SUSE-IU-2024:1235-1: Security update of rancher/elemental-channel/sl-micro
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Fri Sep 13 15:32:57 UTC 2024
SUSE Image Update Advisory: rancher/elemental-channel/sl-micro
-----------------------------------------------------------------
Image Advisory ID : SUSE-IU-2024:1235-1
Image Tags : rancher/elemental-channel/sl-micro:6.0-baremetal , rancher/elemental-channel/sl-micro:6.0-baremetal-2.12
Image Release : 2.12
Severity : important
Type : security
References : 1221482 1221940 1222992 1223423 1223424 1223425 1228041 CVE-2024-2961
CVE-2024-33599 CVE-2024-33600 CVE-2024-33601 CVE-2024-33602
-----------------------------------------------------------------
The container rancher/elemental-channel/sl-micro was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: 9
Released: Fri Aug 9 10:33:34 2024
Summary: Recommended update for bash, libcap-ng, libselinux, libselinux-bindings, libsemanage, zypper
Type: recommended
Severity: low
References:
This update fixes the following issues:
- No change rebuild due to dependency changes.
-----------------------------------------------------------------
Advisory ID: 32
Released: Thu Sep 5 12:12:35 2024
Summary: Security update for glibc
Type: security
Severity: important
References: 1221482,1221940,1222992,1223423,1223424,1223425,1228041,CVE-2024-2961,CVE-2024-33599,CVE-2024-33600,CVE-2024-33601,CVE-2024-33602
This update for glibc fixes the following issues:
Fixed security issues:
- CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425)
- CVE-2024-33599: nscd: Stack-based buffer overflow in netgroup cache (bsc#1223423)
- CVE-2024-33600: nscd: Avoid null pointer crashes after notfound response (bsc#1223424)
- CVE-2024-33600: nscd: Do not send missing not-found response in addgetnetgrentX (bsc#1223424)
- CVE-2024-33601, CVE-2024-33602: netgroup: Use two buffers in addgetnetgrentX (bsc#1223425)
- CVE-2024-2961: iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence (bsc#1222992)
Fixed non-security issues:
- Add workaround for invalid use of libc_nonshared.a with non-SUSE libc (bsc#1221482)
- Fix segfault in wcsncmp (bsc#1228041)
- Also include stat64 in the 32-bit libc_nonshared.a workaround (bsc#1221482)
- Avoid creating ULP prologue for _start routine (bsc#1221940)
- Also add libc_nonshared.a workaround to 32-bit x86 compat package (bsc#1221482)
- malloc: Use __get_nprocs on arena_get2
- linux: Use rseq area unconditionally in sched_getcpu
The following package changes have been done:
- compat-usrmerge-tools-84.87-2.195 added
- system-user-root-20190513-2.208 updated
- filesystem-84.87-5.2 updated
- glibc-2.38-7.1 updated
- libsepol2-3.5-2.196 added
- libpcre2-8-0-10.42-2.179 added
- libcrypt1-4.4.36-1.134 added
- libselinux1-3.5-3.1 added
- container:suse-toolbox-image-1.0.0-6.51 added
- container:bci-bci-busybox-15.5-- removed
- container:suse-sle-micro-5.5-latest-- removed
- elemental-register-1.4.4-150500.3.6.1 removed
- jq-1.6-3.3.1 removed
- libjq1-1.6-3.3.1 removed
- libonig4-6.7.0-150000.3.3.1 removed
More information about the sle-container-updates
mailing list