0100 (CET) Subject: SUSE-CU-2024:119-1: Security update of bci/openjdk-devel Message-ID: <20240110140335.5BECDFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:119-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-13.14 , bci/openjdk-devel:latest Container Release : 13.14 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:bci-openjdk-17-15.5.17-13.7 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:03:50 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:03:50 +0100 (CET) Subject: SUSE-CU-2024:120-1: Recommended update of bci/openjdk Message-ID: <20240110140350.A2CA0FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:120-1 Container Tags : bci/openjdk:17 , bci/openjdk:17-13.5 , bci/openjdk:latest Container Release : 13.5 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:03:51 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:03:51 +0100 (CET) Subject: SUSE-CU-2024:121-1: Security update of bci/openjdk Message-ID: <20240110140351.3372EFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:121-1 Container Tags : bci/openjdk:17 , bci/openjdk:17-13.7 , bci/openjdk:latest Container Release : 13.7 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:04:10 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:10 +0100 (CET) Subject: SUSE-CU-2024:122-1: Recommended update of suse/pcp Message-ID: <20240110140410.EA5DDFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/pcp ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:122-1 Container Tags : suse/pcp:5 , suse/pcp:5-19.9 , suse/pcp:5.2 , suse/pcp:5.2-19.9 , suse/pcp:5.2.5 , suse/pcp:5.2.5-19.9 , suse/pcp:latest Container Release : 19.9 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/pcp was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:bci-bci-init-15.5-15.5-11.4 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:04:11 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:11 +0100 (CET) Subject: SUSE-CU-2024:123-1: Security update of suse/pcp Message-ID: <20240110140411.8F7AEFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/pcp ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:123-1 Container Tags : suse/pcp:5 , suse/pcp:5-19.12 , suse/pcp:5.2 , suse/pcp:5.2-19.12 , suse/pcp:5.2.5 , suse/pcp:5.2.5-19.12 , suse/pcp:latest Container Release : 19.12 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/pcp was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:bci-bci-init-15.5-15.5-11.6 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:04:27 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:27 +0100 (CET) Subject: SUSE-CU-2024:124-1: Recommended update of bci/php-apache Message-ID: <20240110140427.8CFB6FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/php-apache ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:124-1 Container Tags : bci/php-apache:8 , bci/php-apache:8-9.4 Container Release : 9.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/php-apache was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:04:28 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:28 +0100 (CET) Subject: SUSE-CU-2024:125-1: Security update of bci/php-apache Message-ID: <20240110140428.39133FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/php-apache ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:125-1 Container Tags : bci/php-apache:8 , bci/php-apache:8-9.6 Container Release : 9.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/php-apache was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:04:43 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:43 +0100 (CET) Subject: SUSE-CU-2024:126-1: Recommended update of bci/php-fpm Message-ID: <20240110140443.EC817FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/php-fpm ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:126-1 Container Tags : bci/php-fpm:8 , bci/php-fpm:8-9.4 Container Release : 9.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/php-fpm was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:04:44 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:44 +0100 (CET) Subject: SUSE-CU-2024:127-1: Security update of bci/php-fpm Message-ID: <20240110140444.75216FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/php-fpm ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:127-1 Container Tags : bci/php-fpm:8 , bci/php-fpm:8-9.6 Container Release : 9.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/php-fpm was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:04:59 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:59 +0100 (CET) Subject: SUSE-CU-2024:128-1: Recommended update of bci/php Message-ID: <20240110140459.DC584FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/php ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:128-1 Container Tags : bci/php:8 , bci/php:8-9.4 Container Release : 9.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/php was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:05:00 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:00 +0100 (CET) Subject: SUSE-CU-2024:129-1: Security update of bci/php Message-ID: <20240110140500.82FF2FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/php ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:129-1 Container Tags : bci/php:8 , bci/php:8-9.6 Container Release : 9.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/php was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:05:17 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:17 +0100 (CET) Subject: SUSE-CU-2024:131-1: Security update of suse/postgres Message-ID: <20240110140517.4A26FFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:131-1 Container Tags : suse/postgres:15 , suse/postgres:15-14.5 , suse/postgres:15.5 , suse/postgres:15.5-14.5 Container Release : 14.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:05:21 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:21 +0100 (CET) Subject: SUSE-CU-2024:133-1: Security update of suse/postgres Message-ID: <20240110140521.05A1DFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:133-1 Container Tags : suse/postgres:16 , suse/postgres:16-3.5 , suse/postgres:16.1 , suse/postgres:16.1-3.5 , suse/postgres:latest Container Release : 3.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:05:16 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:16 +0100 (CET) Subject: SUSE-CU-2024:130-1: Recommended update of suse/postgres Message-ID: <20240110140516.A127AFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:130-1 Container Tags : suse/postgres:15 , suse/postgres:15-14.3 , suse/postgres:15.5 , suse/postgres:15.5-14.3 Container Release : 14.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:05:20 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:20 +0100 (CET) Subject: SUSE-CU-2024:132-1: Recommended update of suse/postgres Message-ID: <20240110140520.590EAFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:132-1 Container Tags : suse/postgres:16 , suse/postgres:16-3.3 , suse/postgres:16.1 , suse/postgres:16.1-3.3 , suse/postgres:latest Container Release : 3.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:05:38 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:38 +0100 (CET) Subject: SUSE-CU-2024:135-1: Security update of bci/python Message-ID: <20240110140538.8512CFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:135-1 Container Tags : bci/python:3 , bci/python:3-14.3 , bci/python:3.11 , bci/python:3.11-14.3 , bci/python:latest Container Release : 14.3 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:05:37 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:37 +0100 (CET) Subject: SUSE-CU-2024:134-1: Recommended update of bci/python Message-ID: <20240110140537.E17CCFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:134-1 Container Tags : bci/python:3 , bci/python:3-14.1 , bci/python:3.11 , bci/python:3.11-14.1 , bci/python:latest Container Release : 14.1 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-feature-2023:4502-1 Released: Tue Nov 21 12:14:58 2023 Summary: Feature update for python3 Type: feature Severity: low References: This feature update for python3 packages adds the following: - Second batch of new python-3.11 packages (jsc#PED-68) Updates to previosly released python 3.11 packages: - python-urllib3 to 2.0.7 - python-Sphinx to 7.2.6 - python-pytest to 7.4.2 - python-hypothesis to 6.82.7 - python-sphinxcontrib-serializinghtml to 1.1.9 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - python311-packaging-23.1-150400.8.3.9 added - python311-click-8.1.3-150400.7.3.9 added - python311-argcomplete-3.1.2-150400.12.5.1 added - python311-userpath-1.9.0-150400.9.3.1 added - python311-pipx-1.2.0-150400.9.3.1 added - container:sles15-image-15.0.0-36.5.70 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:06:20 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:06:20 +0100 (CET) Subject: SUSE-CU-2024:139-1: Recommended update of bci/ruby Message-ID: <20240110140620.8B329FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/ruby ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:139-1 Container Tags : bci/ruby:2 , bci/ruby:2-13.3 , bci/ruby:2.5 , bci/ruby:2.5-13.3 , bci/ruby:latest Container Release : 13.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/ruby was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:05:55 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:55 +0100 (CET) Subject: SUSE-CU-2024:136-1: Recommended update of bci/python Message-ID: <20240110140555.A2B5BFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:136-1 Container Tags : bci/python:3 , bci/python:3-15.3 , bci/python:3.6 , bci/python:3.6-15.3 Container Release : 15.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:06:04 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:06:04 +0100 (CET) Subject: SUSE-CU-2024:138-1: Security update of suse/rmt-server Message-ID: <20240110140604.A409AFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-server ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:138-1 Container Tags : suse/rmt-server:2.14 , suse/rmt-server:2.14-12.5 , suse/rmt-server:latest Container Release : 12.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/rmt-server was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:05:56 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:56 +0100 (CET) Subject: SUSE-CU-2024:137-1: Security update of bci/python Message-ID: <20240110140556.56FDCFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:137-1 Container Tags : bci/python:3 , bci/python:3-15.5 , bci/python:3.6 , bci/python:3.6-15.5 Container Release : 15.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:12:11 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:11 +0100 (CET) Subject: SUSE-CU-2024:139-1: Recommended update of bci/ruby Message-ID: <20240110141211.8380CFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/ruby ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:139-1 Container Tags : bci/ruby:2 , bci/ruby:2-13.3 , bci/ruby:2.5 , bci/ruby:2.5-13.3 , bci/ruby:latest Container Release : 13.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/ruby was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:12:12 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:12 +0100 (CET) Subject: SUSE-CU-2024:140-1: Security update of bci/ruby Message-ID: <20240110141212.496A3FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/ruby ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:140-1 Container Tags : bci/ruby:2 , bci/ruby:2-13.5 , bci/ruby:2.5 , bci/ruby:2.5-13.5 , bci/ruby:latest Container Release : 13.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/ruby was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:12:30 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:30 +0100 (CET) Subject: SUSE-CU-2024:141-1: Recommended update of bci/rust Message-ID: <20240110141230.926B1FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:141-1 Container Tags : bci/rust:1.73 , bci/rust:1.73-2.3.3 , bci/rust:oldstable , bci/rust:oldstable-2.3.3 Container Release : 3.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:12:31 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:31 +0100 (CET) Subject: SUSE-CU-2024:142-1: Security update of bci/rust Message-ID: <20240110141231.39BE6FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:142-1 Container Tags : bci/rust:1.73 , bci/rust:1.73-2.3.5 , bci/rust:oldstable , bci/rust:oldstable-2.3.5 Container Release : 3.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:12:50 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:50 +0100 (CET) Subject: SUSE-CU-2024:143-1: Recommended update of bci/rust Message-ID: <20240110141250.C7C24FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:143-1 Container Tags : bci/rust:1.74 , bci/rust:1.74-1.3.3 , bci/rust:latest , bci/rust:stable , bci/rust:stable-1.3.3 Container Release : 3.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:12:53 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:53 +0100 (CET) Subject: SUSE-CU-2024:145-1: Recommended update of bci/bci-sle15-kernel-module-devel Message-ID: <20240110141253.2A54BFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:145-1 Container Tags : bci/bci-sle15-kernel-module-devel:15.5 , bci/bci-sle15-kernel-module-devel:15.5.3.4 , bci/bci-sle15-kernel-module-devel:latest Container Release : 3.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:12:51 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:51 +0100 (CET) Subject: SUSE-CU-2024:144-1: Security update of bci/rust Message-ID: <20240110141251.945BCFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:144-1 Container Tags : bci/rust:1.74 , bci/rust:1.74-1.3.5 , bci/rust:latest , bci/rust:stable , bci/rust:stable-1.3.5 Container Release : 3.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:12:53 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:53 +0100 (CET) Subject: SUSE-CU-2024:146-1: Security update of bci/bci-sle15-kernel-module-devel Message-ID: <20240110141253.F0F13FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:146-1 Container Tags : bci/bci-sle15-kernel-module-devel:15.5 , bci/bci-sle15-kernel-module-devel:15.5.3.6 , bci/bci-sle15-kernel-module-devel:latest Container Release : 3.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:13:10 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:13:10 +0100 (CET) Subject: SUSE-CU-2024:147-1: Recommended update of suse/sle15 Message-ID: <20240110141310.E99B8FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:147-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.70 , suse/sle15:15.5 , suse/sle15:15.5.36.5.70 Container Release : 36.5.70 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:13:11 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:13:11 +0100 (CET) Subject: SUSE-CU-2024:148-1: Security update of suse/sle15 Message-ID: <20240110141311.B5B17FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:148-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.71 , suse/sle15:15.5 , suse/sle15:15.5.36.5.71 Container Release : 36.5.71 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:13:53 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:13:53 +0100 (CET) Subject: SUSE-CU-2024:149-1: Security update of suse/sle-micro/5.1/toolbox Message-ID: <20240110141353.1F874FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.1/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:149-1 Container Tags : suse/sle-micro/5.1/toolbox:12.1 , suse/sle-micro/5.1/toolbox:12.1-2.2.527 , suse/sle-micro/5.1/toolbox:latest Container Release : 2.2.527 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.1/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From sle-container-updates at lists.suse.com Wed Jan 10 14:15:45 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:15:45 +0100 (CET) Subject: SUSE-CU-2024:151-1: Security update of suse/sle-micro/5.2/toolbox Message-ID: <20240110141545.39770FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.2/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:151-1 Container Tags : suse/sle-micro/5.2/toolbox:12.1 , suse/sle-micro/5.2/toolbox:12.1-6.2.349 , suse/sle-micro/5.2/toolbox:latest Container Release : 6.2.349 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.2/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From sle-container-updates at lists.suse.com Thu Jan 11 08:01:47 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 11 Jan 2024 09:01:47 +0100 (CET) Subject: SUSE-CU-2024:152-1: Security update of suse/sle-micro/5.5/toolbox Message-ID: <20240111080147.01401FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.5/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:152-1 Container Tags : suse/sle-micro/5.5/toolbox:12.1 , suse/sle-micro/5.5/toolbox:12.1-2.2.133 , suse/sle-micro/5.5/toolbox:latest Container Release : 2.2.133 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.5/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-container-updates at lists.suse.com Thu Jan 11 08:03:17 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 11 Jan 2024 09:03:17 +0100 (CET) Subject: SUSE-CU-2024:153-1: Recommended update of suse/sles12sp5 Message-ID: <20240111080317.CEB29FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sles12sp5 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:153-1 Container Tags : suse/sles12sp5:6.5.553 , suse/sles12sp5:latest Container Release : 6.5.553 Severity : moderate Type : recommended References : 1217948 ----------------------------------------------------------------- The container suse/sles12sp5 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:74-1 Released: Wed Jan 10 10:17:47 2024 Summary: Recommended update for libzypp, zypper Type: recommended Severity: moderate References: 1217948 This update for libzypp, zypper fixes the following issues: - Touch /run/reboot-needed if a patch suggesting a reboot was installed (bsc#1217948) - Backport needs-rebooting command from Code15 (bsc#1217948) The following package changes have been done: - libzypp-16.22.11-59.2 updated - zypper-1.13.65-21.58.2 updated From sle-container-updates at lists.suse.com Fri Jan 12 08:03:45 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 12 Jan 2024 09:03:45 +0100 (CET) Subject: SUSE-CU-2024:157-1: Recommended update of suse/ltss/sle15.4/sle15 Message-ID: <20240112080345.DB434FD0A@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.4/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:157-1 Container Tags : suse/ltss/sle15.4/bci-base:15.4 , suse/ltss/sle15.4/bci-base:15.4.2.6 , suse/ltss/sle15.4/sle15:15.4 , suse/ltss/sle15.4/sle15:15.4.2.6 Container Release : 2.6 Severity : moderate Type : recommended References : 1212160 1215294 1216412 1217593 1217873 1218291 ----------------------------------------------------------------- The container suse/ltss/sle15.4/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - zypper-1.14.68-150400.3.40.2 updated From sle-container-updates at lists.suse.com Fri Jan 12 08:06:12 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 12 Jan 2024 09:06:12 +0100 (CET) Subject: SUSE-CU-2024:168-1: Security update of bci/golang Message-ID: <20240112080612.D87C2FD0A@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:168-1 Container Tags : bci/golang:1.20 , bci/golang:1.20-2.6.1 , bci/golang:oldstable , bci/golang:oldstable-2.6.1 Container Release : 6.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.72 updated From sle-container-updates at lists.suse.com Fri Jan 12 08:06:21 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 12 Jan 2024 09:06:21 +0100 (CET) Subject: SUSE-CU-2024:169-1: Security update of bci/golang Message-ID: <20240112080621.9F54BFD0A@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:169-1 Container Tags : bci/golang:1.20-openssl , bci/golang:1.20-openssl-10.1 , bci/golang:oldstable-openssl , bci/golang:oldstable-openssl-10.1 Container Release : 10.