SUSE-CU-2020:332-1: Security update of caasp/v5/configmap-reload
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Sat Jun 20 15:25:52 MDT 2020
SUSE Container Update Advisory: caasp/v5/configmap-reload
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2020:332-1
Container Tags : caasp/v5/configmap-reload:0.3.0 , caasp/v5/configmap-reload:0.3.0-rev1 , caasp/v5/configmap-reload:0.3.0-rev1-build1.48 , caasp/v5/configmap-reload:beta
Container Release : 1.48
Severity : important
Type : security
References : 1171863 1171864 1171866 1172348 CVE-2020-10543 CVE-2020-10878
CVE-2020-12723
-----------------------------------------------------------------
The container caasp/v5/configmap-reload was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2020:1682-1
Released: Fri Jun 19 09:44:54 2020
Summary: Security update for perl
Type: security
Severity: important
References: 1171863,1171864,1171866,1172348,CVE-2020-10543,CVE-2020-10878,CVE-2020-12723
This update for perl fixes the following issues:
- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have
allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of
instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a
compiled regular expression (bsc#1171866).
- Fixed a bad warning in features.ph (bsc#1172348).
More information about the sle-security-updates
mailing list