SUSE-CU-2021:357-1: Security update of suse/sles12sp3

sle-security-updates at sle-security-updates at
Tue Sep 28 06:35:51 UTC 2021

SUSE Container Update Advisory: suse/sles12sp3
Container Advisory ID : SUSE-CU-2021:357-1
Container Tags        : suse/sles12sp3:2.0.2 , suse/sles12sp3:24.306 , suse/sles12sp3:latest
Container Release     : 24.306
Severity              : important
Type                  : security
References            : 1190373 1190374 1190858 CVE-2021-22946 CVE-2021-22947 

The container suse/sles12sp3 was updated. The following patches have been included in this update:

Advisory ID: SUSE-SU-2021:3176-1
Released:    Tue Sep 21 16:28:07 2021
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1190373,1190374,CVE-2021-22946,CVE-2021-22947
This update for curl fixes the following issues:

- CVE-2021-22947: Fixed STARTTLS protocol injection via MITM (bsc#1190374).
- CVE-2021-22946: Fixed protocol downgrade required TLS bypassed (bsc#1190373).

Advisory ID: SUSE-RU-2021:3230-1
Released:    Mon Sep 27 11:19:10 2021
Summary:     Recommended update for ca-certificates-mozilla
Type:        recommended
Severity:    important
References:  1190858
This update for ca-certificates-mozilla fixes the following issues:

- remove one of the Letsencrypt CAs DST_Root_CA_X3.pem, as it expires
  September 30th 2021 and openssl certificate chain handling does not
  handle this correctly in SUSE Linux Enterprise 12 and older.  (bsc#1190858)

More information about the sle-security-updates mailing list