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.72 updated From sle-container-updates at lists.suse.com Fri Jan 12 08:11:08 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 12 Jan 2024 09:11:08 +0100 (CET) Subject: SUSE-CU-2024:195-1: Recommended update of bci/bci-sle15-kernel-module-devel Message-ID: <20240112081108.41AACFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:195-1 Container Tags : bci/bci-sle15-kernel-module-devel:15.5 , bci/bci-sle15-kernel-module-devel:15.5.3.8 , bci/bci-sle15-kernel-module-devel:latest Container Release : 3.8 Severity : moderate Type : recommended References : ----------------------------------------------------------------- The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:87-1 Released: Thu Jan 11 10:05:12 2024 Summary: Recommended update for pesign Type: recommended Severity: moderate References: This update for pesign fixes the following issue: - Create pesign-systemd subpackage to remove systemd dependency (jsc#PED-7256) The following package changes have been done: - pesign-0.112-150000.4.18.1 updated - container:sles15-image-15.0.0-36.5.72 updated - dbus-1-1.12.2-150400.18.8.1 removed - kbd-2.4.0-150400.5.6.1 removed - kbd-legacy-2.4.0-150400.5.6.1 removed - libapparmor1-3.0.4-150500.11.9.1 removed - libargon2-1-0.0+git20171227.670229c-2.14 removed - libcryptsetup12-2.4.3-150400.3.3.1 removed - libcryptsetup12-hmac-2.4.3-150400.3.3.1 removed - libdbus-1-3-1.12.2-150400.18.8.1 removed - libdevmapper1_03-2.03.22_1.02.196-150500.7.9.1 removed - libip4tc2-1.8.7-1.1 removed - libjson-c3-0.13-3.3.1 removed - libkmod2-29-4.15.1 removed - libp11-kit0-0.23.22-150500.8.3.1 removed - libseccomp2-2.5.3-150400.2.4 removed - libudev1-249.16-150400.8.35.5 removed - netcfg-11.6-3.3.1 removed - pam-config-1.1-3.3.1 removed - systemd-249.16-150400.8.35.5 removed - systemd-default-settings-0.7-3.2.1 removed - systemd-default-settings-branding-SLE-0.7-3.2.1 removed - systemd-presets-branding-SLE-15.1-150100.20.11.1 removed - systemd-presets-common-SUSE-15-150500.20.3.1 removed From sle-container-updates at lists.suse.com Fri Jan 12 08:11:20 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 12 Jan 2024 09:11:20 +0100 (CET) Subject: SUSE-CU-2024:196-1: Recommended update of suse/sle15 Message-ID: <20240112081120.9BDE4FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:196-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.72 , suse/sle15:15.5 , suse/sle15:15.5.36.5.72 Container Release : 36.5.72 Severity : moderate Type : recommended References : 1212160 1215294 1216412 1217593 1217873 1218291 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - zypper-1.14.68-150400.3.40.2 updated From sle-container-updates at lists.suse.com Fri Jan 12 12:35:49 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 12 Jan 2024 13:35:49 +0100 (CET) Subject: SUSE-CU-2024:197-1: Recommended update of suse/sle-micro/5.5/toolbox Message-ID: <20240112123549.6B04EFD0A@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.5/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:197-1 Container Tags : suse/sle-micro/5.5/toolbox:12.1 , suse/sle-micro/5.5/toolbox:12.1-2.2.135 , suse/sle-micro/5.5/toolbox:latest Container Release : 2.2.135 Severity : moderate Type : recommended References : 1212160 1215294 1216412 1217593 1217873 1218291 ----------------------------------------------------------------- The container suse/sle-micro/5.5/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - zypper-1.14.68-150400.3.40.2 updated - container:sles15-image-15.0.0-36.5.72 updated From sle-container-updates at lists.suse.com Sat Jan 13 08:06:28 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 13 Jan 2024 09:06:28 +0100 (CET) Subject: SUSE-CU-2024:218-1: Recommended update of bci/rust Message-ID: <20240113080628.745BDFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:218-1 Container Tags : bci/rust:1.74 , bci/rust:1.74-2.2.1 , bci/rust:oldstable , bci/rust:oldstable-2.2.1 Container Release : 2.1 Severity : moderate Type : recommended References : ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4592-1 Released: Mon Nov 27 18:02:44 2023 Summary: Recommended update for rust, rust1.74 Type: recommended Severity: moderate References: This update for rust, rust1.74 fixes the following issues: Version 1.74.0 (2023-11-16) ========================== Language -------- - Codify that std::mem::Discriminant does not depend on any lifetimes in T - Replace private_in_public lint with private_interfaces and private_bounds per RFC 2145. Read more in [RFC 2145(https://rust-lang.github.io/rfcs/2145-type-privacy.html). - Allow explicit #[repr(Rust)] - closure field capturing: don't depend on alignment of packed fields - Enable MIR-based drop-tracking for async blocks - Stabilize impl_trait_projections Compiler -------- - stabilize combining +bundle and +whole-archive link modifiers - Stabilize PATH option for --print KIND=PATH - Enable ASAN/LSAN/TSAN for *-apple-ios-macabi - Promote loongarch64-unknown-none* to Tier 2 - Add i686-pc-windows-gnullvm as a tier 3 target Libraries --------- - Implement From for ChildStdin/out/err - Implement From<{&,&mut} [T; N]> for Vec where T: Clone - impl Step for IP addresses - Implement From<[T; N]> for Rc<[T]> and Arc<[T]> - impl TryFrom for u16 - Stabilize io_error_other feature - Stabilize the Saturating type - Stabilize const_transmute_copy Stabilized APIs --------------- - core::num::Saturating - impl From for std::process::Stdio - impl From for std::process::Stdio - impl From for std::process::Child{Stdin, Stdout, Stderr} - impl From for std::process::Child{Stdin, Stdout, Stderr} - std::ffi::OsString::from_encoded_bytes_unchecked - std::ffi::OsString::into_encoded_bytes - std::ffi::OsStr::from_encoded_bytes_unchecked - std::ffi::OsStr::as_encoded_bytes - std::io::Error::other - impl TryFrom for u16 - impl From<&[T; N]> for Vec - impl From<&mut [T; N]> for Vec - impl From<[T; N]> for Arc<[T]> - impl From<[T; N]> for Rc<[T]> Thse APIs are now stable in const contexts: - core::mem::transmute_copy - str::is_ascii - [u8]::is_ascii Cargo ----- - fix: Set MSRV for internal packages - config: merge lists in precedence order - fix(update): Clarify meaning of --aggressive as --recursive - fix(update): Make -p more convenient by being positional - feat(help): Add styling to help output - feat(pkgid): Allow incomplete versions when unambigious - feat: stabilize credential-process and registry-auth - feat(cli): Add '-n' to dry-run - Add support for target.'cfg(..)'.linker - Stabilize --keep-going - feat: Stabilize lints Rustdoc ------- - Add warning block support in rustdoc - Accept additional user-defined syntax classes in fenced code blocks - rustdoc-search: add support for type parameters - rustdoc: show inner enum and struct in type definition for concrete type Compatibility Notes ------------------- - Raise minimum supported Apple OS versions - make Cell::swap panic if the Cells partially overlap - Reject invalid crate names in --extern - Don't resolve generic impls that may be shadowed by dyn built-in impls - The new impl From<{&,&mut} [T; N]> for Vec is known to cause some inference failures with overly-generic code. Changes in rust: - Update to version 1.74.0 - for details see the rust1.74 package The following package changes have been done: - rust1.74-1.74.0-150400.9.3.1 added - cargo1.74-1.74.0-150400.9.3.1 added - cargo1.73-1.73.0-150400.9.3.1 removed - rust1.73-1.73.0-150400.9.3.1 removed From sle-container-updates at lists.suse.com Sat Jan 13 08:06:47 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 13 Jan 2024 09:06:47 +0100 (CET) Subject: SUSE-CU-2024:220-1: Recommended update of bci/bci-sle15-kernel-module-devel Message-ID: <20240113080647.28271FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:220-1 Container Tags : bci/bci-sle15-kernel-module-devel:15.5 , bci/bci-sle15-kernel-module-devel:15.5.4.1 , bci/bci-sle15-kernel-module-devel:latest Container Release : 4.1 Severity : moderate Type : recommended References : 1201041 1209353 1209881 ----------------------------------------------------------------- The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-feature-2022:3302-1 Released: Mon Sep 19 08:51:02 2022 Summary: Feature update for python310-pip Type: feature Severity: moderate References: 1201041 This feature update for python310-pip and python-rpm-macros provides: python310-pip: Upgrade from version 20.2.4 to version 22.0.4 (jsc#SLE-24539) - Adjust SPEC file to generate python310 module only - Avoid cycle: BuildRequire ca-certificates only in tests - This version is not compatible with Python 3.6 and thus not suitable for SUSE Linux Enterprise 15. - Drop the doctype check, that presented a warning for index pages that use non-compliant HTML 5. - Print the exception via rich.traceback, when running with `--debug`. - Only calculate topological installation order, for packages that are going to be installed/upgraded. * This error occurred when determining the installation order for a very specific combination of upgrading of already installed packages, change of dependencies and fetching some packages from a package index. This combination was especially common in Read the Docs' builds. - Use html.parser by default, instead of falling back to html5lib when --use-deprecated=html5lib is not passed. - Clarify that using per-requirement overrides disables the usage of wheels. - Instead of failing on index pages that use non-compliant HTML 5, print a deprecation warning and fall back to html5lib-based parsing for now. This simplifies the migration for non-compliant index pages, by letting such indexes function with a warning. - Accept lowercase on index pages. - Properly handle links parsed by html5lib, when using --use-deprecated=html5lib. - Changed PackageFinder to parse HTML documents using the stdlib :class:`html.parser.HTMLParser` class instead of the html5lib package. - For now, the deprecated html5lib code remains and can be used with the --use-deprecated=html5lib command line option. However, it will be removed in a future pip release. - Completely replace :pypi:`tox` in our development workflow, with :pypi:`nox`. - Deprecate alternative progress bar styles, leaving only on and off as available choices. - Drop support for Python 3.6. - Disable location mismatch warnings on Python versions prior to 3.10. * These warnings were helping identify potential issues as part of the sysconfig -> distutils transition, and we no longer need to rely on reports from older Python versions for information on the transition. - Utilize rich for presenting pip's default download progress bar. - Present a better error message when an invalid wheel file is encountered, providing more context where the invalid wheel file is. - Documents the --require-virtualenv flag for pip install. - pip install autocompletes paths. - Allow Python distributors to opt-out from or opt-in to the sysconfig installation scheme backend by setting sysconfig._PIP_USE_SYSCONFIG to True or False. - Make it possible to deselect tests requiring cryptography package on systems where it cannot be installed. - Start using Rich for presenting error messages in a consistent format. - Improve presentation of errors from subprocesses. - Forward pip's verbosity configuration to VCS tools to control their output accordingly. - Optimize installation order calculation to improve performance when installing requirements that form a complex dependency graph with a large amount of edges. - When a package is requested by the user for upgrade, correctly identify that the extra-ed variant of that same package depended by another user-requested package is requesting the same package, and upgrade it accordingly. - Prevent pip from installing yanked releases unless explicitly pinned via the `==` or `===` operators. - Stop backtracking on build failures, by instead surfacing them to the user and aborting immediately. This behaviour provides more immediate feedback when a package cannot be built due to missing build dependencies or platform incompatibility. - Silence Value for does not match warning caused by an erroneous patch in Slackware-distributed Python 3.9. - Fix an issue where pip did not consider dependencies with and without extras to be equal - Always refuse installing or building projects that have no ``pyproject.toml`` nor ``setup.py``. - Tweak running-as-root detection, to check ``os.getuid`` if it exists, on Unix-y and non-Linux/non-MacOS machines. - When installing projects with a ``pyproject.toml`` in editable mode, and the build backend does not support :pep:`660`, prepare metadata using ``prepare_metadata_for_build_wheel`` instead of ``setup.py egg_info``. Also, refuse installing projects that only have a ``setup.cfg`` and no ``setup.py`` nor ``pyproject.toml``. These restore the pre-21.3 behaviour. - Restore compatibility of where configuration files are loaded from on MacOS - Upgrade pep517 to 0.12.0 - Improve deprecation warning regarding the copying of source trees when installing from a local directory. - Suppress location mismatch warnings when pip is invoked from a Python source tree, so ``ensurepip`` does not emit warnings on CPython ``make install``. - On Python 3.10 or later, the installation scheme backend has been changed to use ``sysconfig``. This is to anticipate the deprecation of ``distutils`` in Python 3.10, and its scheduled removal in 3.12. For compatibility considerations, pip installations running on Python 3.9 or lower will continue to use ``distutils``. - Remove the ``--build-dir`` option and aliases, one last time. - In-tree builds are now the default. ``--use-feature=in-tree-build`` is now ignored. ``--use-deprecated=out-of-tree-build`` may be used temporarily to ease the transition. - Un-deprecate source distribution re-installation behaviour. - Replace vendored appdirs with platformdirs. - Support `PEP 610 `_ to detect editable installs in ``pip freeze`` and ``pip list``. The ``pip list`` column output has a new ``Editable project location`` column, and the JSON output has a new ``editable_project_location`` field. - ``pip freeze`` will now always fallback to reporting the editable project location when it encounters a VCS error while analyzing an editable requirement. Before, it sometimes reported the requirement as non-editable. - ``pip show`` now sorts ``Requires`` and ``Required-By`` alphabetically. - Do not raise error when there are no files to remove with ``pip cache purge/remove``. Instead log a warning and continue (to log that we removed 0 files). - When backtracking during dependency resolution, prefer the dependencies which are involved in the most recent conflict. This can significantly reduce the amount of backtracking required. - Cache requirement objects, to improve performance reducing reparses of requirement strings. - Support editable installs for projects that have a ``pyproject.toml`` and use a build backend that supports :pep:`660`. - When a revision is specified in a Git URL, use git's partial clone feature to speed up source retrieval. - Add a ``--debug`` flag, to enable a mode that doesn't log errors and propagates them to the top level instead. This is primarily to aid with debugging pip's crashes. - If a host is explicitly specified as trusted by the user (via the --trusted-host option), cache HTTP responses from it in addition to HTTPS ones. - Present a better error message, when a ``file:`` URL is not found. - Fix the auth credential cache to allow for the case in which the index url contains the username, but the password comes from an external source, such as keyring. - Fix double unescape of HTML ``data-requires-python`` and ``data-yanked`` attributes. - New resolver: Fixes depth ordering of packages during resolution, e.g. a dependency 2 levels deep will be ordered before a dependency 3 levels deep. python-rpm-macros: Update from version 20220106.80d3756 to version 20220809.cf8a7b8 (bsc#1201041) - Pass `--ignore-installed` to `pip install` in %pyproject_install - restore end-of-line in alternative scriptlets - make python_flavored_alternatives less verbose - Move install of libalts from sciptlets to python_clone -a - hard-code %py_ver - print proper error on missing python interpreter - Update compile-macros.sh - Create python_flavored_alternatives and use for testing - Switch primary_interpreter from python38 to python310 - Avoid bashism in %() - Fix flavor executable substitution - Keep python38 as primary python3 - Add python310 to the buildset - Move python39 to the primary place in %pythons - Disable python36 flavor in Factory buildset - Add python310 flavor macros to compile set ----------------------------------------------------------------- Advisory ID: SUSE-feature-2022:3689-1 Released: Fri Oct 21 14:19:56 2022 Summary: Feature update for rpm Type: feature Severity: moderate References: This feature update for rpm provides: - Support Ed25519 RPM signatures (jsc#SLE-24714, jsc#SLE-24715) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:2155-1 Released: Wed May 10 13:07:56 2023 Summary: Recommended update for python-rpm-macros Type: recommended Severity: moderate References: 1209353,1209881 This update for python-rpm-macros fixes the following issues: - Update to version 20230304.050c1a4 (bsc#1209881, bsc#1209353) The following package changes have been done: - bzip2-1.0.8-150400.1.122 added - dwz-0.12-150000.3.2.1 added - file-5.32-7.14.1 added - glibc-locale-base-2.31-150300.63.1 added - libtextstyle0-0.20.2-1.43 added - python-rpm-macros-20230403.29b58f8-150400.3.9.1 added - which-2.21-2.20 added - xz-5.2.3-150000.4.7.1 added - glibc-locale-2.31-150300.63.1 added - gettext-runtime-0.20.2-1.43 added - gettext-tools-0.20.2-1.43 added - rpm-build-4.14.3-150400.59.3.1 added From sle-container-updates at lists.suse.com Mon Jan 15 08:01:03 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Mon, 15 Jan 2024 09:01:03 +0100 (CET) Subject: SUSE-IU-2024:18-1: Security update of suse-sles-15-sp5-chost-byos-v20240111-x86_64-gen2 Message-ID: <20240115080103.79568FBA9@maintenance.suse.de> SUSE Image Update Advisory: suse-sles-15-sp5-chost-byos-v20240111-x86_64-gen2 ----------------------------------------------------------------- Image Advisory ID : SUSE-IU-2024:18-1 Image Tags : suse-sles-15-sp5-chost-byos-v20240111-x86_64-gen2:20240111 Image Release : Severity : important Type : security References : 1029961 1158830 1170415 1170446 1178760 1201384 1206798 1209122 1210141 1212160 1213229 1213500 1214788 1215294 1215323 1215496 1216412 1216853 1216987 1217277 1217292 1217513 1217592 1217593 1217695 1217696 1217873 1217950 1217969 1218014 1218291 CVE-2020-12912 CVE-2020-8694 CVE-2020-8695 CVE-2023-38472 CVE-2023-39804 CVE-2023-48795 CVE-2023-49083 CVE-2023-50495 CVE-2023-5981 ----------------------------------------------------------------- The container suse-sles-15-sp5-chost-byos-v20240111-x86_64-gen2 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4843-1 Released: Thu Dec 14 12:22:44 2023 Summary: Security update for python3-cryptography Type: security Severity: moderate References: 1217592,CVE-2023-49083 This update for python3-cryptography fixes the following issues: - CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4901-1 Released: Tue Dec 19 11:25:47 2023 Summary: Security update for avahi Type: security Severity: moderate References: 1216853,CVE-2023-38472 This update for avahi fixes the following issues: - CVE-2023-38472: Fixed reachable assertion in avahi_rdata_parse (bsc#1216853). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4902-1 Released: Tue Dec 19 13:09:42 2023 Summary: Security update for openssh Type: security Severity: important References: 1214788,1217950,CVE-2023-48795 This update for openssh fixes the following issues: - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950). the following non-security bug was fixed: - Fix the 'no route to host' error when connecting via ProxyJump ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4936-1 Released: Wed Dec 20 17:18:21 2023 Summary: Security update for docker, rootlesskit Type: security Severity: important References: 1170415,1170446,1178760,1210141,1213229,1213500,1215323,1217513,CVE-2020-12912,CVE-2020-8694,CVE-2020-8695 This update for docker, rootlesskit fixes the following issues: docker: - Update to Docker 24.0.7-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2407>. bsc#1217513 * Deny containers access to /sys/devices/virtual/powercap by default. - CVE-2020-8694 bsc#1170415 - CVE-2020-8695 bsc#1170446 - CVE-2020-12912 bsc#1178760 - Update to Docker 24.0.6-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2406 . bsc#1215323 - Add a docker.socket unit file, but with socket activation effectively disabled to ensure that Docker will always run even if you start the socket individually. Users should probably just ignore this unit file. bsc#1210141 - Update to Docker 24.0.5-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2405 . bsc#1213229 This update ships docker-rootless support in the docker-rootless-extra package. (jsc#PED-6180) rootlesskit: - new package, for docker rootless support. (jsc#PED-6180) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4962-1 Released: Fri Dec 22 13:45:06 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) This update also ships curl to the INSTALLER channel. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4983-1 Released: Thu Dec 28 14:21:40 2023 Summary: Security update for gnutls Type: security Severity: moderate References: 1217277,CVE-2023-5981 This update for gnutls fixes the following issues: - CVE-2023-5981: Fixed timing side-channel inside RSA-PSK key exchange (bsc#1217277). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:50-1 Released: Mon Jan 8 03:18:56 2024 Summary: Recommended update for python-instance-billing-flavor-check Type: recommended Severity: moderate References: 1217695,1217696 This update for python-instance-billing-flavor-check fixes the following issues: - Run the command as sudo only (bsc#1217696, bsc#1217695) - Handle exception for Python 3.4 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:68-1 Released: Tue Jan 9 15:26:08 2024 Summary: Recommended update for rsyslog Type: recommended Severity: moderate References: 1217292 This update for rsyslog fixes the following issues: - Restart daemon after modules packages have been updated (bsc#1217292) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - curl-8.0.1-150400.5.41.1 updated - docker-24.0.7_ce-150000.190.4 updated - libavahi-client3-0.8-150400.7.13.1 updated - libavahi-common3-0.8-150400.7.13.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libcurl4-8.0.1-150400.5.41.1 updated - libgnutls30-3.7.3-150400.4.38.1 updated - libncurses6-6.1-150000.5.20.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - openssh-clients-8.4p1-150300.3.27.1 updated - openssh-common-8.4p1-150300.3.27.1 updated - openssh-server-8.4p1-150300.3.27.1 updated - openssh-8.4p1-150300.3.27.1 updated - procps-3.3.17-150000.7.37.1 updated - python-instance-billing-flavor-check-0.0.4-150000.1.6.1 updated - python3-cryptography-3.3.2-150400.23.1 updated - python3-cssselect-1.0.3-150000.3.5.1 updated - rsyslog-module-relp-8.2306.0-150400.5.24.1 updated - rsyslog-8.2306.0-150400.5.24.1 updated - samba-client-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 updated - tar-1.34-150000.3.34.1 updated - terminfo-base-6.1-150000.5.20.1 updated - terminfo-6.1-150000.5.20.1 updated - xen-libs-4.17.3_02-150500.3.18.1 updated - zypper-1.14.68-150400.3.40.2 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-container-updates at lists.suse.com Mon Jan 15 08:01:06 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Mon, 15 Jan 2024 09:01:06 +0100 (CET) Subject: SUSE-IU-2024:19-1: Security update of suse-sles-15-sp5-chost-byos-v20240111-hvm-ssd-x86_64 Message-ID: <20240115080106.C1374FBA9@maintenance.suse.de> SUSE Image Update Advisory: suse-sles-15-sp5-chost-byos-v20240111-hvm-ssd-x86_64 ----------------------------------------------------------------- Image Advisory ID : SUSE-IU-2024:19-1 Image Tags : suse-sles-15-sp5-chost-byos-v20240111-hvm-ssd-x86_64:20240111 Image Release : Severity : important Type : security References : 1029961 1158830 1170415 1170446 1178760 1201384 1206798 1209122 1210141 1212160 1213229 1213500 1214788 1215294 1215323 1215496 1216412 1216853 1216987 1217277 1217292 1217513 1217592 1217593 1217695 1217696 1217873 1217950 1217969 1218014 1218291 CVE-2020-12912 CVE-2020-8694 CVE-2020-8695 CVE-2023-38472 CVE-2023-39804 CVE-2023-48795 CVE-2023-49083 CVE-2023-50495 CVE-2023-5981 ----------------------------------------------------------------- The container suse-sles-15-sp5-chost-byos-v20240111-hvm-ssd-x86_64 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4843-1 Released: Thu Dec 14 12:22:44 2023 Summary: Security update for python3-cryptography Type: security Severity: moderate References: 1217592,CVE-2023-49083 This update for python3-cryptography fixes the following issues: - CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4901-1 Released: Tue Dec 19 11:25:47 2023 Summary: Security update for avahi Type: security Severity: moderate References: 1216853,CVE-2023-38472 This update for avahi fixes the following issues: - CVE-2023-38472: Fixed reachable assertion in avahi_rdata_parse (bsc#1216853). