SUSE-CU-2022:605-1: Security update of bci/golang

sle-security-updates at sle-security-updates at
Thu Apr 14 10:10:59 UTC 2022

SUSE Container Update Advisory: bci/golang
Container Advisory ID : SUSE-CU-2022:605-1
Container Tags        : bci/golang:1.17 , bci/golang:1.17-13.4
Container Release     : 13.4
Severity              : important
Type                  : security
References            : 1183043 1184501 1190649 1191502 1193086 1194848 1195247 1195529
                        1195899 1195999 1196061 1196317 1196368 1196514 1196567 1196732
                        1196925 1197134 1198062 CVE-2022-1271 CVE-2022-24921 

The container bci/golang was updated. The following patches have been included in this update:

Advisory ID: SUSE-SU-2022:1157-1
Released:    Tue Apr 12 13:26:19 2022
Summary:     Security update for libsolv, libzypp, zypper
Type:        security
Severity:    important
References:  1184501,1194848,1195999,1196061,1196317,1196368,1196514,1196925,1197134
This update for libsolv, libzypp, zypper fixes the following issues:

Security relevant fix:

- Harden package signature checks (bsc#1184501).

libsolv update to 0.7.22:

- reworked choice rule generation to cover more usecases
- support SOLVABLE_PREREQ_IGNOREINST in the ordering code (bsc#1196514)
- support parsing of Debian's Multi-Arch indicator
- fix segfault on conflict resolution when using bindings
- fix split provides not working if the update includes a forbidden vendor change
- support strict repository priorities
- support zstd compressed control files in debian packages
- add an ifdef allowing to rename Solvable dependency members ('requires' is a keyword in C++20)
- support setting/reading userdata in solv files
  new functions: repowriter_set_userdata, solv_read_userdata
- support queying of the custom vendor check function
  new function: pool_get_custom_vendorcheck
- support solv files with an idarray block
- allow accessing the toolversion at runtime

libzypp update to 17.30.0:

- ZConfig: Update solver settings if target changes (bsc#1196368)
- Fix possible hang in singletrans mode (bsc#1197134)
- Do 2 retries if mount is still busy.
- Fix package signature check (bsc#1184501)
  Pay attention that header and payload are secured by a valid
  signature and report more detailed which signature is missing.
- Retry umount if device is busy (bsc#1196061, closes #381)
  A previously released ISO image may need a bit more time to
  release it's loop device. So we wait a bit and retry.
- Fix serializing/deserializing type mismatch in zypp-rpm protocol (bsc#1196925)
- Fix handling of ISO media in releaseAll (bsc#1196061)
- Hint on common ptf resolver conflicts (bsc#1194848)
- Hint on ptf<>patch resolver conflicts (bsc#1194848)

zypper update to 1.14.52:

- info: print the packages upstream URL if available (fixes #426)
- info: Fix SEGV with not installed PTFs (bsc#1196317)
- Don't prevent less restrictive umasks (bsc#1195999)

Advisory ID: SUSE-SU-2022:1158-1
Released:    Tue Apr 12 14:44:43 2022
Summary:     Security update for xz
Type:        security
Severity:    important
References:  1198062,CVE-2022-1271
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)

Advisory ID: SUSE-SU-2022:1167-1
Released:    Tue Apr 12 17:51:47 2022
Summary:     Security update for go1.17
Type:        security
Severity:    important
References:  1183043,1190649,1196732,CVE-2022-24921
This update for go1.17 fixes the following issues:

Update to version 1.17.8 (bsc#1190649):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51332).
  - Fixed an issue when building source in riscv64 (go#51199).
  - Increased compatibility for the DNS protocol in the net module (go#51162).
  - Fixed an issue with histograms in the runtime/metrics module (go#50734).
  - Fixed an issue when parsing x509 certificates (go#51000).

Advisory ID: SUSE-RU-2022:1170-1
Released:    Tue Apr 12 18:20:07 2022
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  1191502,1193086,1195247,1195529,1195899,1196567
This update for systemd fixes the following issues:

- Fix the default target when it's been incorrectly set to one of the runlevel targets (bsc#1196567)
- When migrating from sysvinit to systemd (it probably won't happen anymore),
  let's use the default systemd target, which is the one.
- Don't open /var journals in volatile mode when runtime_journal==NULL
- udev: 60-persistent-storage-tape.rules: handle duplicate device ID (bsc#1195529)
- man: tweak description of auto/noauto (bsc#1191502)
- shared/install: ignore failures for auxiliary files
- install: make UnitFileChangeType enum anonymous
- shared/install: reduce scope of iterator variables
- systemd-coredump: allow setting external core size to infinity (bsc#1195899 jsc#SLE-23867)
- Update s390 udev rules conversion script to include the case when the legacy rule was also 41-* (bsc#1195247)
- Drop or soften some of the deprecation warnings (bsc#1193086)

The following package changes have been done:

- go1.17-1.17.8-150000.1.25.1 updated
- liblzma5-5.2.3-150000.4.7.1 updated
- libsolv-tools-0.7.22-150200.12.1 updated
- libsystemd0-246.16-150300.7.42.1 updated
- libudev1-246.16-150300.7.42.1 updated
- libzypp-17.30.0-150200.36.1 updated
- zypper-1.14.52-150200.30.2 updated
- container:sles15-image-15.0.0-17.11.26 updated

More information about the sle-security-updates mailing list