SUSE-CU-2022:502-1: Security update of ses/7/ceph/prometheus-server
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Sun Apr 3 09:08:17 UTC 2022
SUSE Container Update Advisory: ses/7/ceph/prometheus-server
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:502-1
Container Tags : ses/7/ceph/prometheus-server:2.32.1 , ses/7/ceph/prometheus-server:2.32.1.1.8.12 , ses/7/ceph/prometheus-server:latest , ses/7/ceph/prometheus-server:sle15.2.octopus
Container Release : 1.8.12
Severity : important
Type : security
References : 1121227 1121230 1122004 1122021 1195258 1195899 1196093 1197024
1197459 CVE-2018-20573 CVE-2018-20574 CVE-2018-25032 CVE-2019-6285
CVE-2019-6292 CVE-2021-22570
-----------------------------------------------------------------
The container ses/7/ceph/prometheus-server was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:1021-1
Released: Tue Mar 29 13:24:21 2022
Summary: Recommended update for systemd
Type: recommended
Severity: moderate
References: 1195899
This update for systemd fixes the following issues:
- allow setting external core size to infinity (bsc#1195899 jsc#SLE-23868 jsc#SLE-23870)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1040-1
Released: Wed Mar 30 09:40:58 2022
Summary: Security update for protobuf
Type: security
Severity: moderate
References: 1195258,CVE-2021-22570
This update for protobuf fixes the following issues:
- CVE-2021-22570: Fix incorrect parsing of nullchar in the proto symbol (bsc#1195258).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:1047-1
Released: Wed Mar 30 16:20:56 2022
Summary: Recommended update for pam
Type: recommended
Severity: moderate
References: 1196093,1197024
This update for pam fixes the following issues:
- Define _pam_vendordir as the variable is needed by systemd and others. (bsc#1196093)
- Between allocating the variable 'ai' and free'ing them, there are two 'return NO' were we don't free this variable.
This patch inserts freaddrinfo() calls before the 'return NO;'s. (bsc#1197024)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1061-1
Released: Wed Mar 30 18:27:06 2022
Summary: Security update for zlib
Type: security
Severity: important
References: 1197459,CVE-2018-25032
This update for zlib fixes the following issues:
- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1073-1
Released: Fri Apr 1 11:45:01 2022
Summary: Security update for yaml-cpp
Type: security
Severity: moderate
References: 1121227,1121230,1122004,1122021,CVE-2018-20573,CVE-2018-20574,CVE-2019-6285,CVE-2019-6292
This update for yaml-cpp fixes the following issues:
- CVE-2018-20573: Fixed remote DOS via a crafted YAML file in function Scanner:EnsureTokensInQueue (bsc#1121227).
- CVE-2018-20574: Fixed remote DOS via a crafted YAML file in function SingleDocParser:HandleFlowMap (bsc#1121230).
- CVE-2019-6285: Fixed remote DOS via a crafted YAML file in function SingleDocParser::HandleFlowSequence (bsc#1122004).
- CVE-2019-6292: Fixed DOS by stack consumption in singledocparser.cpp (bsc#1122021).
The following package changes have been done:
- libprotobuf-lite20-3.9.2-4.12.1 updated
- libsystemd0-234-24.108.1 updated
- libudev1-234-24.108.1 updated
- libyaml-cpp0_6-0.6.1-4.5.1 updated
- libz1-1.2.11-150000.3.30.1 updated
- pam-1.3.0-150000.6.55.3 updated
- container:sles15-image-15.0.0-9.5.113 updated
More information about the sle-security-updates
mailing list