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4902-1 Released: Tue Dec 19 13:09:42 2023 Summary: Security update for openssh Type: security Severity: important References: 1214788,1217950,CVE-2023-48795 This update for openssh fixes the following issues: - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950). the following non-security bug was fixed: - Fix the 'no route to host' error when connecting via ProxyJump ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4936-1 Released: Wed Dec 20 17:18:21 2023 Summary: Security update for docker, rootlesskit Type: security Severity: important References: 1170415,1170446,1178760,1210141,1213229,1213500,1215323,1217513,CVE-2020-12912,CVE-2020-8694,CVE-2020-8695 This update for docker, rootlesskit fixes the following issues: docker: - Update to Docker 24.0.7-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2407>. bsc#1217513 * Deny containers access to /sys/devices/virtual/powercap by default. - CVE-2020-8694 bsc#1170415 - CVE-2020-8695 bsc#1170446 - CVE-2020-12912 bsc#1178760 - Update to Docker 24.0.6-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2406 . bsc#1215323 - Add a docker.socket unit file, but with socket activation effectively disabled to ensure that Docker will always run even if you start the socket individually. Users should probably just ignore this unit file. bsc#1210141 - Update to Docker 24.0.5-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2405 . bsc#1213229 This update ships docker-rootless support in the docker-rootless-extra package. (jsc#PED-6180) rootlesskit: - new package, for docker rootless support. (jsc#PED-6180) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4962-1 Released: Fri Dec 22 13:45:06 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) This update also ships curl to the INSTALLER channel. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4983-1 Released: Thu Dec 28 14:21:40 2023 Summary: Security update for gnutls Type: security Severity: moderate References: 1217277,CVE-2023-5981 This update for gnutls fixes the following issues: - CVE-2023-5981: Fixed timing side-channel inside RSA-PSK key exchange (bsc#1217277). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:50-1 Released: Mon Jan 8 03:18:56 2024 Summary: Recommended update for python-instance-billing-flavor-check Type: recommended Severity: moderate References: 1217695,1217696 This update for python-instance-billing-flavor-check fixes the following issues: - Run the command as sudo only (bsc#1217696, bsc#1217695) - Handle exception for Python 3.4 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:68-1 Released: Tue Jan 9 15:26:08 2024 Summary: Recommended update for rsyslog Type: recommended Severity: moderate References: 1217292 This update for rsyslog fixes the following issues: - Restart daemon after modules packages have been updated (bsc#1217292) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - curl-8.0.1-150400.5.41.1 updated - docker-24.0.7_ce-150000.190.4 updated - libavahi-client3-0.8-150400.7.13.1 updated - libavahi-common3-0.8-150400.7.13.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libcurl4-8.0.1-150400.5.41.1 updated - libgnutls30-3.7.3-150400.4.38.1 updated - libncurses6-6.1-150000.5.20.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - openssh-clients-8.4p1-150300.3.27.1 updated - openssh-common-8.4p1-150300.3.27.1 updated - openssh-server-8.4p1-150300.3.27.1 updated - openssh-8.4p1-150300.3.27.1 updated - procps-3.3.17-150000.7.37.1 updated - python-instance-billing-flavor-check-0.0.4-150000.1.6.1 updated - python3-cryptography-3.3.2-150400.23.1 updated - python3-cssselect-1.0.3-150000.3.5.1 updated - rsyslog-module-relp-8.2306.0-150400.5.24.1 updated - rsyslog-8.2306.0-150400.5.24.1 updated - samba-client-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 updated - tar-1.34-150000.3.34.1 updated - terminfo-base-6.1-150000.5.20.1 updated - terminfo-6.1-150000.5.20.1 updated - xen-libs-4.17.3_02-150500.3.18.1 updated - xen-tools-domU-4.17.3_02-150500.3.18.1 updated - zypper-1.14.68-150400.3.40.2 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-container-updates at lists.suse.com Mon Jan 15 08:01:12 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Mon, 15 Jan 2024 09:01:12 +0100 (CET) Subject: SUSE-IU-2024:20-1: Security update of sles-15-sp5-chost-byos-v20240111-arm64 Message-ID: <20240115080112.8F203FBA9@maintenance.suse.de> SUSE Image Update Advisory: sles-15-sp5-chost-byos-v20240111-arm64 ----------------------------------------------------------------- Image Advisory ID : SUSE-IU-2024:20-1 Image Tags : sles-15-sp5-chost-byos-v20240111-arm64:20240111 Image Release : Severity : important Type : security References : 1029961 1158830 1170415 1170446 1178760 1201384 1206798 1209122 1210141 1212160 1213229 1213500 1214788 1215294 1215323 1215496 1216412 1216546 1216547 1216548 1216750 1216751 1216853 1216987 1217277 1217292 1217513 1217592 1217593 1217695 1217696 1217873 1217950 1217969 1218014 1218291 CVE-2020-12912 CVE-2020-8694 CVE-2020-8695 CVE-2023-38472 CVE-2023-39804 CVE-2023-48795 CVE-2023-49083 CVE-2023-50495 CVE-2023-5981 ----------------------------------------------------------------- The container sles-15-sp5-chost-byos-v20240111-arm64 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4843-1 Released: Thu Dec 14 12:22:44 2023 Summary: Security update for python3-cryptography Type: security Severity: moderate References: 1217592,CVE-2023-49083 This update for python3-cryptography fixes the following issues: - CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4886-1 Released: Mon Dec 18 09:38:37 2023 Summary: Recommended update for google-guest-agent, google-guest-oslogin Type: recommended Severity: moderate References: 1216546,1216547,1216548,1216750,1216751 This update for google-guest-agent, google-guest-oslogin fixes the following issues: - Update to version 20231031.01 (bsc#1216547, bsc#1216751) - Bump the golang compiler version to 1.21 (bsc#1216546) - Update to version 20231101.00 (bsc#1216548, bsc#1216750) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4901-1 Released: Tue Dec 19 11:25:47 2023 Summary: Security update for avahi Type: security Severity: moderate References: 1216853,CVE-2023-38472 This update for avahi fixes the following issues: - CVE-2023-38472: Fixed reachable assertion in avahi_rdata_parse (bsc#1216853). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4902-1 Released: Tue Dec 19 13:09:42 2023 Summary: Security update for openssh Type: security Severity: important References: 1214788,1217950,CVE-2023-48795 This update for openssh fixes the following issues: - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950). the following non-security bug was fixed: - Fix the 'no route to host' error when connecting via ProxyJump ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4936-1 Released: Wed Dec 20 17:18:21 2023 Summary: Security update for docker, rootlesskit Type: security Severity: important References: 1170415,1170446,1178760,1210141,1213229,1213500,1215323,1217513,CVE-2020-12912,CVE-2020-8694,CVE-2020-8695 This update for docker, rootlesskit fixes the following issues: docker: - Update to Docker 24.0.7-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2407>. bsc#1217513 * Deny containers access to /sys/devices/virtual/powercap by default. - CVE-2020-8694 bsc#1170415 - CVE-2020-8695 bsc#1170446 - CVE-2020-12912 bsc#1178760 - Update to Docker 24.0.6-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2406 . bsc#1215323 - Add a docker.socket unit file, but with socket activation effectively disabled to ensure that Docker will always run even if you start the socket individually. Users should probably just ignore this unit file. bsc#1210141 - Update to Docker 24.0.5-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2405 . bsc#1213229 This update ships docker-rootless support in the docker-rootless-extra package. (jsc#PED-6180) rootlesskit: - new package, for docker rootless support. (jsc#PED-6180) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4962-1 Released: Fri Dec 22 13:45:06 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) This update also ships curl to the INSTALLER channel. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4983-1 Released: Thu Dec 28 14:21:40 2023 Summary: Security update for gnutls Type: security Severity: moderate References: 1217277,CVE-2023-5981 This update for gnutls fixes the following issues: - CVE-2023-5981: Fixed timing side-channel inside RSA-PSK key exchange (bsc#1217277). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:50-1 Released: Mon Jan 8 03:18:56 2024 Summary: Recommended update for python-instance-billing-flavor-check Type: recommended Severity: moderate References: 1217695,1217696 This update for python-instance-billing-flavor-check fixes the following issues: - Run the command as sudo only (bsc#1217696, bsc#1217695) - Handle exception for Python 3.4 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:68-1 Released: Tue Jan 9 15:26:08 2024 Summary: Recommended update for rsyslog Type: recommended Severity: moderate References: 1217292 This update for rsyslog fixes the following issues: - Restart daemon after modules packages have been updated (bsc#1217292) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - curl-8.0.1-150400.5.41.1 updated - docker-24.0.7_ce-150000.190.4 updated - google-guest-agent-20231031.01-150000.1.40.1 updated - google-guest-oslogin-20231101.00-150000.1.35.1 updated - libavahi-client3-0.8-150400.7.13.1 updated - libavahi-common3-0.8-150400.7.13.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libcurl4-8.0.1-150400.5.41.1 updated - libgnutls30-3.7.3-150400.4.38.1 updated - libncurses6-6.1-150000.5.20.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - openssh-clients-8.4p1-150300.3.27.1 updated - openssh-common-8.4p1-150300.3.27.1 updated - openssh-server-8.4p1-150300.3.27.1 updated - openssh-8.4p1-150300.3.27.1 updated - procps-3.3.17-150000.7.37.1 updated - python-instance-billing-flavor-check-0.0.4-150000.1.6.1 updated - python3-cryptography-3.3.2-150400.23.1 updated - python3-cssselect-1.0.3-150000.3.5.1 updated - rsyslog-module-relp-8.2306.0-150400.5.24.1 updated - rsyslog-8.2306.0-150400.5.24.1 updated - samba-client-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 updated - tar-1.34-150000.3.34.1 updated - terminfo-base-6.1-150000.5.20.1 updated - terminfo-6.1-150000.5.20.1 updated - xen-libs-4.17.3_02-150500.3.18.1 updated - zypper-1.14.68-150400.3.40.2 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-container-updates at lists.suse.com Thu Jan 18 08:01:57 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 18 Jan 2024 09:01:57 +0100 (CET) Subject: SUSE-CU-2024:223-1: Security update of suse/ltss/sle15.3/sle15 Message-ID: <20240118080157.1CAC2FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.3/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:223-1 Container Tags : suse/ltss/sle15.3/bci-base:15.3 , suse/ltss/sle15.3/bci-base:15.3.3.40 , suse/ltss/sle15.3/sle15:15.3 , suse/ltss/sle15.3/sle15:15.3.3.40 Container Release : 3.40 Severity : important Type : security References : 1029961 1158830 1201384 1206798 1209122 1212475 1215496 1216862 1216987 1217212 1217573 1218014 CVE-2023-46218 CVE-2023-50495 ----------------------------------------------------------------- The container suse/ltss/sle15.3/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4699-1 Released: Mon Dec 11 07:02:10 2023 Summary: Recommended update for gpg2 Type: recommended Severity: moderate References: 1217212 This update for gpg2 fixes the following issues: - `dirmngr-client --validate` is broken for DER-encoded files (bsc#1217212) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4713-1 Released: Mon Dec 11 13:23:12 2023 Summary: Security update for curl Type: security Severity: moderate References: 1217573,CVE-2023-46218 This update for curl fixes the following issues: - CVE-2023-46218: Fixed cookie mixed case PSL bypass (bsc#1217573). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4723-1 Released: Tue Dec 12 09:57:51 2023 Summary: Recommended update for libtirpc Type: recommended Severity: moderate References: 1216862 This update for libtirpc fixes the following issue: - fix sed parsing in specfile (bsc#1216862) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4807-1 Released: Wed Dec 13 18:07:37 2023 Summary: Security update for container-suseconnect Type: security Severity: important References: 1212475 This update of container-suseconnect fixes the following issues: - rebuild the package with the go 1.21 security release (bsc#1212475). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4963-1 Released: Fri Dec 22 14:37:08 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - container-suseconnect-2.4.0-150000.4.46.1 updated - curl-7.66.0-150200.4.66.1 updated - gpg2-2.2.27-150300.3.8.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libcurl4-7.66.0-150200.4.66.1 updated - libncurses6-6.1-150000.5.20.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libsolv-tools-0.7.27-150200.23.2 updated - libtirpc-netconfig-1.3.4-150300.3.23.1 updated - libtirpc3-1.3.4-150300.3.23.1 updated - libzypp-17.31.27-150200.84.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - procps-3.3.17-150000.7.37.1 updated - terminfo-base-6.1-150000.5.20.1 updated - zypper-1.14.68-150200.70.2 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-container-updates at lists.suse.com Fri Jan 19 08:05:17 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:05:17 +0100 (CET) Subject: SUSE-CU-2024:242-1: Security update of suse/ltss/sle15.3/sle15 Message-ID: <20240119080517.69C9BFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.3/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:242-1 Container Tags : suse/ltss/sle15.3/bci-base:15.3 , suse/ltss/sle15.3/bci-base:15.3.3.42 , suse/ltss/sle15.3/sle15:15.3 , suse/ltss/sle15.3/sle15:15.3.3.42 Container Release : 3.42 Severity : moderate Type : security References : 1212475 1217000 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/ltss/sle15.3/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:05:22 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:05:22 +0100 (CET) Subject: SUSE-CU-2024:243-1: Security update of suse/ltss/sle15.4/sle15 Message-ID: <20240119080522.5AF16FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.4/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:243-1 Container Tags : suse/ltss/sle15.4/bci-base:15.4 , suse/ltss/sle15.4/bci-base:15.4.2.8 , suse/ltss/sle15.4/sle15:15.4 , suse/ltss/sle15.4/sle15:15.4.2.8 Container Release : 2.8 Severity : important Type : security References : 1211188 1211190 1212475 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/ltss/sle15.4/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:05:43 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:05:43 +0100 (CET) Subject: SUSE-CU-2024:244-1: Security update of suse/389-ds Message-ID: <20240119080543.DF1A4FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/389-ds ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:244-1 Container Tags : suse/389-ds:2.2 , suse/389-ds:2.2-19.5 , suse/389-ds:latest Container Release : 19.5 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/389-ds was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:06:03 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:06:03 +0100 (CET) Subject: SUSE-CU-2024:245-1: Security update of bci/dotnet-aspnet Message-ID: <20240119080603.8815CFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:245-1 Container Tags : bci/dotnet-aspnet:6.0 , bci/dotnet-aspnet:6.0-21.4 , bci/dotnet-aspnet:6.0.26 , bci/dotnet-aspnet:6.0.26-21.4 Container Release : 21.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:06:22 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:06:22 +0100 (CET) Subject: SUSE-CU-2024:246-1: Security update of bci/dotnet-aspnet Message-ID: <20240119080622.4F1E1FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:246-1 Container Tags : bci/dotnet-aspnet:7.0 , bci/dotnet-aspnet:7.0-21.4 , bci/dotnet-aspnet:7.0.15 , bci/dotnet-aspnet:7.0.15-21.4 Container Release : 21.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:06:50 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:06:50 +0100 (CET) Subject: SUSE-CU-2024:248-1: Security update of bci/dotnet-sdk Message-ID: <20240119080650.5D8BFFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:248-1 Container Tags : bci/dotnet-sdk:6.0 , bci/dotnet-sdk:6.0-20.4 , bci/dotnet-sdk:6.0.26 , bci/dotnet-sdk:6.0.26-20.4 Container Release : 20.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:07:12 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:07:12 +0100 (CET) Subject: SUSE-CU-2024:249-1: Security update of bci/dotnet-sdk Message-ID: <20240119080712.C0A2AFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:249-1 Container Tags : bci/dotnet-sdk:7.0 , bci/dotnet-sdk:7.0-22.4 , bci/dotnet-sdk:7.0.15 , bci/dotnet-sdk:7.0.15-22.4 Container Release : 22.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:07:31 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:07:31 +0100 (CET) Subject: SUSE-CU-2024:250-1: Security update of bci/dotnet-runtime Message-ID: <20240119080731.B88F8FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:250-1 Container Tags : bci/dotnet-runtime:6.0 , bci/dotnet-runtime:6.0-20.4 , bci/dotnet-runtime:6.0.26 , bci/dotnet-runtime:6.0.26-20.4 Container Release : 20.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:07:49 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:07:49 +0100 (CET) Subject: SUSE-CU-2024:251-1: Security update of bci/dotnet-runtime Message-ID: <20240119080749.BA95BFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:251-1 Container Tags : bci/dotnet-runtime:7.0 , bci/dotnet-runtime:7.0-22.4 , bci/dotnet-runtime:7.0.15 , bci/dotnet-runtime:7.0.15-22.4 Container Release : 22.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:07:55 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:07:55 +0100 (CET) Subject: SUSE-CU-2024:252-1: Security update of suse/git Message-ID: <20240119080755.F1EC5FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/git ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:252-1 Container Tags : suse/git:2.35 , suse/git:2.35-7.4 , suse/git:latest Container Release : 7.4 Severity : important Type : security References : 1211188 1211190 1218126 1218186 1218209 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 ----------------------------------------------------------------- The container suse/git was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - container:micro-image-15.5.0-15.1 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:08:09 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:08:09 +0100 (CET) Subject: SUSE-CU-2024:253-1: Security update of bci/golang Message-ID: <20240119080809.589E7FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:253-1 Container Tags : bci/golang:1.20 , bci/golang:1.20-2.7.4 , bci/golang:oldstable , bci/golang:oldstable-2.7.4 Container Release : 7.4 Severity : important Type : security References : 1206346 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:142-1 Released: Thu Jan 18 11:40:23 2024 Summary: Recommended update for go1.20 Type: recommended Severity: moderate References: 1206346 This update for go1.20 fixes the following issues: - Update to version go1.20.13 (bsc#1206346) The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - go1.20-doc-1.20.13-150000.1.38.1 updated - go1.20-1.20.13-150000.1.38.1 updated - go1.20-race-1.20.13-150000.1.38.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:08:19 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:08:19 +0100 (CET) Subject: SUSE-CU-2024:254-1: Security update of bci/golang Message-ID: <20240119080819.3C0DEFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:254-1 Container Tags : bci/golang:1.20-openssl , bci/golang:1.20-openssl-11.4 , bci/golang:oldstable-openssl , bci/golang:oldstable-openssl-11.4 Container Release : 11.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:08:35 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:08:35 +0100 (CET) Subject: SUSE-CU-2024:255-1: Security update of bci/golang Message-ID: <20240119080835.C4E09FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:255-1 Container Tags : bci/golang:1.21 , bci/golang:1.21-1.7.4 , bci/golang:latest , bci/golang:stable , bci/golang:stable-1.7.4 Container Release : 7.4 Severity : important Type : security References : 1211188 1211190 1212475 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - go1.21-doc-1.21.6-150000.1.21.1 updated - go1.21-1.21.6-150000.1.21.1 updated - go1.21-race-1.21.6-150000.1.21.