SUSE-CU-2024:4184-1: Security update of suse/postgres

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Wed Sep 11 07:10:30 UTC 2024


SUSE Container Update Advisory: suse/postgres
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2024:4184-1
Container Tags        : suse/postgres:15 , suse/postgres:15-30.1 , suse/postgres:15.8 , suse/postgres:15.8 , suse/postgres:15.8-30.1 , suse/postgres:15.8-30.1
Container Release     : 30.1
Severity              : important
Type                  : security
References            : 1194818 1218297 1221479 1224282 1226414 1226463 1227138 1227186
                        1227187 1228043 1228091 1228770 1229013 1229013 916845 CVE-2013-4235
                        CVE-2013-4235 CVE-2023-7008 CVE-2024-34459 CVE-2024-37370 CVE-2024-37371
                        CVE-2024-5535 CVE-2024-7348 CVE-2024-7348 
-----------------------------------------------------------------

The container suse/postgres was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:2290-1
Released:    Wed Jul  3 11:35:00 2024
Summary:     Security update for libxml2
Type:        security
Severity:    low
References:  1224282,CVE-2024-34459
This update for libxml2 fixes the following issues:

- CVE-2024-34459: Fixed buffer over-read in xmlHTMLPrintFileContext in xmllint.c (bsc#1224282). 

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:2302-1
Released:    Thu Jul  4 16:21:10 2024
Summary:     Security update for krb5
Type:        security
Severity:    important
References:  1227186,1227187,CVE-2024-37370,CVE-2024-37371
This update for krb5 fixes the following issues:

- CVE-2024-37370: Fixed confidential GSS krb5 wrap tokens with invalid fields were errouneously accepted (bsc#1227186).
- CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:2658-1
Released:    Tue Jul 30 15:37:26 2024
Summary:     Security update for shadow
Type:        security
Severity:    important
References:  916845,CVE-2013-4235
This update for shadow fixes the following issues:

- CVE-2013-4235: Fixed a race condition when copying and removing directory trees (bsc#916845).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:2679-1
Released:    Wed Jul 31 09:47:44 2024
Summary:     Recommended update for patterns-base
Type:        recommended
Severity:    moderate
References:  
This update for patterns-base fixes the following issues:

Added a fips-certified pattern matching the exact certified FIPS
versions of the Linux Kernel, openssl 1.1.1, gnutls/nettle, mozilla-nss
and libgcrypt.

Note that applying this pattern might cause downgrade of various packages
and so deinstall security and bugfix updates released after the certified
binaries.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:2804-1
Released:    Wed Aug  7 09:48:29 2024
Summary:     Security update for shadow
Type:        security
Severity:    moderate
References:  1228770,CVE-2013-4235
This update for shadow fixes the following issues:

- Fixed not copying of skel files (bsc#1228770)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:2891-1
Released:    Tue Aug 13 11:39:53 2024
Summary:     Security update for openssl-1_1
Type:        security
Severity:    moderate
References:  1226463,1227138,CVE-2024-5535
This update for openssl-1_1 fixes the following issues:

- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)

Other fixes:
- Build with no-afalgeng (bsc#1226463)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:2967-1
Released:    Mon Aug 19 15:41:29 2024
Summary:     Recommended update for pam
Type:        recommended
Severity:    moderate
References:  1194818
This update for pam fixes the following issue:

- Prevent cursor escape from the login prompt (bsc#1194818).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:3149-1
Released:    Thu Sep  5 17:05:36 2024
Summary:     Security update for systemd
Type:        security
Severity:    moderate
References:  1218297,1221479,1226414,1228091,CVE-2023-7008
This update for systemd fixes the following issues:

- CVE-2023-7008: Fixed man-in-the-middle due to unsigned name response in signed zone not refused when DNSSEC=yes (bsc#1218297)

Other fixes:
- Unit: drop ProtectClock=yes from systemd-udevd.service (bsc#1226414)
- Don't mention any rpm macros inside comments, even if escaped (bsc#1228091)
- Skip redundant dependencies specified the LSB description that references the file name of the service itself for early boot scripts (bsc#1221479).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:3167-1
Released:    Mon Sep  9 12:31:59 2024
Summary:     Recommended update for glibc
Type:        recommended
Severity:    moderate
References:  1228043
This update for glibc fixes the following issue:

- s390x: Fix segfault in wcsncmp (bsc#1228043).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:3168-1
Released:    Mon Sep  9 12:48:13 2024
Summary:     Security update for postgresql16
Type:        security
Severity:    important
References:  1229013,CVE-2024-7348
This update for postgresql16 fixes the following issues:

- Upgrade to 15.8 (bsc#1229013)
- CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes arbitrary SQL. (bsc#1229013)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:3170-1
Released:    Mon Sep  9 12:51:44 2024
Summary:     Security update for postgresql16
Type:        security
Severity:    important
References:  1229013,CVE-2024-7348
This update for postgresql16 fixes the following issues:

- Upgrade to 16.4 (bsc#1229013)
- CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes arbitrary SQL. (bsc#1229013)


The following package changes have been done:

- glibc-2.31-150300.86.3 updated
- login_defs-4.8.1-150400.10.21.1 updated
- libxml2-2-2.10.3-150500.5.17.1 updated
- libopenssl1_1-1.1.1l-150500.17.34.1 updated
- libopenssl1_1-hmac-1.1.1l-150500.17.34.1 updated
- krb5-1.20.1-150500.3.9.1 updated
- patterns-base-fips-20200124-150400.20.10.1 updated
- pam-1.3.0-150000.6.71.2 updated
- shadow-4.8.1-150400.10.21.1 updated
- libsystemd0-249.17-150400.8.43.1 updated
- glibc-locale-base-2.31-150300.86.3 updated
- libpq5-16.4-150200.5.16.1 updated
- glibc-locale-2.31-150300.86.3 updated
- postgresql15-15.8-150200.5.30.1 updated
- postgresql15-server-15.8-150200.5.30.1 updated
- container:sles15-image-15.0.0-36.14.21 updated


More information about the sle-container-updates mailing list