SUSE-CU-2022:483-1: Security update of bci/bci-init

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Sat Apr 2 08:03:23 UTC 2022


SUSE Container Update Advisory: bci/bci-init
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:483-1
Container Tags        : bci/bci-init:15.3 , bci/bci-init:15.3.11.45 , bci/bci-init:latest
Container Release     : 11.45
Severity              : moderate
Type                  : security
References            : 1121227 1121230 1122004 1122021 CVE-2018-20573 CVE-2018-20574
                        CVE-2019-6285 CVE-2019-6292 
-----------------------------------------------------------------

The container bci/bci-init was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1073-1
Released:    Fri Apr  1 11:45:01 2022
Summary:     Security update for yaml-cpp
Type:        security
Severity:    moderate
References:  1121227,1121230,1122004,1122021,CVE-2018-20573,CVE-2018-20574,CVE-2019-6285,CVE-2019-6292
This update for yaml-cpp fixes the following issues:

- CVE-2018-20573: Fixed remote DOS via a crafted YAML file in function Scanner:EnsureTokensInQueue (bsc#1121227).
- CVE-2018-20574: Fixed remote DOS via a crafted YAML file in function SingleDocParser:HandleFlowMap (bsc#1121230).
- CVE-2019-6285: Fixed remote DOS via a crafted YAML file in function SingleDocParser::HandleFlowSequence (bsc#1122004).
- CVE-2019-6292: Fixed DOS by stack consumption in singledocparser.cpp (bsc#1122021).


The following package changes have been done:

- libyaml-cpp0_6-0.6.1-4.5.1 updated
- container:sles15-image-15.0.0-17.11.17 updated


More information about the sle-security-updates mailing list