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:08:45 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:08:45 +0100 (CET) Subject: SUSE-CU-2024:256-1: Security update of bci/golang Message-ID: <20240119080845.2573BFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:256-1 Container Tags : bci/golang:1.21-openssl , bci/golang:1.21-openssl-11.4 , bci/golang:latest , bci/golang:stable-openssl , bci/golang:stable-openssl-11.4 Container Release : 11.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:09:04 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:09:04 +0100 (CET) Subject: SUSE-CU-2024:258-1: Security update of bci/bci-init Message-ID: <20240119080904.C01EDFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-init ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:258-1 Container Tags : bci/bci-init:15.5 , bci/bci-init:15.5.13.4 , bci/bci-init:latest Container Release : 13.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/bci-init was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:09:22 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:09:22 +0100 (CET) Subject: SUSE-CU-2024:261-1: Security update of bci/nodejs Message-ID: <20240119080922.7053FFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:261-1 Container Tags : bci/node:20 , bci/node:20-5.4 , bci/node:latest , bci/nodejs:20 , bci/nodejs:20-5.4 , bci/nodejs:latest Container Release : 5.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:09:45 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:09:45 +0100 (CET) Subject: SUSE-CU-2024:262-1: Security update of bci/openjdk-devel Message-ID: <20240119080945.537B8FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:262-1 Container Tags : bci/openjdk-devel:11 , bci/openjdk-devel:11-13.7 Container Release : 13.7 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:bci-openjdk-11-15.5.11-13.7 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:10:02 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:10:02 +0100 (CET) Subject: SUSE-CU-2024:263-1: Security update of bci/openjdk Message-ID: <20240119081002.5D2BDFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:263-1 Container Tags : bci/openjdk:11 , bci/openjdk:11-13.7 Container Release : 13.7 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:10:19 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:10:19 +0100 (CET) Subject: SUSE-CU-2024:264-1: Security update of bci/openjdk Message-ID: <20240119081019.D6AFAFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:264-1 Container Tags : bci/openjdk:17 , bci/openjdk:17-15.3 , bci/openjdk:latest Container Release : 15.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:10:35 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:10:35 +0100 (CET) Subject: SUSE-CU-2024:265-1: Security update of bci/php-fpm Message-ID: <20240119081035.449C9FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/php-fpm ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:265-1 Container Tags : bci/php-fpm:8 , bci/php-fpm:8-11.3 Container Release : 11.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/php-fpm was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Fri Jan 19 08:10:37 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:10:37 +0100 (CET) Subject: SUSE-CU-2024:266-1: Security update of suse/rmt-mariadb Message-ID: <20240119081037.15B1AFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-mariadb ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:266-1 Container Tags : suse/mariadb:10.6 , suse/mariadb:10.6-17.3 , suse/mariadb:latest , suse/rmt-mariadb:10.6 , suse/rmt-mariadb:10.6-17.3 , suse/rmt-mariadb:latest Container Release : 17.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/rmt-mariadb was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:01:46 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:01:46 +0100 (CET) Subject: SUSE-CU-2024:267-1: Security update of suse/sle-micro/5.5/toolbox Message-ID: <20240120080146.1BDABFD0A@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.5/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:267-1 Container Tags : suse/sle-micro/5.5/toolbox:12.1 , suse/sle-micro/5.5/toolbox:12.1-2.2.138 , suse/sle-micro/5.5/toolbox:latest Container Release : 2.2.138 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle-micro/5.5/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:03:10 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:03:10 +0100 (CET) Subject: SUSE-CU-2024:268-1: Security update of suse/sles12sp5 Message-ID: <20240120080310.22DD5FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sles12sp5 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:268-1 Container Tags : suse/sles12sp5:6.5.556 , suse/sles12sp5:latest Container Release : 6.5.556 Severity : moderate Type : security References : 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sles12sp5 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:137-1 Released: Thu Jan 18 09:55:34 2024 Summary: Security update for pam Type: security Severity: moderate References: 1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). The following package changes have been done: - pam-1.1.8-24.56.1 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:03:33 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:03:33 +0100 (CET) Subject: SUSE-CU-2024:269-1: Recommended update of suse/ltss/sle15.3/sle15 Message-ID: <20240120080333.D2EFAFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.3/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:269-1 Container Tags : suse/ltss/sle15.3/bci-base:15.3 , suse/ltss/sle15.3/bci-base:15.3.3.43 , suse/ltss/sle15.3/sle15:15.3 , suse/ltss/sle15.3/sle15:15.3.3.43 Container Release : 3.43 Severity : important Type : recommended References : 1207987 ----------------------------------------------------------------- The container suse/ltss/sle15.3/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:164-1 Released: Fri Jan 19 05:47:58 2024 Summary: Recommended update for util-linux Type: recommended Severity: important References: 1207987 This update for util-linux fixes the following issues: - Instead of explicitly truncating clocks.txt file, pad with whitespaces in the end of file. This is done to improve performance of libuuid on xfs. (bsc#1207987) The following package changes have been done: - libblkid1-2.36.2-150300.4.38.1 updated - libfdisk1-2.36.2-150300.4.38.1 updated - libmount1-2.36.2-150300.4.38.1 updated - libsmartcols1-2.36.2-150300.4.38.1 updated - libuuid1-2.36.2-150300.4.38.1 updated - util-linux-2.36.2-150300.4.38.1 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:03:50 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:03:50 +0100 (CET) Subject: SUSE-CU-2024:270-1: Security update of suse/registry Message-ID: <20240120080350.2BCBEFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/registry ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:270-1 Container Tags : suse/registry:2.8 , suse/registry:2.8-18.4 , suse/registry:latest Container Release : 18.4 Severity : moderate Type : security References : 1217000 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/registry was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) The following package changes have been done: - pam-1.3.0-150000.6.66.1 updated - container:micro-image-15.5.0-15.1 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:04:02 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:04:02 +0100 (CET) Subject: SUSE-CU-2024:271-1: Security update of suse/nginx Message-ID: <20240120080402.9496DFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/nginx ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:271-1 Container Tags : suse/nginx:1.21 , suse/nginx:1.21-9.4 , suse/nginx:latest Container Release : 9.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/nginx was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:04:20 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:04:20 +0100 (CET) Subject: SUSE-CU-2024:272-1: Security update of bci/nodejs Message-ID: <20240120080420.92A67FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:272-1 Container Tags : bci/node:18 , bci/node:18-15.4 , bci/nodejs:18 , bci/nodejs:18-15.4 Container Release : 15.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:05:04 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:05:04 +0100 (CET) Subject: SUSE-CU-2024:274-1: Security update of bci/openjdk-devel Message-ID: <20240120080504.9D9BEFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:274-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-15.10 , bci/openjdk-devel:latest Container Release : 15.10 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - google-guice-5.1.0-150200.3.7.1 updated - container:bci-openjdk-17-15.5.17-15.3 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:05:27 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:05:27 +0100 (CET) Subject: SUSE-CU-2024:275-1: Security update of suse/pcp Message-ID: <20240120080527.09263FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/pcp ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:275-1 Container Tags : suse/pcp:5 , suse/pcp:5-21.5 , suse/pcp:5.2 , suse/pcp:5.2-21.5 , suse/pcp:5.2.5 , suse/pcp:5.2.5-21.5 , suse/pcp:latest Container Release : 21.5 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/pcp was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:bci-bci-init-15.5-15.5-13.4 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:05:45 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:05:45 +0100 (CET) Subject: SUSE-CU-2024:276-1: Security update of bci/php-apache Message-ID: <20240120080545.25B9BFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/php-apache ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:276-1 Container Tags : bci/php-apache:8 , bci/php-apache:8-11.3 Container Release : 11.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/php-apache was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:06:01 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:01 +0100 (CET) Subject: SUSE-CU-2024:277-1: Security update of bci/php Message-ID: <20240120080601.F2419FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/php ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:277-1 Container Tags : bci/php:8 , bci/php:8-11.3 Container Release : 11.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/php was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:06:17 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:17 +0100 (CET) Subject: SUSE-CU-2024:278-1: Security update of suse/postgres Message-ID: <20240120080617.3B0FFFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:278-1 Container Tags : suse/postgres:15 , suse/postgres:15-16.3 , suse/postgres:15.5 , suse/postgres:15.5-16.3 Container Release : 16.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:06:21 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:21 +0100 (CET) Subject: SUSE-CU-2024:279-1: Security update of suse/postgres Message-ID: <20240120080621.8FC6BFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:279-1 Container Tags : suse/postgres:16 , suse/postgres:16-5.3 , suse/postgres:16.1 , suse/postgres:16.1-5.3 , suse/postgres:latest Container Release : 5.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:06:38 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:38 +0100 (CET) Subject: SUSE-CU-2024:280-1: Security update of bci/python Message-ID: <20240120080638.63D44FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:280-1 Container Tags : bci/python:3 , bci/python:3-16.3 , bci/python:3.11 , bci/python:3.11-16.3 , bci/python:latest Container Release : 16.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:06:59 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:59 +0100 (CET) Subject: SUSE-CU-2024:281-1: Security update of bci/python Message-ID: <20240120080659.611E7FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:281-1 Container Tags : bci/python:3 , bci/python:3-17.3 , bci/python:3.6 , bci/python:3.6-17.3 Container Release : 17.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:07:01 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:07:01 +0100 (CET) Subject: SUSE-CU-2024:282-1: Security update of suse/rmt-mariadb-client Message-ID: <20240120080701.26852FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-mariadb-client ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:282-1 Container Tags : suse/mariadb-client:10.6 , suse/mariadb-client:10.6-14.3 , suse/mariadb-client:latest , suse/rmt-mariadb-client:10.6 , suse/rmt-mariadb-client:10.6-14.3 , suse/rmt-mariadb-client:latest Container Release : 14.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/rmt-mariadb-client was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:07:03 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:07:03 +0100 (CET) Subject: SUSE-CU-2024:266-1: Security update of suse/rmt-mariadb Message-ID: <20240120080703.C78F8FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-mariadb ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:266-1 Container Tags : suse/mariadb:10.6 , suse/mariadb:10.6-17.3 , suse/mariadb:latest , suse/rmt-mariadb:10.6 , suse/rmt-mariadb:10.6-17.3 , suse/rmt-mariadb:latest Container Release : 17.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/rmt-mariadb was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:07:26 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:07:26 +0100 (CET) Subject: SUSE-CU-2024:283-1: Security update of bci/ruby Message-ID: <20240120080726.C6A2EFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/ruby ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:283-1 Container Tags : bci/ruby:2 , bci/ruby:2-15.3 , bci/ruby:2.5 , bci/ruby:2.5-15.3 , bci/ruby:latest Container Release : 15.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/ruby was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:07:44 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:07:44 +0100 (CET) Subject: SUSE-CU-2024:284-1: Security update of bci/rust Message-ID: <20240120080744.98B37FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:284-1 Container Tags : bci/rust:1.74 , bci/rust:1.74-2.3.3 , bci/rust:oldstable , bci/rust:oldstable-2.3.3 Container Release : 3.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:08:03 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:08:03 +0100 (CET) Subject: SUSE-CU-2024:285-1: Security update of bci/rust Message-ID: <20240120080803.14E90FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:285-1 Container Tags : bci/rust:1.75 , bci/rust:1.75-1.3.3 , bci/rust:latest , bci/rust:stable , bci/rust:stable-1.3.3 Container Release : 3.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:08:06 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:08:06 +0100 (CET) Subject: SUSE-CU-2024:286-1: Security update of bci/bci-sle15-kernel-module-devel Message-ID: <20240120080806.0F260FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:286-1 Container Tags : bci/bci-sle15-kernel-module-devel:15.5 , bci/bci-sle15-kernel-module-devel:15.5.5.4 , bci/bci-sle15-kernel-module-devel:latest Container Release : 5.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - kernel-macros-5.14.21-150500.55.44.1 updated - kernel-devel-5.14.21-150500.55.44.1 updated - kernel-default-devel-5.14.21-150500.55.44.1 updated - kernel-syms-5.14.21-150500.55.44.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-container-updates at lists.suse.com Sat Jan 20 08:08:21 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:08:21 +0100 (CET) Subject: SUSE-CU-2024:287-1: Security update of suse/sle15 Message-ID: <20240120080821.7DE73FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:287-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.74 , suse/sle15:15.5 , suse/sle15:15.5.36.5.74 Container Release : 36.5.74 Severity : important Type : security References : 1211188 1211190 1212475 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-container-updates at lists.suse.com Sun Jan 21 08:03:51 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 21 Jan 2024 09:03:51 +0100 (CET) Subject: SUSE-CU-2024:288-1: Security update of suse/sle15 Message-ID: <20240121080351.918E4FD0A@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:288-1 Container Tags : suse/sle15:15.1 , suse/sle15:15.1.6.2.866 Container Release : 6.2.866 Severity : moderate Type : security References : 1212475 1217000 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-container-updates at lists.suse.com Sun Jan 21 08:05:28 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 21 Jan 2024 09:05:28 +0100 (CET) Subject: SUSE-CU-2024:289-1: Security update of suse/sle15 Message-ID: <20240121080528.4A062FD0A@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:289-1 Container Tags : suse/sle15:15.2 , suse/sle15:15.2.9.5.395 Container Release : 9.5.395 Severity : moderate Type : security References : 1212475 1217000 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-container-updates at lists.suse.com Sun Jan 21 08:05:52 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 21 Jan 2024 09:05:52 +0100 (CET) Subject: SUSE-CU-2024:287-1: Security update of suse/sle15 Message-ID: <20240121080552.5039CFD0A@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:287-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.74 , suse/sle15:15.5 , suse/sle15:15.5.36.5.74 Container Release : 36.5.74 Severity : important Type : security References : 1211188 1211190 1212475 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-container-updates at lists.suse.com Sun Jan 21 08:07:37 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 21 Jan 2024 09:07:37 +0100 (CET) Subject: SUSE-CU-2024:295-1: Recommended update of suse/sle-micro/5.1/toolbox Message-ID: <20240121080737.D8B27FD0A@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.1/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:295-1 Container Tags : suse/sle-micro/5.1/toolbox:12.1 , suse/sle-micro/5.1/toolbox:12.1-2.2.530 , suse/sle-micro/5.1/toolbox:latest Container Release : 2.2.530 Severity : important Type : recommended References : 1207987 ----------------------------------------------------------------- The container suse/sle-micro/5.1/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:164-1 Released: Fri Jan 19 05:47:58 2024 Summary: Recommended update for util-linux Type: recommended Severity: important References: 1207987 This update for util-linux fixes the following issues: - Instead of explicitly truncating clocks.txt file, pad with whitespaces in the end of file. This is done to improve performance of libuuid on xfs. (bsc#1207987) The following package changes have been done: - util-linux-systemd-2.36.2-150300.4.38.1 updated From sle-container-updates at lists.suse.com Sun Jan 21 08:09:32 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 21 Jan 2024 09:09:32 +0100 (CET) Subject: SUSE-CU-2024:298-1: Recommended update of suse/sle-micro/5.2/toolbox Message-ID: <20240121080932.B4240FD0A@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.2/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:298-1 Container Tags : suse/sle-micro/5.2/toolbox:12.1 , suse/sle-micro/5.2/toolbox:12.1-6.2.352 , suse/sle-micro/5.2/toolbox:latest Container Release : 6.2.352 Severity : important Type : recommended References : 1207987 ----------------------------------------------------------------- The container suse/sle-micro/5.2/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:164-1 Released: Fri Jan 19 05:47:58 2024 Summary: Recommended update for util-linux Type: recommended Severity: important References: 1207987 This update for util-linux fixes the following issues: - Instead of explicitly truncating clocks.txt file, pad with whitespaces in the end of file. This is done to improve performance of libuuid on xfs. (bsc#1207987) The following package changes have been done: - util-linux-systemd-2.36.2-150300.4.38.1 updated From sle-container-updates at lists.suse.com Tue Jan 23 08:03:03 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Tue, 23 Jan 2024 09:03:03 +0100 (CET) Subject: SUSE-CU-2024:299-1: Recommended update of suse/sles12sp5 Message-ID: <20240123080303.12B77FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sles12sp5 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:299-1 Container Tags : suse/sles12sp5:6.5.557 , suse/sles12sp5:latest Container Release : 6.5.557 Severity : important Type : recommended References : 1216685 ----------------------------------------------------------------- The container suse/sles12sp5 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:171-1 Released: Mon Jan 22 15:19:39 2024 Summary: Recommended update for ca-certificates Type: recommended Severity: important References: 1216685 This update for ca-certificates fixes the following issues: - Invoke trust with the --overwrite option when running update-ca-certificates (bsc#1216685) The following package changes have been done: - ca-certificates-1_201403302107-15.9.1 updated From sle-container-updates at lists.suse.com Wed Jan 24 08:03:04 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 24 Jan 2024 09:03:04 +0100 (CET) Subject: SUSE-CU-2024:301-1: Recommended update of suse/sles12sp5 Message-ID: <20240124080304.01E2AFE84@maintenance.suse.de> SUSE Container Update Advisory: suse/sles12sp5 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:301-1 Container Tags : suse/sles12sp5:6.5.558 , suse/sles12sp5:latest Container Release : 6.5.558 Severity : moderate Type : recommended References : 1211576 1211725 1212207 1215241 ----------------------------------------------------------------- The container suse/sles12sp5 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:181-1 Released: Tue Jan 23 11:28:17 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1211576,1211725,1212207,1215241 This update for systemd fixes the following issues: - man: document that PAMName= and NotifyAccess=all don't mix well - man: add brief documentation for the (sd-pam) processes created due to PAMName= - service: accept the fact that the three xyz_good() functions return ints - service: drop _pure_ decorator on static function - service: a cgroup empty notification isn't reason enough to go down (bsc#1212207) - service: add explanatory comments to control_pid_good() and cgroup_good() - service: fix main_pid_good() comment - utmp-wtmp: handle EINTR gracefully when waiting to write to tty - utmp-wtmp: fix error in case isatty() fails - sd-netlink: handle EINTR from poll() gracefully, as success - stdio-bridge: don't be bothered with EINTR - sd-bus: handle -EINTR return from bus_poll() (bsc#1215241) - libsystemd: ignore both EINTR and EAGAIN - errno-util: introduce ERRNO_IS_TRANSIENT() - man/systemd-fsck at .service: clarify passno and noauto combination in /etc/fstab (bsc#1211725) - units/initrd-parse-etc.service: Conflict with emergency.target - umount: /usr/ should never be unmounted regardless of HAVE_SPLIT_USR or not (bsc#1211576) - core/mount: Don't unmount initramfs mounts - man: describe that changing Storage= does not move existing data The following package changes have been done: - libsystemd0-228-157.57.1 updated - libudev1-228-157.57.1 updated From sle-container-updates at lists.suse.com Wed Jan 24 08:04:24 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 24 Jan 2024 09:04:24 +0100 (CET) Subject: SUSE-CU-2024:304-1: Recommended update of suse/manager/4.3/proxy-httpd Message-ID: <20240124080424.C6ED2FE84@maintenance.suse.de> SUSE Container Update Advisory: suse/manager/4.3/proxy-httpd ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:304-1 Container Tags : suse/manager/4.3/proxy-httpd:4.3.10 , suse/manager/4.3/proxy-httpd:4.3.10.9.43.19 , suse/manager/4.3/proxy-httpd:latest , suse/manager/4.3/proxy-httpd:susemanager-4.3.10 , suse/manager/4.3/proxy-httpd:susemanager-4.3.10.9.43.19 Container Release : 9.43.19 Severity : moderate Type : recommended References : 1218765 ----------------------------------------------------------------- The container suse/manager/4.3/proxy-httpd was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:187-1 Released: Tue Jan 23 13:38:00 2024 Summary: Recommended update for python-chardet Type: recommended Severity: moderate References: 1218765 This update for python-chardet fixes the following issues: - Fix update-alternative in %postun (bsc#1218765) The following package changes have been done: - python3-chardet-3.0.4-150000.5.3.1 updated From sle-container-updates at lists.suse.com Wed Jan 24 08:04:36 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 24 Jan 2024 09:04:36 +0100 (CET) Subject: SUSE-CU-2024:305-1: Recommended update of suse/manager/4.3/proxy-tftpd Message-ID: <20240124080436.1EB02FE84@maintenance.suse.de> SUSE Container Update Advisory: suse/manager/4.3/proxy-tftpd ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:305-1 Container Tags : suse/manager/4.3/proxy-tftpd:4.3.10 , suse/manager/4.3/proxy-tftpd:4.3.10.9.33.16 , suse/manager/4.3/proxy-tftpd:latest , suse/manager/4.3/proxy-tftpd:susemanager-4.3.10 , suse/manager/4.3/proxy-tftpd:susemanager-4.3.10.9.33.16 Container Release : 9.33.16 Severity : moderate Type : recommended References : 1218765 ----------------------------------------------------------------- The container suse/manager/4.3/proxy-tftpd was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:187-1 Released: Tue Jan 23 13:38:00 2024 Summary: Recommended update for python-chardet Type: recommended Severity: moderate References: 1218765 This update for python-chardet fixes the following issues: - Fix update-alternative in %postun (bsc#1218765) The following package changes have been done: - python3-chardet-3.0.4-150000.5.3.1 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:02:12 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:02:12 +0100 (CET) Subject: SUSE-CU-2024:311-1: Recommended update of suse/sle-micro/5.5/toolbox Message-ID: <20240125080212.6FD0BFE84@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.5/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:311-1 Container Tags : suse/sle-micro/5.5/toolbox:12.1 , suse/sle-micro/5.5/toolbox:12.1-2.2.140 , suse/sle-micro/5.5/toolbox:latest Container Release : 2.2.140 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container suse/sle-micro/5.5/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - systemd-249.17-150400.8.40.1 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:02:39 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:02:39 +0100 (CET) Subject: SUSE-CU-2024:312-1: Recommended update of suse/ltss/sle15.4/sle15 Message-ID: <20240125080239.E18B4FE84@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.4/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:312-1 Container Tags : suse/ltss/sle15.4/bci-base:15.4 , suse/ltss/sle15.4/bci-base:15.4.2.9 , suse/ltss/sle15.4/sle15:15.4 , suse/ltss/sle15.4/sle15:15.4.2.9 Container Release : 2.9 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container suse/ltss/sle15.4/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - libudev1-249.17-150400.8.40.1 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:03:03 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:03:03 +0100 (CET) Subject: SUSE-CU-2024:313-1: Recommended update of bci/dotnet-aspnet Message-ID: <20240125080303.AB3A5FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:313-1 Container Tags : bci/dotnet-aspnet:6.0 , bci/dotnet-aspnet:6.0-21.7 , bci/dotnet-aspnet:6.0.26 , bci/dotnet-aspnet:6.0.26-21.7 Container Release : 21.7 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:03:25 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:03:25 +0100 (CET) Subject: SUSE-CU-2024:314-1: Recommended update of bci/dotnet-aspnet Message-ID: <20240125080325.13530FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:314-1 Container Tags : bci/dotnet-aspnet:7.0 , bci/dotnet-aspnet:7.0-21.7 , bci/dotnet-aspnet:7.0.15 , bci/dotnet-aspnet:7.0.15-21.7 Container Release : 21.7 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:03:48 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:03:48 +0100 (CET) Subject: SUSE-CU-2024:316-1: Recommended update of bci/dotnet-sdk Message-ID: <20240125080348.E3E81FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:316-1 Container Tags : bci/dotnet-sdk:6.0 , bci/dotnet-sdk:6.0-20.7 , bci/dotnet-sdk:6.0.26 , bci/dotnet-sdk:6.0.26-20.7 Container Release : 20.7 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:04:14 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:04:14 +0100 (CET) Subject: SUSE-CU-2024:317-1: Recommended update of bci/dotnet-sdk Message-ID: <20240125080414.EC19BFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:317-1 Container Tags : bci/dotnet-sdk:7.0 , bci/dotnet-sdk:7.0-22.7 , bci/dotnet-sdk:7.0.15 , bci/dotnet-sdk:7.0.15-22.7 Container Release : 22.7 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:04:35 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:04:35 +0100 (CET) Subject: SUSE-CU-2024:318-1: Recommended update of bci/dotnet-runtime Message-ID: <20240125080435.0B76FFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:318-1 Container Tags : bci/dotnet-runtime:7.0 , bci/dotnet-runtime:7.0-22.7 , bci/dotnet-runtime:7.0.15 , bci/dotnet-runtime:7.0.15-22.7 Container Release : 22.7 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:04:45 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:04:45 +0100 (CET) Subject: SUSE-CU-2024:319-1: Recommended update of bci/golang Message-ID: <20240125080445.EEC4DFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:319-1 Container Tags : bci/golang:1.20-openssl , bci/golang:1.20-openssl-11.7 , bci/golang:oldstable-openssl , bci/golang:oldstable-openssl-11.7 Container Release : 11.7 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:05:06 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:05:06 +0100 (CET) Subject: SUSE-CU-2024:320-1: Recommended update of bci/bci-init Message-ID: <20240125080506.1E0A5FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-init ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:320-1 Container Tags : bci/bci-init:15.5 , bci/bci-init:15.5.13.7 , bci/bci-init:latest Container Release : 13.7 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/bci-init was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libudev1-249.17-150400.8.40.1 updated - libsystemd0-249.17-150400.8.40.1 updated - systemd-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:05:22 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:05:22 +0100 (CET) Subject: SUSE-CU-2024:321-1: Recommended update of suse/nginx Message-ID: <20240125080522.A3829FE84@maintenance.suse.de> SUSE Container Update Advisory: suse/nginx ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:321-1 Container Tags : suse/nginx:1.21 , suse/nginx:1.21-9.7 , suse/nginx:latest Container Release : 9.7 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container suse/nginx was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:05:28 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:05:28 +0100 (CET) Subject: SUSE-CU-2024:322-1: Recommended update of bci/nodejs Message-ID: <20240125080528.DBE0AFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:322-1 Container Tags : bci/node:20 , bci/node:20-5.7 , bci/node:latest , bci/nodejs:20 , bci/nodejs:20-5.7 , bci/nodejs:latest Container Release : 5.7 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:05:47 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:05:47 +0100 (CET) Subject: SUSE-CU-2024:323-1: Recommended update of bci/php-apache Message-ID: <20240125080547.6644DFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/php-apache ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:323-1 Container Tags : bci/php-apache:8 , bci/php-apache:8-11.6 Container Release : 11.6 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/php-apache was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:06:06 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:06:06 +0100 (CET) Subject: SUSE-CU-2024:324-1: Recommended update of suse/postgres Message-ID: <20240125080606.455C7FE84@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:324-1 Container Tags : suse/postgres:15 , suse/postgres:15-16.6 , suse/postgres:15.5 , suse/postgres:15.5-16.6 Container Release : 16.6 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:06:10 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:06:10 +0100 (CET) Subject: SUSE-CU-2024:325-1: Recommended update of suse/postgres Message-ID: <20240125080610.F15CCFE84@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:325-1 Container Tags : suse/postgres:16 , suse/postgres:16-5.6 , suse/postgres:16.1 , suse/postgres:16.1-5.6 , suse/postgres:latest Container Release : 5.6 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:06:12 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:06:12 +0100 (CET) Subject: SUSE-CU-2024:326-1: Recommended update of suse/rmt-mariadb-client Message-ID: <20240125080612.C383AFE84@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-mariadb-client ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:326-1 Container Tags : suse/mariadb-client:10.6 , suse/mariadb-client:10.6-14.6 , suse/mariadb-client:latest , suse/rmt-mariadb-client:10.6 , suse/rmt-mariadb-client:10.6-14.6 , suse/rmt-mariadb-client:latest Container Release : 14.6 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container suse/rmt-mariadb-client was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:06:30 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:06:30 +0100 (CET) Subject: SUSE-CU-2024:327-1: Recommended update of bci/rust Message-ID: <20240125080630.D5D8CFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:327-1 Container Tags : bci/rust:1.74 , bci/rust:1.74-2.3.6 , bci/rust:oldstable , bci/rust:oldstable-2.3.6 Container Release : 3.6 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 08:06:47 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 09:06:47 +0100 (CET) Subject: SUSE-CU-2024:328-1: Recommended update of suse/manager/4.3/proxy-httpd Message-ID: <20240125080647.D61CAFE84@maintenance.suse.de> SUSE Container Update Advisory: suse/manager/4.3/proxy-httpd ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:328-1 Container Tags : suse/manager/4.3/proxy-httpd:4.3.10 , suse/manager/4.3/proxy-httpd:4.3.10.9.43.20 , suse/manager/4.3/proxy-httpd:latest , suse/manager/4.3/proxy-httpd:susemanager-4.3.10 , suse/manager/4.3/proxy-httpd:susemanager-4.3.10.9.43.20 Container Release : 9.43.20 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container suse/manager/4.3/proxy-httpd was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - systemd-249.17-150400.8.40.1 updated From sle-container-updates at lists.suse.com Thu Jan 25 10:26:48 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 11:26:48 +0100 (CET) Subject: SUSE-CU-2024:331-1: Recommended update of suse/389-ds Message-ID: <20240125102648.C9EF5FE85@maintenance.suse.de> SUSE Container Update Advisory: suse/389-ds ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:331-1 Container Tags : suse/389-ds:2.2 , suse/389-ds:2.2-19.8 , suse/389-ds:latest Container Release : 19.8 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container suse/389-ds was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 10:27:16 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 11:27:16 +0100 (CET) Subject: SUSE-CU-2024:332-1: Recommended update of bci/openjdk-devel Message-ID: <20240125102716.05FD9FE85@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:332-1 Container Tags : bci/openjdk-devel:11 , bci/openjdk-devel:11-13.15 Container Release : 13.15 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:bci-openjdk-11-15.5.11-14.4 updated From sle-container-updates at lists.suse.com Thu Jan 25 10:27:41 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 11:27:41 +0100 (CET) Subject: SUSE-CU-2024:333-1: Recommended update of bci/openjdk-devel Message-ID: <20240125102741.34F10FE85@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:333-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-15.16 , bci/openjdk-devel:latest Container Release : 15.16 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:bci-openjdk-17-15.5.17-15.6 updated From sle-container-updates at lists.suse.com Thu Jan 25 10:28:02 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 11:28:02 +0100 (CET) Subject: SUSE-CU-2024:334-1: Recommended update of bci/openjdk Message-ID: <20240125102802.BE090FE85@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:334-1 Container Tags : bci/openjdk:17 , bci/openjdk:17-15.6 , bci/openjdk:latest Container Release : 15.6 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 10:28:31 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 11:28:31 +0100 (CET) Subject: SUSE-CU-2024:335-1: Recommended update of suse/pcp Message-ID: <20240125102831.146E9FE85@maintenance.suse.de> SUSE Container Update Advisory: suse/pcp ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:335-1 Container Tags : suse/pcp:5 , suse/pcp:5-21.11 , suse/pcp:5.2 , suse/pcp:5.2-21.11 , suse/pcp:5.2.5 , suse/pcp:5.2.5-21.11 , suse/pcp:latest Container Release : 21.11 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container suse/pcp was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libudev1-249.17-150400.8.40.1 updated - libsystemd0-249.17-150400.8.40.1 updated - systemd-249.17-150400.8.40.1 updated - container:bci-bci-init-15.5-15.5-13.7 updated From sle-container-updates at lists.suse.com Thu Jan 25 10:28:52 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 11:28:52 +0100 (CET) Subject: SUSE-CU-2024:336-1: Recommended update of bci/php-fpm Message-ID: <20240125102852.199F1FE85@maintenance.suse.de> SUSE Container Update Advisory: bci/php-fpm ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:336-1 Container Tags : bci/php-fpm:8 , bci/php-fpm:8-11.6 Container Release : 11.6 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/php-fpm was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 10:29:13 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 11:29:13 +0100 (CET) Subject: SUSE-CU-2024:337-1: Recommended update of bci/python Message-ID: <20240125102913.C3AA3FE85@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:337-1 Container Tags : bci/python:3 , bci/python:3-16.6 , bci/python:3.11 , bci/python:3.11-16.6 , bci/python:latest Container Release : 16.6 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 10:29:34 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 11:29:34 +0100 (CET) Subject: SUSE-CU-2024:338-1: Recommended update of bci/python Message-ID: <20240125102934.61745FE85@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:338-1 Container Tags : bci/python:3 , bci/python:3-17.6 , bci/python:3.6 , bci/python:3.6-17.6 Container Release : 17.6 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 10:29:37 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 11:29:37 +0100 (CET) Subject: SUSE-CU-2024:339-1: Recommended update of suse/rmt-mariadb Message-ID: <20240125102937.05AFBFE85@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-mariadb ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:339-1 Container Tags : suse/mariadb:10.6 , suse/mariadb:10.6-17.6 , suse/mariadb:latest , suse/rmt-mariadb:10.6 , suse/rmt-mariadb:10.6-17.6 , suse/rmt-mariadb:latest Container Release : 17.6 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container suse/rmt-mariadb was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 10:29:46 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 11:29:46 +0100 (CET) Subject: SUSE-CU-2024:340-1: Security update of suse/rmt-server Message-ID: <20240125102946.6B432FE85@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-server ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:340-1 Container Tags : suse/rmt-server:2.14 , suse/rmt-server:2.14-14.6 , suse/rmt-server:latest Container Release : 14.6 Severity : important Type : security References : 1211188 1211190 1214668 1215241 1217000 1217460 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/rmt-server was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libudev1-249.17-150400.8.40.1 updated - libsystemd0-249.17-150400.8.40.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 10:30:08 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 11:30:08 +0100 (CET) Subject: SUSE-CU-2024:341-1: Recommended update of bci/ruby Message-ID: <20240125103008.23F14FE85@maintenance.suse.de> SUSE Container Update Advisory: bci/ruby ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:341-1 Container Tags : bci/ruby:2 , bci/ruby:2-15.6 , bci/ruby:2.5 , bci/ruby:2.5-15.6 , bci/ruby:latest Container Release : 15.6 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/ruby was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Thu Jan 25 10:30:30 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Thu, 25 Jan 2024 11:30:30 +0100 (CET) Subject: SUSE-CU-2024:342-1: Recommended update of bci/rust Message-ID: <20240125103030.52A88FE85@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:342-1 Container Tags : bci/rust:1.75 , bci/rust:1.75-1.3.6 , bci/rust:latest , bci/rust:stable , bci/rust:stable-1.3.6 Container Release : 3.6 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Fri Jan 26 08:03:25 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 26 Jan 2024 09:03:25 +0100 (CET) Subject: SUSE-CU-2024:344-1: Recommended update of suse/sle-micro/5.3/toolbox Message-ID: <20240126080325.EB8FCFE84@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.3/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:344-1 Container Tags : suse/sle-micro/5.3/toolbox:12.1 , suse/sle-micro/5.3/toolbox:12.1-5.2.294 , suse/sle-micro/5.3/toolbox:latest Container Release : 5.2.294 Severity : moderate Type : recommended References : 1214668 1215241 1217460 1217775 ----------------------------------------------------------------- The container suse/sle-micro/5.3/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:233-1 Released: Thu Jan 25 11:58:47 2024 Summary: Recommended update for suse-module-tools Type: recommended Severity: moderate References: 1217775 This update for suse-module-tools fixes the following issues: - Update to version 15.4.19 - Add symlink /boot/.vmlinuz.hmac (bsc#1217775) The following package changes have been done: - suse-module-tools-15.4.19-150400.3.17.1 updated - systemd-249.17-150400.8.40.1 updated From sle-container-updates at lists.suse.com Fri Jan 26 08:04:57 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 26 Jan 2024 09:04:57 +0100 (CET) Subject: SUSE-CU-2024:346-1: Recommended update of suse/sle-micro/5.4/toolbox Message-ID: <20240126080457.D6D2BFE84@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.4/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:346-1 Container Tags : suse/sle-micro/5.4/toolbox:12.1 , suse/sle-micro/5.4/toolbox:12.1-4.2.192 , suse/sle-micro/5.4/toolbox:latest Container Release : 4.2.192 Severity : moderate Type : recommended References : 1214668 1215241 1217460 1217775 ----------------------------------------------------------------- The container suse/sle-micro/5.4/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:233-1 Released: Thu Jan 25 11:58:47 2024 Summary: Recommended update for suse-module-tools Type: recommended Severity: moderate References: 1217775 This update for suse-module-tools fixes the following issues: - Update to version 15.4.19 - Add symlink /boot/.vmlinuz.hmac (bsc#1217775) The following package changes have been done: - suse-module-tools-15.4.19-150400.3.17.1 updated - systemd-249.17-150400.8.40.1 updated From sle-container-updates at lists.suse.com Fri Jan 26 08:06:10 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 26 Jan 2024 09:06:10 +0100 (CET) Subject: SUSE-CU-2024:349-1: Recommended update of bci/dotnet-runtime Message-ID: <20240126080610.DDBB3FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:349-1 Container Tags : bci/dotnet-runtime:6.0 , bci/dotnet-runtime:6.0-20.7 , bci/dotnet-runtime:6.0.26 , bci/dotnet-runtime:6.0.26-20.7 Container Release : 20.7 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Fri Jan 26 08:06:28 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 26 Jan 2024 09:06:28 +0100 (CET) Subject: SUSE-CU-2024:350-1: Recommended update of bci/golang Message-ID: <20240126080628.4A6AFFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:350-1 Container Tags : bci/golang:1.21 , bci/golang:1.21-1.7.7 , bci/golang:latest , bci/golang:stable , bci/golang:stable-1.7.7 Container Release : 7.7 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Fri Jan 26 08:06:38 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 26 Jan 2024 09:06:38 +0100 (CET) Subject: SUSE-CU-2024:351-1: Recommended update of bci/golang Message-ID: <20240126080638.BF56CFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:351-1 Container Tags : bci/golang:1.21-openssl , bci/golang:1.21-openssl-11.7 , bci/golang:latest , bci/golang:stable-openssl , bci/golang:stable-openssl-11.7 Container Release : 11.7 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Fri Jan 26 08:06:57 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 26 Jan 2024 09:06:57 +0100 (CET) Subject: SUSE-CU-2024:352-1: Recommended update of bci/nodejs Message-ID: <20240126080657.555D6FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:352-1 Container Tags : bci/node:18 , bci/node:18-15.7 , bci/nodejs:18 , bci/nodejs:18-15.7 Container Release : 15.7 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Fri Jan 26 08:07:15 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 26 Jan 2024 09:07:15 +0100 (CET) Subject: SUSE-CU-2024:353-1: Recommended update of bci/openjdk Message-ID: <20240126080715.59784FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:353-1 Container Tags : bci/openjdk:11 , bci/openjdk:11-14.4 Container Release : 14.4 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Fri Jan 26 08:07:32 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 26 Jan 2024 09:07:32 +0100 (CET) Subject: SUSE-CU-2024:354-1: Recommended update of bci/php Message-ID: <20240126080732.EEC24FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/php ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:354-1 Container Tags : bci/php:8 , bci/php:8-11.6 Container Release : 11.6 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/php was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Fri Jan 26 08:07:36 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 26 Jan 2024 09:07:36 +0100 (CET) Subject: SUSE-CU-2024:355-1: Recommended update of bci/bci-sle15-kernel-module-devel Message-ID: <20240126080736.3E71DFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:355-1 Container Tags : bci/bci-sle15-kernel-module-devel:15.5 , bci/bci-sle15-kernel-module-devel:15.5.5.8 , bci/bci-sle15-kernel-module-devel:latest Container Release : 5.8 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - suse-module-tools-15.5.4-150500.3.9.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Fri Jan 26 08:07:52 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 26 Jan 2024 09:07:52 +0100 (CET) Subject: SUSE-CU-2024:356-1: Recommended update of suse/sle15 Message-ID: <20240126080752.09035FE84@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:356-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.75 , suse/sle15:15.5 , suse/sle15:15.5.36.5.75 Container Release : 36.5.75 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - libudev1-249.17-150400.8.40.1 updated From sle-container-updates at lists.suse.com Fri Jan 26 08:08:34 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 26 Jan 2024 09:08:34 +0100 (CET) Subject: SUSE-CU-2024:357-1: Recommended update of suse/sle-micro/5.1/toolbox Message-ID: <20240126080834.D6FE0FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.1/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:357-1 Container Tags : suse/sle-micro/5.1/toolbox:12.1 , suse/sle-micro/5.1/toolbox:12.1-2.2.532 , suse/sle-micro/5.1/toolbox:latest Container Release : 2.2.532 Severity : moderate Type : recommended References : 1217775 ----------------------------------------------------------------- The container suse/sle-micro/5.1/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:232-1 Released: Thu Jan 25 11:58:05 2024 Summary: Recommended update for suse-module-tools Type: recommended Severity: moderate References: 1217775 This update for suse-module-tools fixes the following issues: - Update to version 15.3.18 - Add symlink /boot/.vmlinuz.hmac (bsc#1217775) The following package changes have been done: - suse-module-tools-15.3.18-150300.3.25.1 updated From sle-container-updates at lists.suse.com Fri Jan 26 08:10:21 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 26 Jan 2024 09:10:21 +0100 (CET) Subject: SUSE-CU-2024:359-1: Recommended update of suse/sle-micro/5.2/toolbox Message-ID: <20240126081021.C342DFE84@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.2/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:359-1 Container Tags : suse/sle-micro/5.2/toolbox:12.1 , suse/sle-micro/5.2/toolbox:12.1-6.2.354 , suse/sle-micro/5.2/toolbox:latest Container Release : 6.2.354 Severity : moderate Type : recommended References : 1217775 ----------------------------------------------------------------- The container suse/sle-micro/5.2/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:232-1 Released: Thu Jan 25 11:58:05 2024 Summary: Recommended update for suse-module-tools Type: recommended Severity: moderate References: 1217775 This update for suse-module-tools fixes the following issues: - Update to version 15.3.18 - Add symlink /boot/.vmlinuz.hmac (bsc#1217775) The following package changes have been done: - suse-module-tools-15.3.18-150300.3.25.1 updated From sle-container-updates at lists.suse.com Fri Jan 26 12:42:15 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 26 Jan 2024 13:42:15 +0100 (CET) Subject: SUSE-CU-2024:361-1: Recommended update of bci/golang Message-ID: <20240126124215.DCC3DFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:361-1 Container Tags : bci/golang:1.20 , bci/golang:1.20-2.7.7 , bci/golang:oldstable , bci/golang:oldstable-2.7.7 Container Release : 7.7 Severity : moderate Type : recommended References : 1214668 1215241 1217460 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:214-1 Released: Wed Jan 24 16:01:31 2024 Summary: Recommended update for systemd Type: recommended Severity: moderate References: 1214668,1215241,1217460 This update for systemd fixes the following issues: - resolved: actually check authenticated flag of SOA transaction - core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive - core: Add trace logging to mount_add_device_dependencies() - core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460) - core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies - core: wrap some long comment - utmp-wtmp: Handle EINTR gracefully when waiting to write to tty - utmp-wtmp: Fix error in case isatty() fails - homed: Handle EINTR gracefully when waiting for device node - resolved: Handle EINTR returned from fd_wait_for_event() better - sd-netlink: Handle EINTR from poll() gracefully, as success - varlink: Handle EINTR gracefully when waiting for EIO via ppoll() - stdio-bridge: Don't be bothered with EINTR - sd-bus: Handle EINTR return from bus_poll() (bsc#1215241) - core: Replace slice dependencies as they get added (bsc#1214668) The following package changes have been done: - libsystemd0-249.17-150400.8.40.1 updated - container:sles15-image-15.0.0-36.5.75 updated From sle-container-updates at lists.suse.com Sat Jan 27 08:03:51 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 27 Jan 2024 09:03:51 +0100 (CET) Subject: SUSE-CU-2024:364-1: Security update of suse/ltss/sle15.4/sle15 Message-ID: <20240127080351.1AC69FE84@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.4/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:364-1 Container Tags : suse/ltss/sle15.4/bci-base:15.4 , suse/ltss/sle15.4/bci-base:15.4.2.11 , suse/ltss/sle15.4/sle15:15.4 , suse/ltss/sle15.4/sle15:15.4.2.11 Container Release : 2.11 Severity : moderate Type : security References : 1207987 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container suse/ltss/sle15.4/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:243-1 Released: Fri Jan 26 13:00:47 2024 Summary: Recommended update for util-linux Type: recommended Severity: moderate References: 1207987 This update for util-linux fixes the following issues: - Fix performance degradation (bsc#1207987) The following package changes have been done: - cpio-2.13-150400.3.3.1 updated - libblkid1-2.37.2-150400.8.23.1 updated - libfdisk1-2.37.2-150400.8.23.1 updated - libmount1-2.37.2-150400.8.23.1 updated - libsmartcols1-2.37.2-150400.8.23.1 updated - libuuid1-2.37.2-150400.8.23.1 updated - util-linux-2.37.2-150400.8.23.1 updated From sle-container-updates at lists.suse.com Sat Jan 27 08:04:07 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 27 Jan 2024 09:04:07 +0100 (CET) Subject: SUSE-CU-2024:365-1: Security update of suse/389-ds Message-ID: <20240127080407.C44D3FE84@maintenance.suse.de> SUSE Container Update Advisory: suse/389-ds ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:365-1 Container Tags : suse/389-ds:2.2 , suse/389-ds:2.2-19.11 , suse/389-ds:latest Container Release : 19.11 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container suse/389-ds was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Sat Jan 27 08:04:24 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 27 Jan 2024 09:04:24 +0100 (CET) Subject: SUSE-CU-2024:366-1: Security update of bci/dotnet-aspnet Message-ID: <20240127080424.54606FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:366-1 Container Tags : bci/dotnet-aspnet:6.0 , bci/dotnet-aspnet:6.0-21.10 , bci/dotnet-aspnet:6.0.26 , bci/dotnet-aspnet:6.0.26-21.10 Container Release : 21.10 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Sat Jan 27 08:04:25 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 27 Jan 2024 09:04:25 +0100 (CET) Subject: SUSE-CU-2024:367-1: Security update of bci/dotnet-aspnet Message-ID: <20240127080425.31AE0FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:367-1 Container Tags : bci/dotnet-aspnet:8.0 , bci/dotnet-aspnet:8.0-3.4 , bci/dotnet-aspnet:8.0.1 , bci/dotnet-aspnet:8.0.1-3.4 , bci/dotnet-aspnet:latest Container Release : 3.4 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Sat Jan 27 08:04:53 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 27 Jan 2024 09:04:53 +0100 (CET) Subject: SUSE-CU-2024:368-1: Security update of bci/dotnet-sdk Message-ID: <20240127080453.5AD4AFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:368-1 Container Tags : bci/dotnet-sdk:6.0 , bci/dotnet-sdk:6.0-20.10 , bci/dotnet-sdk:6.0.26 , bci/dotnet-sdk:6.0.26-20.10 Container Release : 20.10 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Sat Jan 27 08:05:20 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 27 Jan 2024 09:05:20 +0100 (CET) Subject: SUSE-CU-2024:369-1: Security update of bci/dotnet-sdk Message-ID: <20240127080520.E2381FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:369-1 Container Tags : bci/dotnet-sdk:7.0 , bci/dotnet-sdk:7.0-22.10 , bci/dotnet-sdk:7.0.15 , bci/dotnet-sdk:7.0.15-22.10 Container Release : 22.10 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Sat Jan 27 08:05:42 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 27 Jan 2024 09:05:42 +0100 (CET) Subject: SUSE-CU-2024:370-1: Security update of bci/dotnet-runtime Message-ID: <20240127080542.2D467FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:370-1 Container Tags : bci/dotnet-runtime:6.0 , bci/dotnet-runtime:6.0-20.10 , bci/dotnet-runtime:6.0.26 , bci/dotnet-runtime:6.0.26-20.10 Container Release : 20.10 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Sat Jan 27 08:05:58 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 27 Jan 2024 09:05:58 +0100 (CET) Subject: SUSE-CU-2024:371-1: Security update of bci/php-apache Message-ID: <20240127080558.7B875FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/php-apache ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:371-1 Container Tags : bci/php-apache:8 , bci/php-apache:8-11.8 Container Release : 11.8 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/php-apache was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.76 updated From sle-container-updates at lists.suse.com Sat Jan 27 08:06:06 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 27 Jan 2024 09:06:06 +0100 (CET) Subject: SUSE-CU-2024:372-1: Security update of suse/rmt-server Message-ID: <20240127080606.05C86FE84@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-server ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:372-1 Container Tags : suse/rmt-server:2.14 , suse/rmt-server:2.14-14.8 , suse/rmt-server:latest Container Release : 14.8 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container suse/rmt-server was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.76 updated From sle-container-updates at lists.suse.com Sat Jan 27 08:06:21 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 27 Jan 2024 09:06:21 +0100 (CET) Subject: SUSE-CU-2024:373-1: Security update of bci/rust Message-ID: <20240127080621.F2A1FFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:373-1 Container Tags : bci/rust:1.75 , bci/rust:1.75-1.3.8 , bci/rust:latest , bci/rust:stable , bci/rust:stable-1.3.8 Container Release : 3.8 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.76 updated From sle-container-updates at lists.suse.com Sat Jan 27 08:06:35 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sat, 27 Jan 2024 09:06:35 +0100 (CET) Subject: SUSE-CU-2024:374-1: Security update of suse/sle15 Message-ID: <20240127080635.112E9FE84@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:374-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.77 , suse/sle15:15.5 , suse/sle15:15.5.36.5.77 Container Release : 36.5.77 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - cpio-2.13-150400.3.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libuuid1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:02:28 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:02:28 +0100 (CET) Subject: SUSE-CU-2024:380-1: Recommended update of suse/sle-micro/5.3/toolbox Message-ID: <20240128080228.CE96FFE85@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.3/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:380-1 Container Tags : suse/sle-micro/5.3/toolbox:12.1 , suse/sle-micro/5.3/toolbox:12.1-5.2.296 , suse/sle-micro/5.3/toolbox:latest Container Release : 5.2.296 Severity : moderate Type : recommended References : 1207987 ----------------------------------------------------------------- The container suse/sle-micro/5.3/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:243-1 Released: Fri Jan 26 13:00:47 2024 Summary: Recommended update for util-linux Type: recommended Severity: moderate References: 1207987 This update for util-linux fixes the following issues: - Fix performance degradation (bsc#1207987) The following package changes have been done: - util-linux-systemd-2.37.2-150400.8.23.1 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:03:11 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:03:11 +0100 (CET) Subject: SUSE-CU-2024:381-1: Recommended update of suse/sle-micro/5.4/toolbox Message-ID: <20240128080311.44D4BFE85@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.4/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:381-1 Container Tags : suse/sle-micro/5.4/toolbox:12.1 , suse/sle-micro/5.4/toolbox:12.1-4.2.194 , suse/sle-micro/5.4/toolbox:latest Container Release : 4.2.194 Severity : moderate Type : recommended References : 1207987 ----------------------------------------------------------------- The container suse/sle-micro/5.4/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:243-1 Released: Fri Jan 26 13:00:47 2024 Summary: Recommended update for util-linux Type: recommended Severity: moderate References: 1207987 This update for util-linux fixes the following issues: - Fix performance degradation (bsc#1207987) The following package changes have been done: - util-linux-systemd-2.37.2-150400.8.23.1 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:03:32 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:03:32 +0100 (CET) Subject: SUSE-CU-2024:382-1: Security update of suse/sle-micro/5.5/toolbox Message-ID: <20240128080332.45742FE85@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.5/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:382-1 Container Tags : suse/sle-micro/5.5/toolbox:12.1 , suse/sle-micro/5.5/toolbox:12.1-2.2.145 , suse/sle-micro/5.5/toolbox:latest Container Release : 2.2.145 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container suse/sle-micro/5.5/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - cpio-2.13-150400.3.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libuuid1-2.37.4-150500.9.3.1 updated - util-linux-systemd-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:05:48 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:05:48 +0100 (CET) Subject: SUSE-CU-2024:383-1: Security update of suse/sles12sp5 Message-ID: <20240128080548.0EF0CFE85@maintenance.suse.de> SUSE Container Update Advisory: suse/sles12sp5 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:383-1 Container Tags : suse/sles12sp5:6.5.559 , suse/sles12sp5:latest Container Release : 6.5.559 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container suse/sles12sp5 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:248-1 Released: Fri Jan 26 14:09:01 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - cpio-2.11-36.18.1 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:06:56 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:06:56 +0100 (CET) Subject: SUSE-CU-2024:385-1: Security update of bci/golang Message-ID: <20240128080656.47597FE85@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:385-1 Container Tags : bci/golang:1.20 , bci/golang:1.20-2.7.10 , bci/golang:oldstable , bci/golang:oldstable-2.7.10 Container Release : 7.10 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:07:05 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:07:05 +0100 (CET) Subject: SUSE-CU-2024:386-1: Security update of bci/nodejs Message-ID: <20240128080705.55CE7FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:386-1 Container Tags : bci/node:20 , bci/node:20-5.10 , bci/node:latest , bci/nodejs:20 , bci/nodejs:20-5.10 , bci/nodejs:latest Container Release : 5.10 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:07:38 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:07:38 +0100 (CET) Subject: SUSE-CU-2024:387-1: Security update of bci/openjdk-devel Message-ID: <20240128080738.9AFBAFE85@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:387-1 Container Tags : bci/openjdk-devel:11 , bci/openjdk-devel:11-13.20 Container Release : 13.20 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:bci-openjdk-11-15.5.11-14.7 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:08:04 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:08:04 +0100 (CET) Subject: SUSE-CU-2024:388-1: Security update of bci/openjdk Message-ID: <20240128080804.DB3FCFE85@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:388-1 Container Tags : bci/openjdk:11 , bci/openjdk:11-14.7 Container Release : 14.7 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:08:35 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:08:35 +0100 (CET) Subject: SUSE-CU-2024:389-1: Security update of bci/openjdk-devel Message-ID: <20240128080835.606DAFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:389-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-15.24 , bci/openjdk-devel:latest Container Release : 15.24 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:bci-openjdk-17-15.5.17-15.9 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:09:03 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:09:03 +0100 (CET) Subject: SUSE-CU-2024:390-1: Security update of bci/openjdk Message-ID: <20240128080903.4E7ABFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:390-1 Container Tags : bci/openjdk:17 , bci/openjdk:17-15.9 , bci/openjdk:latest Container Release : 15.9 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:09:35 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:09:35 +0100 (CET) Subject: SUSE-CU-2024:391-1: Security update of suse/pcp Message-ID: <20240128080935.E5E3FFE85@maintenance.suse.de> SUSE Container Update Advisory: suse/pcp ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:391-1 Container Tags : suse/pcp:5 , suse/pcp:5-21.16 , suse/pcp:5.2 , suse/pcp:5.2-21.16 , suse/pcp:5.2.5 , suse/pcp:5.2.5-21.16 , suse/pcp:latest Container Release : 21.16 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container suse/pcp was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - util-linux-systemd-2.37.4-150500.9.3.1 updated - container:bci-bci-init-15.5-15.5-13.10 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:10:01 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:10:01 +0100 (CET) Subject: SUSE-CU-2024:392-1: Security update of bci/php Message-ID: <20240128081001.A458BFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/php ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:392-1 Container Tags : bci/php:8 , bci/php:8-11.8 Container Release : 11.8 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/php was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.76 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:10:27 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:10:27 +0100 (CET) Subject: SUSE-CU-2024:393-1: Security update of suse/postgres Message-ID: <20240128081027.04612FE84@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:393-1 Container Tags : suse/postgres:15 , suse/postgres:15-16.9 , suse/postgres:15.5 , suse/postgres:15.5-16.9 Container Release : 16.9 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:10:33 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:10:33 +0100 (CET) Subject: SUSE-CU-2024:394-1: Security update of suse/postgres Message-ID: <20240128081033.907F0FE84@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:394-1 Container Tags : suse/postgres:16 , suse/postgres:16-5.9 , suse/postgres:16.1 , suse/postgres:16.1-5.9 , suse/postgres:latest Container Release : 5.9 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:10:59 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:10:59 +0100 (CET) Subject: SUSE-CU-2024:395-1: Security update of bci/python Message-ID: <20240128081059.96C94FE85@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:395-1 Container Tags : bci/python:3 , bci/python:3-16.8 , bci/python:3.11 , bci/python:3.11-16.8 , bci/python:latest Container Release : 16.8 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.76 updated From sle-container-updates at lists.suse.com Sun Jan 28 08:11:23 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Sun, 28 Jan 2024 09:11:23 +0100 (CET) Subject: SUSE-CU-2024:396-1: Security update of bci/ruby Message-ID: <20240128081123.4533DFE85@maintenance.suse.de> SUSE Container Update Advisory: bci/ruby ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:396-1 Container Tags : bci/ruby:2 , bci/ruby:2-15.8 , bci/ruby:2.5 , bci/ruby:2.5-15.8 , bci/ruby:latest Container Release : 15.8 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/ruby was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.76 updated From sle-container-updates at lists.suse.com Mon Jan 29 08:02:32 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Mon, 29 Jan 2024 09:02:32 +0100 (CET) Subject: SUSE-CU-2024:397-1: Security update of suse/nginx Message-ID: <20240129080232.1DE0FFE84@maintenance.suse.de> SUSE Container Update Advisory: suse/nginx ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:397-1 Container Tags : suse/nginx:1.21 , suse/nginx:1.21-9.10 , suse/nginx:latest Container Release : 9.10 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container suse/nginx was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Mon Jan 29 08:02:36 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Mon, 29 Jan 2024 09:02:36 +0100 (CET) Subject: SUSE-CU-2024:398-1: Security update of suse/rmt-mariadb-client Message-ID: <20240129080236.0CCA1FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-mariadb-client ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:398-1 Container Tags : suse/mariadb-client:10.6 , suse/mariadb-client:10.6-14.8 , suse/mariadb-client:latest , suse/rmt-mariadb-client:10.6 , suse/rmt-mariadb-client:10.6-14.8 , suse/rmt-mariadb-client:latest Container Release : 14.8 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container suse/rmt-mariadb-client was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.76 updated From sle-container-updates at lists.suse.com Mon Jan 29 08:02:40 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Mon, 29 Jan 2024 09:02:40 +0100 (CET) Subject: SUSE-CU-2024:399-1: Security update of suse/rmt-mariadb Message-ID: <20240129080240.EA6F2FE84@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-mariadb ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:399-1 Container Tags : suse/mariadb:10.6 , suse/mariadb:10.6-17.8 , suse/mariadb:latest , suse/rmt-mariadb:10.6 , suse/rmt-mariadb:10.6-17.8 , suse/rmt-mariadb:latest Container Release : 17.8 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container suse/rmt-mariadb was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.76 updated From sle-container-updates at lists.suse.com Mon Jan 29 08:02:47 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Mon, 29 Jan 2024 09:02:47 +0100 (CET) Subject: SUSE-CU-2024:400-1: Security update of bci/bci-sle15-kernel-module-devel Message-ID: <20240129080247.18161FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:400-1 Container Tags : bci/bci-sle15-kernel-module-devel:15.5 , bci/bci-sle15-kernel-module-devel:15.5.5.10 , bci/bci-sle15-kernel-module-devel:latest Container Release : 5.10 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.76 updated From sle-container-updates at lists.suse.com Tue Jan 30 08:02:20 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Tue, 30 Jan 2024 09:02:20 +0100 (CET) Subject: SUSE-CU-2024:401-1: Security update of bci/dotnet-aspnet Message-ID: <20240130080220.62B3FFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:401-1 Container Tags : bci/dotnet-aspnet:7.0 , bci/dotnet-aspnet:7.0-21.11 , bci/dotnet-aspnet:7.0.15 , bci/dotnet-aspnet:7.0.15-21.11 Container Release : 21.11 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Tue Jan 30 08:02:46 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Tue, 30 Jan 2024 09:02:46 +0100 (CET) Subject: SUSE-CU-2024:403-1: Security update of bci/dotnet-sdk Message-ID: <20240130080246.F021BFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:403-1 Container Tags : bci/dotnet-sdk:8.0 , bci/dotnet-sdk:8.0-3.4 , bci/dotnet-sdk:8.0.1 , bci/dotnet-sdk:8.0.1-3.4 , bci/dotnet-sdk:latest Container Release : 3.4 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Tue Jan 30 08:03:07 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Tue, 30 Jan 2024 09:03:07 +0100 (CET) Subject: SUSE-CU-2024:405-1: Security update of bci/dotnet-runtime Message-ID: <20240130080307.E5874FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:405-1 Container Tags : bci/dotnet-runtime:7.0 , bci/dotnet-runtime:7.0-22.11 , bci/dotnet-runtime:7.0.15 , bci/dotnet-runtime:7.0.15-22.11 Container Release : 22.11 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Tue Jan 30 08:03:19 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Tue, 30 Jan 2024 09:03:19 +0100 (CET) Subject: SUSE-CU-2024:407-1: Security update of bci/golang Message-ID: <20240130080319.9ED2DFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:407-1 Container Tags : bci/golang:1.20-openssl , bci/golang:1.20-openssl-11.11 , bci/golang:oldstable-openssl , bci/golang:oldstable-openssl-11.11 Container Release : 11.11 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Tue Jan 30 08:03:37 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Tue, 30 Jan 2024 09:03:37 +0100 (CET) Subject: SUSE-CU-2024:408-1: Security update of bci/golang Message-ID: <20240130080337.ED435FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:408-1 Container Tags : bci/golang:1.21 , bci/golang:1.21-1.7.11 , bci/golang:latest , bci/golang:stable , bci/golang:stable-1.7.11 Container Release : 7.11 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Tue Jan 30 08:03:47 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Tue, 30 Jan 2024 09:03:47 +0100 (CET) Subject: SUSE-CU-2024:409-1: Security update of bci/golang Message-ID: <20240130080347.854AEFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:409-1 Container Tags : bci/golang:1.21-openssl , bci/golang:1.21-openssl-11.11 , bci/golang:latest , bci/golang:stable-openssl , bci/golang:stable-openssl-11.11 Container Release : 11.11 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Tue Jan 30 08:04:54 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Tue, 30 Jan 2024 09:04:54 +0100 (CET) Subject: SUSE-CU-2024:412-1: Security update of bci/php-fpm Message-ID: <20240130080454.5B781FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/php-fpm ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:412-1 Container Tags : bci/php-fpm:8 , bci/php-fpm:8-11.8 Container Release : 11.8 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/php-fpm was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.76 updated From sle-container-updates at lists.suse.com Tue Jan 30 08:05:13 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Tue, 30 Jan 2024 09:05:13 +0100 (CET) Subject: SUSE-CU-2024:413-1: Security update of bci/python Message-ID: <20240130080513.E727CFE84@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:413-1 Container Tags : bci/python:3 , bci/python:3-17.9 , bci/python:3.6 , bci/python:3.6-17.9 Container Release : 17.9 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Wed Jan 31 08:02:16 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 31 Jan 2024 09:02:16 +0100 (CET) Subject: SUSE-CU-2024:414-1: Security update of bci/bci-init Message-ID: <20240131080216.3C764FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-init ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:414-1 Container Tags : bci/bci-init:15.5 , bci/bci-init:15.5.13.11 , bci/bci-init:latest Container Release : 13.11 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/bci-init was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Wed Jan 31 08:02:32 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 31 Jan 2024 09:02:32 +0100 (CET) Subject: SUSE-CU-2024:415-1: Security update of bci/nodejs Message-ID: <20240131080232.B3BC7FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:415-1 Container Tags : bci/node:18 , bci/node:18-15.11 , bci/nodejs:18 , bci/nodejs:18-15.11 Container Release : 15.11 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Wed Jan 31 15:18:58 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Wed, 31 Jan 2024 16:18:58 +0100 (CET) Subject: SUSE-CU-2024:416-1: Security update of bci/rust Message-ID: <20240131151858.05892FE84@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:416-1 Container Tags : bci/rust:1.74 , bci/rust:1.74-2.3.9 , bci/rust:oldstable , bci/rust:oldstable-2.3.9 Container Release : 3.9 Severity : moderate Type : security References : 1218571 CVE-2023-7207 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:238-1 Released: Fri Jan 26 10:56:41 2024 Summary: Security update for cpio Type: security Severity: moderate References: 1218571,CVE-2023-7207 This update for cpio fixes the following issues: - CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571). The following package changes have been done: - libuuid1-2.37.4-150500.9.3.1 updated - libsmartcols1-2.37.4-150500.9.3.1 updated - libblkid1-2.37.4-150500.9.3.1 updated - libfdisk1-2.37.4-150500.9.3.1 updated - cpio-2.13-150400.3.3.1 updated - libmount1-2.37.4-150500.9.3.1 updated - util-linux-2.37.4-150500.9.3.1 updated - container:sles15-image-15.0.0-36.5.77 updated From sle-container-updates at lists.suse.com Fri Jan 12 08:07:17 2024 From: sle-container-updates at lists.suse.com (sle-container-updates at lists.suse.com) Date: Fri, 12 Jan 2024 08:07:17 -0000 Subject: SUSE-CU-2024:154-1: Security update of ses/7.1/ceph/ceph Message-ID: <20240112080134.C93A0FBA9@maintenance.suse.de> SUSE Container Update Advisory: ses/7.1/ceph/ceph ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:154-1 Container Tags : ses/7.1/ceph/ceph:16.2.13.66 , ses/7.1/ceph/ceph:16.2.13.66.4.9.1 , ses/7.1/ceph/ceph:latest , ses/7.1/ceph/ceph:sle15.3.pacific Container Release : 4.9.1 Severity : important Type : security References : 1029961 1041742 1107342 1111622 1158830 1170175 1176785 1184753 1196647 1199282 1200962 1201384 1203760 1205767 1206080 1206480 1206480 1206556 1206684 1206684 1206798 1207853 1208037 1208038 1208040 1208409 1209122 1209275 1209642 1210297 1210335 1210557 1210557 1210660 1210733 1211427 1211427 1211829 1212101 1212101 1212422 1212819 1212910 1213458 1213854 1213915 1213915 1214052 1214052 1214292 1214395 1214460 1214460 1214565 1214567 1214579 1214580 1214604 1214611 1214619 1214620 1214623 1214624 1214625 1214692 1214788 1214806 1215007 1215215 1215286 1215314 1215427 1215434 1215496 1215713 1215889 1215891 1215968 1215979 1216091 1216123 1216129 1216174 1216377 1216378 1216664 1216862 1216922 1216987 1217212 1217472 1217573 1217592 1217695 1217696 1217950 1218014 CVE-2020-19726 CVE-2021-32256 CVE-2022-35205 CVE-2022-35206 CVE-2022-4285 CVE-2022-44840 CVE-2022-45703 CVE-2022-47673 CVE-2022-47695 CVE-2022-47696 CVE-2022-48063 CVE-2022-48064 CVE-2022-48065 CVE-2023-0687 CVE-2023-1579 CVE-2023-1829 CVE-2023-1972 CVE-2023-2137 CVE-2023-2222 CVE-2023-23559 CVE-2023-25585 CVE-2023-25587 CVE-2023-25588 CVE-2023-35945 CVE-2023-38546 CVE-2023-40217 CVE-2023-4039 CVE-2023-4039 CVE-2023-43804 CVE-2023-44487 CVE-2023-45322 CVE-2023-45803 CVE-2023-45853 CVE-2023-46218 CVE-2023-4641 CVE-2023-4813 CVE-2023-48795 CVE-2023-49083 CVE-2023-50495 CVE-2023-5678 ----------------------------------------------------------------- The container ses/7.1/ceph/ceph was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:3814-1 Released: Wed Sep 27 18:08:17 2023 Summary: Recommended update for glibc Type: recommended Severity: moderate References: 1211829,1212819,1212910 This update for glibc fixes the following issues: - nscd: Fix netlink cache invalidation if epoll is used (bsc#1212910, BZ #29415) - Restore lookup of IPv4 mapped addresses in files database (bsc#1212819, BZ #25457) - elf: Remove excessive p_align check on PT_LOAD segments (bsc#1211829, BZ #28688) - elf: Properly align PT_LOAD segments (bsc#1211829, BZ #28676) - ld.so: Always use MAP_COPY to map the first segment (BZ #30452) - add GB18030-2022 charmap (jsc#PED-4908, BZ #30243) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:3825-1 Released: Wed Sep 27 18:48:53 2023 Summary: Security update for binutils Type: security Severity: important References: 1200962,1206080,1206556,1208037,1208038,1208040,1208409,1209642,1210297,1210733,1213458,1214565,1214567,1214579,1214580,1214604,1214611,1214619,1214620,1214623,1214624,1214625,CVE-2020-19726,CVE-2021-32256,CVE-2022-35205,CVE-2022-35206,CVE-2022-4285,CVE-2022-44840,CVE-2022-45703,CVE-2022-47673,CVE-2022-47695,CVE-2022-47696,CVE-2022-48063,CVE-2022-48064,CVE-2022-48065,CVE-2023-0687,CVE-2023-1579,CVE-2023-1972,CVE-2023-2222,CVE-2023-25585,CVE-2023-25587,CVE-2023-25588 This update for binutils fixes the following issues: Update to version 2.41 [jsc#PED-5778]: * The MIPS port now supports the Sony Interactive Entertainment Allegrex processor, used with the PlayStation Portable, which implements the MIPS II ISA along with a single-precision FPU and a few implementation-specific integer instructions. * Objdump's --private option can now be used on PE format files to display the fields in the file header and section headers. * New versioned release of libsframe: libsframe.so.1. This release introduces versioned symbols with version node name LIBSFRAME_1.0. This release also updates the ABI in an incompatible way: this includes removal of sframe_get_funcdesc_with_addr API, change in the behavior of sframe_fre_get_ra_offset and sframe_fre_get_fp_offset APIs. * SFrame Version 2 is now the default (and only) format version supported by gas, ld, readelf and objdump. * Add command-line option, --strip-section-headers, to objcopy and strip to remove ELF section header from ELF file. * The RISC-V port now supports the following new standard extensions: - Zicond (conditional zero instructions) - Zfa (additional floating-point instructions) - Zvbb, Zvbc, Zvkg, Zvkned, Zvknh[ab], Zvksed, Zvksh, Zvkn, Zvknc, Zvkng, Zvks, Zvksc, Zvkg, Zvkt (vector crypto instructions) * The RISC-V port now supports the following vendor-defined extensions: - XVentanaCondOps * Add support for Intel FRED, LKGS and AMX-COMPLEX instructions. * A new .insn directive is recognized by x86 gas. * Add SME2 support to the AArch64 port. * The linker now accepts a command line option of --remap-inputs = to relace any input file that matches with . In addition the option --remap-inputs-file= can be used to specify a file containing any number of these remapping directives. * The linker command line option --print-map-locals can be used to include local symbols in a linker map. (ELF targets only). * For most ELF based targets, if the --enable-linker-version option is used then the version of the linker will be inserted as a string into the .comment section. * The linker script syntax has a new command for output sections: ASCIZ 'string' This will insert a zero-terminated string at the current location. * Add command-line option, -z nosectionheader, to omit ELF section header. - Contains fixes for these non-CVEs (not security bugs per upstreams SECURITY.md): * bsc#1209642 aka CVE-2023-1579 aka PR29988 * bsc#1210297 aka CVE-2023-1972 aka PR30285 * bsc#1210733 aka CVE-2023-2222 aka PR29936 * bsc#1213458 aka CVE-2021-32256 aka PR105039 (gcc) * bsc#1214565 aka CVE-2020-19726 aka PR26240 * bsc#1214567 aka CVE-2022-35206 aka PR29290 * bsc#1214579 aka CVE-2022-35205 aka PR29289 * bsc#1214580 aka CVE-2022-44840 aka PR29732 * bsc#1214604 aka CVE-2022-45703 aka PR29799 * bsc#1214611 aka CVE-2022-48065 aka PR29925 * bsc#1214619 aka CVE-2022-48064 aka PR29922 * bsc#1214620 aka CVE-2022-48063 aka PR29924 * bsc#1214623 aka CVE-2022-47696 aka PR29677 * bsc#1214624 aka CVE-2022-47695 aka PR29846 * bsc#1214625 aka CVE-2022-47673 aka PR29876 - This only existed only for a very short while in SLE-15, as the main variant in devel:gcc subsumed this in binutils-revert-rela.diff. Hence: - Document fixed CVEs: * bsc#1208037 aka CVE-2023-25588 aka PR29677 * bsc#1208038 aka CVE-2023-25587 aka PR29846 * bsc#1208040 aka CVE-2023-25585 aka PR29892 * bsc#1208409 aka CVE-2023-0687 aka PR29444 - Enable bpf-none cross target and add bpf-none to the multitarget set of supported targets. - Disable packed-relative-relocs for old codestreams. They generate buggy relocations when binutils-revert-rela.diff is active. [bsc#1206556] - Disable ZSTD debug section compress by default. - Enable zstd compression algorithm (instead of zlib) for debug info sections by default. - Pack libgprofng only for supported platforms. - Move libgprofng-related libraries to the proper locations (packages). - Add --without=bootstrap for skipping of bootstrap (faster testing of the package). - Remove broken arm32-avoid-copyreloc.patch to fix [gcc#108515] Update to version 2.40: * Objdump has a new command line option --show-all-symbols which will make it display all symbols that match a given address when disassembling. (Normally only the first symbol that matches an address is shown). * Add --enable-colored-disassembly configure time option to enable colored disassembly output by default, if the output device is a terminal. Note, this configure option is disabled by default. * DCO signed contributions are now accepted. * objcopy --decompress-debug-sections now supports zstd compressed debug sections. The new option --compress-debug-sections=zstd compresses debug sections with zstd. * addr2line and objdump --dwarf now support zstd compressed debug sections. * The dlltool program now accepts --deterministic-libraries and --non-deterministic-libraries as command line options to control whether or not it generates deterministic output libraries. If neither of these options are used the default is whatever was set when the binutils were configured. * readelf and objdump now have a newly added option --sframe which dumps the SFrame section. * Add support for Intel RAO-INT instructions. * Add support for Intel AVX-NE-CONVERT instructions. * Add support for Intel MSRLIST instructions. * Add support for Intel WRMSRNS instructions. * Add support for Intel CMPccXADD instructions. * Add support for Intel AVX-VNNI-INT8 instructions. * Add support for Intel AVX-IFMA instructions. * Add support for Intel PREFETCHI instructions. * Add support for Intel AMX-FP16 instructions. * gas now supports --compress-debug-sections=zstd to compress debug sections with zstd. * Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd} that selects the default compression algorithm for --enable-compressed-debug-sections. * Add support for various T-Head extensions (XTheadBa, XTheadBb, XTheadBs, XTheadCmo, XTheadCondMov, XTheadFMemIdx, XTheadFmv, XTheadInt, XTheadMemIdx, XTheadMemPair, XTheadMac, and XTheadSync) from version 2.0 of the T-Head ISA manual, which are implemented in the Allwinner D1. * Add support for the RISC-V Zawrs extension, version 1.0-rc4. * Add support for Cortex-X1C for Arm. * New command line option --gsframe to generate SFrame unwind information on x86_64 and aarch64 targets. * The linker has a new command line option to suppress the generation of any warning or error messages. This can be useful when there is a need to create a known non-working binary. The option is -w or --no-warnings. * ld now supports zstd compressed debug sections. The new option --compress-debug-sections=zstd compresses debug sections with zstd. * Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd} that selects the default compression algorithm for --enable-compressed-debug-sections. * Remove support for -z bndplt (MPX prefix instructions). - Includes fixes for these CVEs: * bsc#1206080 aka CVE-2022-4285 aka PR29699 - Enable by default: --enable-colored-disassembly. - fix build on x86_64_vX platforms ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:3828-1 Released: Wed Sep 27 19:07:38 2023 Summary: Security update for python3 Type: security Severity: important References: 1214692,CVE-2023-40217 This update for python3 fixes the following issues: - CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:3997-1 Released: Fri Oct 6 14:13:56 2023 Summary: Security update for nghttp2 Type: security Severity: important References: 1215713,CVE-2023-35945 This update for nghttp2 fixes the following issues: - CVE-2023-35945: Fixed memory leak when PUSH_PROMISE or HEADERS frame cannot be sent (bsc#1215713). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4006-1 Released: Mon Oct 9 08:35:50 2023 Summary: Recommended update for zypper Type: recommended Severity: moderate References: 1213854,1214292,1214395,1215007 This update for zypper fixes the following issues: - Fix name of the bash completion script (bsc#1215007) - Update notes about failing signature checks (bsc#1214395) - Improve the SIGINT handler to be signal safe (bsc#1214292) - Update to version 1.14.64 - Changed location of bash completion script (bsc#1213854). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4027-1 Released: Tue Oct 10 13:59:02 2023 Summary: Security update for shadow Type: security Severity: low References: 1214806,CVE-2023-4641 This update for shadow fixes the following issues: - CVE-2023-4641: Fixed potential password leak (bsc#1214806). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4045-1 Released: Wed Oct 11 09:10:43 2023 Summary: Security update for curl Type: security Severity: moderate References: 1215889,CVE-2023-38546 This update for curl fixes the following issues: - CVE-2023-38546: Fixed a cookie injection with none file (bsc#1215889). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4052-1 Released: Wed Oct 11 14:11:55 2023 Summary: Recommended update for babeltrace Type: recommended Severity: moderate References: 1209275 This update ships missing babeltrace-devel to the Basesystem module to allow building gdb source rpms. (bsc#1209275) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4108-1 Released: Wed Oct 18 11:51:12 2023 Summary: Security update for python-urllib3 Type: security Severity: moderate References: 1215968,CVE-2023-43804 This update for python-urllib3 fixes the following issues: - CVE-2023-43804: Fixed a potential cookie leak via HTTP redirect if the user manually set the corresponding header (bsc#1215968). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4110-1 Released: Wed Oct 18 12:35:26 2023 Summary: Security update for glibc Type: security Severity: important References: 1215286,1215891,CVE-2023-4813 This update for glibc fixes the following issues: Security issue fixed: - CVE-2023-4813: Fixed a potential use-after-free in gaih_inet() (bsc#1215286, BZ #28931) Also a regression from a previous update was fixed: - elf: Align argument of __munmap to page size (bsc#1215891, BZ #28676) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4154-1 Released: Fri Oct 20 19:33:25 2023 Summary: Recommended update for aaa_base Type: recommended Severity: moderate References: 1107342,1215434 This update for aaa_base fixes the following issues: - Respect /etc/update-alternatives/java when setting JAVA_HOME (bsc#1215434,bsc#1107342) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4158-1 Released: Mon Oct 23 09:52:06 2023 Summary: Security update for suse-module-tools Type: security Severity: important References: 1205767,1207853,1210335,CVE-2023-1829,CVE-2023-23559 This update for suse-module-tools fixes the following issues: - Updated to version 15.3.17: - CVE-2023-1829: Blacklisted the Linux kernel tcindex classifier module (bsc#1210335). - CVE-2023-23559: Blacklisted the Linux kernel RNDIS modules (bsc#1205767, jsc#PED-5731). - Updated to version 15.3.16: - Fixed a build issue for s390x (bsc#1207853). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4162-1 Released: Mon Oct 23 15:33:03 2023 Summary: Security update for gcc13 Type: security Severity: important References: 1206480,1206684,1210557,1211427,1212101,1213915,1214052,1214460,CVE-2023-4039 This update for gcc13 fixes the following issues: This update ship the GCC 13.2 compiler suite and its base libraries. The compiler base libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 12 ones. The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module. The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories. To use gcc13 compilers use: - install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages. - override your Makefile to use CC=gcc13, CXX=g++13 and similar overrides for the other languages. For a full changelog with all new GCC13 features, check out https://gcc.gnu.org/gcc-13/changes.html Detailed changes: * CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable length stack allocations. (bsc#1214052) - Turn cross compiler to s390x to a glibc cross. [bsc#1214460] - Also handle -static-pie in the default-PIE specs - Fixed missed optimization in Skia resulting in Firefox crashes when building with LTO. [bsc#1212101] - Make libstdc++6-devel packages own their directories since they can be installed standalone. [bsc#1211427] - Add new x86-related intrinsics (amxcomplexintrin.h). - RISC-V: Add support for inlining subword atomic operations - Use --enable-link-serialization rather that --enable-link-mutex, the benefit of the former one is that the linker jobs are not holding tokens of the make's jobserver. - Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd for the general state of BPF with GCC. - Add bootstrap conditional to allow --without=bootstrap to be specified to speed up local builds for testing. - Bump included newlib to version 4.3.0. - Also package libhwasan_preinit.o on aarch64. - Configure external timezone database provided by the timezone package. Make libstdc++6 recommend timezone to get a fully working std::chrono. Install timezone when running the testsuite. - Package libhwasan_preinit.o on x86_64. - Fixed unwinding on aarch64 with pointer signing. [bsc#1206684] - Enable PRU flavour for gcc13 - update floatn fixinclude pickup to check each header separately (bsc#1206480) - Redo floatn fixinclude pick-up to simply keep what is there. - Bump libgo SONAME to libgo22. - Do not package libhwasan for biarch (32-bit architecture) as the extension depends on 64-bit pointers. - Adjust floatn fixincludes guard to work with SLE12 and earlier SLE15. - Depend on at least LLVM 13 for GCN cross compiler. - Update embedded newlib to version 4.2.0 - Allow cross-pru-gcc12-bootstrap for armv7l architecture. PRU architecture is used for real-time MCUs embedded into TI armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for armv7l in order to build both host applications and PRU firmware during the same build. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4200-1 Released: Wed Oct 25 12:04:29 2023 Summary: Security update for nghttp2 Type: security Severity: important References: 1216123,1216174,CVE-2023-44487 This update for nghttp2 fixes the following issues: - CVE-2023-44487: Fixed HTTP/2 Rapid Reset attack. (bsc#1216174) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4217-1 Released: Thu Oct 26 12:20:27 2023 Summary: Security update for zlib Type: security Severity: moderate References: 1216378,CVE-2023-45853 This update for zlib fixes the following issues: - CVE-2023-45853: Fixed an integer overflow that would lead to a buffer overflow in the minizip subcomponent (bsc#1216378). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4226-1 Released: Fri Oct 27 11:14:10 2023 Summary: Recommended update for openssl-1_1 Type: recommended Severity: moderate References: 1215215 This update for openssl-1_1 fixes the following issues: - Displays 'fips' in the version string (bsc#1215215) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4310-1 Released: Tue Oct 31 14:10:47 2023 Summary: Recommended update for libtirpc Type: recommended Severity: moderate References: 1196647 This Update for libtirpc to 1.3.4, fixing the following issues: Update to 1.3.4 (bsc#1199467) * binddynport.c honor ip_local_reserved_ports - replaces: binddynport-honor-ip_local_reserved_ports.patch * gss-api: expose gss major/minor error in authgss_refresh() * rpcb_clnt.c: Eliminate double frees in delete_cache() * rpcb_clnt.c: memory leak in destroy_addr * portmapper: allow TCP-only portmapper * getnetconfigent: avoid potential DoS issue by removing unnecessary sleep * clnt_raw.c: fix a possible null pointer dereference * bindresvport.c: fix a potential resource leakage Update to 1.3.3: * Fix DoS vulnerability in libtirpc - replaces: 0001-Fix-DoS-vulnerability-in-libtirpc.patch * _rpc_dtablesize: use portable system call * libtirpc: Fix use-after-free accessing the error number * Fix potential memory leak of parms.r_addr - replaces 0001-fix-parms.r_addr-memory-leak.patch * rpcb_clnt.c add mechanism to try v2 protocol first - preplaces: 0001-rpcb_clnt.c-config-to-try-protocolversion-2-first.patch * Eliminate deadlocks in connects with an MT environment * clnt_dg_freeres() uncleared set active state may deadlock * thread safe clnt destruction * SUNRPC: mutexed access blacklist_read state variable * SUNRPC: MT-safe overhaul of address cache management in rpcb_clnt.c Update to 1.3.2: * Replace the final SunRPC licenses with BSD licenses * blacklist: Add a few more well known ports * libtirpc: disallow calling auth_refresh from clnt_call with RPCSEC_GSS Update to 1.3.1: * Remove AUTH_DES interfaces from auth_des.h The unsupported AUTH_DES authentication has be compiled out since commit d918e41d889 (Wed Oct 9 2019) replaced by API routines that return errors. * svc_dg: Free xp_netid during destroy * Fix memory management issues of fd locks * libtirpc: replace array with list for per-fd locks * __svc_vc_dodestroy: fix double free of xp_ltaddr.buf * __rpc_dtbsize: rlim_cur instead of rlim_max * pkg-config: use the correct replacements for libdir/includedir ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4458-1 Released: Thu Nov 16 14:38:48 2023 Summary: Security update for gcc13 Type: security Severity: important References: 1206480,1206684,1210557,1211427,1212101,1213915,1214052,1214460,1215427,1216664,CVE-2023-4039 This update for gcc13 fixes the following issues: This update ship the GCC 13.2 compiler suite and its base libraries. The compiler base libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 12 ones. The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module. The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories. To use gcc13 compilers use: - install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages. - override your Makefile to use CC=gcc-13, CXX=g++-13 and similar overrides for the other languages. For a full changelog with all new GCC13 features, check out https://gcc.gnu.org/gcc-13/changes.html Detailed changes: * CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable length stack allocations. (bsc#1214052) - Work around third party app crash during C++ standard library initialization. [bsc#1216664] - Fixed that GCC13 fails to compile some packages with error: unrecognizable insn (bsc#1215427) - Bump included newlib to version 4.3.0. - Update to GCC trunk head (r13-5254-g05b9868b182bb9) - Redo floatn fixinclude pick-up to simply keep what is there. - Turn cross compiler to s390x to a glibc cross. [bsc#1214460] - Also handle -static-pie in the default-PIE specs - Fixed missed optimization in Skia resulting in Firefox crashes when building with LTO. [bsc#1212101] - Make libstdc++6-devel packages own their directories since they can be installed standalone. [bsc#1211427] - Add new x86-related intrinsics (amxcomplexintrin.h). - RISC-V: Add support for inlining subword atomic operations - Use --enable-link-serialization rather that --enable-link-mutex, the benefit of the former one is that the linker jobs are not holding tokens of the make's jobserver. - Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd for the general state of BPF with GCC. - Add bootstrap conditional to allow --without=bootstrap to be specified to speed up local builds for testing. - Bump included newlib to version 4.3.0. - Also package libhwasan_preinit.o on aarch64. - Configure external timezone database provided by the timezone package. Make libstdc++6 recommend timezone to get a fully working std::chrono. Install timezone when running the testsuite. - Package libhwasan_preinit.o on x86_64. - Fixed unwinding on aarch64 with pointer signing. [bsc#1206684] - Enable PRU flavour for gcc13 - update floatn fixinclude pickup to check each header separately (bsc#1206480) - Redo floatn fixinclude pick-up to simply keep what is there. - Bump libgo SONAME to libgo22. - Do not package libhwasan for biarch (32-bit architecture) as the extension depends on 64-bit pointers. - Adjust floatn fixincludes guard to work with SLE12 and earlier SLE15. - Depend on at least LLVM 13 for GCN cross compiler. - Update embedded newlib to version 4.2.0 - Allow cross-pru-gcc12-bootstrap for armv7l architecture. PRU architecture is used for real-time MCUs embedded into TI armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for armv7l in order to build both host applications and PRU firmware during the same build. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4464-1 Released: Thu Nov 16 17:56:12 2023 Summary: Security update for libxml2 Type: security Severity: moderate References: 1216129,CVE-2023-45322 This update for libxml2 fixes the following issues: - CVE-2023-45322: Fixed a use-after-free in xmlUnlinkNode() in tree.c (bsc#1216129). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4467-1 Released: Thu Nov 16 17:57:51 2023 Summary: Security update for python-urllib3 Type: security Severity: moderate References: 1216377,CVE-2023-45803 This update for python-urllib3 fixes the following issues: - CVE-2023-45803: Fix a request body leak that could occur when receiving a 303 HTTP response (bsc#1216377). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4519-1 Released: Tue Nov 21 17:39:58 2023 Summary: Security update for openssl-1_1 Type: security Severity: important References: 1216922,CVE-2023-5678 This update for openssl-1_1 fixes the following issues: - CVE-2023-5678: Fixed generating and checking of excessively long X9.42 DH keys that resulted in a possible Denial of Service (bsc#1216922). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4535-1 Released: Thu Nov 23 08:17:40 2023 Summary: Recommended update for libzypp, zypper Type: recommended Severity: moderate References: 1041742,1203760,1212422,1215979,1216091 This update for libzypp, zypper fixes the following issues: - Preliminary disable 'rpm --runposttrans' usage for chrooted systems (bsc#1216091) - Fix comment typo on zypp.conf (bsc#1215979) - Attempt to delay %transfiletrigger(postun|in) execution if rpm supports it (bsc#1041742) - Make sure the old target is deleted before a new one is created (bsc#1203760) - Return 104 also if info suggests near matches - Rephrase upgrade message for openSUSE Tumbleweed (bsc#1212422) - commit: Insert a headline to separate output of different rpm scripts (bsc#1041742) ----------------------------------------------------------------- Advisory ID: SUSE-feature-2023:4583-1 Released: Mon Nov 27 10:16:11 2023 Summary: Feature update for python-psutil Type: feature Severity: moderate References: 1111622,1170175,1176785,1184753,1199282 This update for python-psutil, python-requests fixes the following issues: - update python-psutil to 5.9.1 (bsc#1199282, bsc#1184753, jsc#SLE-24629, jsc#PM-3243, gh#giampaolo/psutil#2043) - Fix tests: setuptools changed the builddir library path and does not find the module from it. Use the installed platlib instead and exclude psutil.tests only later. - remove the dependency on net-tools, since it conflicts with busybox-hostnmame which is default on MicroOS - Update python-requests to 2.25.1 (bsc#1176785, bsc#1170175, jsc#ECO-3105, jsc#PM-2352, jsc#PED-7192) - Fixed bug with unintended Authorization header stripping for redirects using default ports (bsc#1111622). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4615-1 Released: Wed Nov 29 20:33:38 2023 Summary: Recommended update for icu Type: recommended Severity: moderate References: 1217472 This update of icu fixes the following issue: - missing 32bit libraries in SLES 15 SP3 were added, required by xerces-c 32bit. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4619-1 Released: Thu Nov 30 10:13:52 2023 Summary: Security update for sqlite3 Type: security Severity: important References: 1210660,CVE-2023-2137 This update for sqlite3 fixes the following issues: - CVE-2023-2137: Fixed heap buffer overflow (bsc#1210660). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4644-1 Released: Tue Dec 5 13:46:14 2023 Summary: Recommended update for psmisc Type: recommended Severity: moderate References: This update for psmisc fixes the following issues: - Fix version number when building the package ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4699-1 Released: Mon Dec 11 07:02:10 2023 Summary: Recommended update for gpg2 Type: recommended Severity: moderate References: 1217212 This update for gpg2 fixes the following issues: - `dirmngr-client --validate` is broken for DER-encoded files (bsc#1217212) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4713-1 Released: Mon Dec 11 13:23:12 2023 Summary: Security update for curl Type: security Severity: moderate References: 1217573,CVE-2023-46218 This update for curl fixes the following issues: - CVE-2023-46218: Fixed cookie mixed case PSL bypass (bsc#1217573). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4723-1 Released: Tue Dec 12 09:57:51 2023 Summary: Recommended update for libtirpc Type: recommended Severity: moderate References: 1216862 This update for libtirpc fixes the following issue: - fix sed parsing in specfile (bsc#1216862) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4890-1 Released: Mon Dec 18 13:00:52 2023 Summary: Recommended update for python-websocket-client Type: recommended Severity: moderate References: 1215314 This update for python-websocket-client fixes the following issues: - Re-enable Python 3.6 to fix pip3 install (bsc#1215314) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4902-1 Released: Tue Dec 19 13:09:42 2023 Summary: Security update for openssh Type: security Severity: important References: 1214788,1217950,CVE-2023-48795 This update for openssh fixes the following issues: - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950). the following non-security bug was fixed: - Fix the 'no route to host' error when connecting via ProxyJump ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4921-1 Released: Wed Dec 20 09:51:31 2023 Summary: Security update for python-cryptography Type: security Severity: moderate References: 1217592,CVE-2023-49083 This update for python-cryptography fixes the following issues: - CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4963-1 Released: Fri Dec 22 14:37:08 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:50-1 Released: Mon Jan 8 03:18:56 2024 Summary: Recommended update for python-instance-billing-flavor-check Type: recommended Severity: moderate References: 1217695,1217696 This update for python-instance-billing-flavor-check fixes the following issues: - Run the command as sudo only (bsc#1217696, bsc#1217695) - Handle exception for Python 3.4 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:82-1 Released: Thu Jan 11 09:21:29 2024 Summary: Recommended update for ceph Type: recommended Severity: moderate References: This update for ceph fixes the following issues: - Fix build versioning to resolve installation conflicts (no source code changes) The following package changes have been done: - aaa_base-84.87+git20180409.04c9dae-150300.10.6.2 updated - babeltrace-1.5.8-150300.3.2.1 updated - binutils-2.41-150100.7.46.1 updated - ceph-base-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-common-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-grafana-dashboards-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mds-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-cephadm-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-dashboard-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-modules-core-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-rook-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mon-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-osd-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-prometheus-alerts-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-radosgw-16.2.13.66+g54799ee0666-150300.9.1 updated - cephadm-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-16.2.13.66+g54799ee0666-150300.9.1 updated - glibc-locale-base-2.31-150300.63.1 updated - glibc-2.31-150300.63.1 updated - gpg2-2.2.27-150300.3.8.1 updated - libcephfs2-16.2.13.66+g54799ee0666-150300.9.1 updated - libcephsqlite-16.2.13.66+g54799ee0666-150300.9.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libctf-nobfd0-2.41-150100.7.46.1 updated - libctf0-2.41-150100.7.46.1 updated - libcurl4-7.66.0-150200.4.66.1 updated - libgcc_s1-13.2.1+git7813-150000.1.6.1 updated - libicu-suse65_1-65.1-150200.4.10.1 updated - libicu65_1-ledata-65.1-150200.4.10.1 updated - libncurses6-6.1-150000.5.20.1 updated - libnghttp2-14-1.40.0-150200.12.1 updated - libopenssl1_1-hmac-1.1.1d-150200.11.82.1 updated - libopenssl1_1-1.1.1d-150200.11.82.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libpython3_6m1_0-3.6.15-150300.10.51.1 updated - librados2-16.2.13.66+g54799ee0666-150300.9.1 updated - librbd1-16.2.13.66+g54799ee0666-150300.9.1 updated - librgw2-16.2.13.66+g54799ee0666-150300.9.1 updated - libsolv-tools-0.7.27-150200.23.2 updated - libsqlite3-0-3.44.0-150000.3.23.1 updated - libstdc++6-13.2.1+git7813-150000.1.6.1 updated - libtirpc-netconfig-1.3.4-150300.3.23.1 updated - libtirpc3-1.3.4-150300.3.23.1 updated - libxml2-2-2.9.7-150000.3.63.1 updated - libz1-1.2.11-150000.3.48.1 updated - libzypp-17.31.27-150200.84.1 updated - login_defs-4.8.1-150300.4.12.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - openssh-clients-8.4p1-150300.3.27.1 updated - openssh-common-8.4p1-150300.3.27.1 updated - openssh-fips-8.4p1-150300.3.27.1 updated - openssh-server-8.4p1-150300.3.27.1 updated - openssh-8.4p1-150300.3.27.1 updated - openssl-1_1-1.1.1d-150200.11.82.1 updated - procps-3.3.17-150000.7.37.1 updated - psmisc-23.0-150000.6.25.1 updated - python3-base-3.6.15-150300.10.51.1 updated - python3-ceph-argparse-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-ceph-common-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-cephfs-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-cryptography-3.3.2-150200.22.1 updated - python3-cssselect-1.0.3-150000.3.5.1 updated - python3-curses-3.6.15-150300.10.51.1 updated - python3-lxml-4.7.1-150200.3.12.1 updated - python3-rados-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-rbd-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-requests-2.25.1-150300.3.6.1 updated - python3-rgw-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-urllib3-1.25.10-150300.4.9.1 updated - python3-websocket-client-1.3.2-150100.6.10.5 updated - python3-3.6.15-150300.10.51.1 updated - rbd-mirror-16.2.13.66+g54799ee0666-150300.9.1 updated - shadow-4.8.1-150300.4.12.1 updated - suse-module-tools-15.3.17-150300.3.22.1 updated - terminfo-base-6.1-150000.5.20.1 updated - zypper-1.14.68-150200.70.2 updated - container:sles15-image-15.0.0-17.20.236 updated - libprocps7-3.3.15-150000.7.34.1 removed