SUSE-CU-2022:1767-1: Security update of bci/golang
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Fri Aug 5 07:15:26 UTC 2022
SUSE Container Update Advisory: bci/golang
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:1767-1
Container Tags : bci/golang:1.18 , bci/golang:1.18-7.30 , bci/golang:latest
Container Release : 7.30
Severity : important
Type : security
References : 1193742 1198720 1200747 1201385 1201434 1201436 1201437 1201440
1201443 1201444 1201445 1201447 1201448 1202035 CVE-2022-1705
CVE-2022-1962 CVE-2022-28131 CVE-2022-30630 CVE-2022-30631 CVE-2022-30632
CVE-2022-30633 CVE-2022-30635 CVE-2022-32148 CVE-2022-32189
-----------------------------------------------------------------
The container bci/golang was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:2632-1
Released: Wed Aug 3 09:51:00 2022
Summary: Security update for permissions
Type: security
Severity: important
References: 1198720,1200747,1201385
This update for permissions fixes the following issues:
* apptainer: fix starter-suid location (bsc#1198720)
* static permissions: remove deprecated bind / named chroot entries (bsc#1200747)
* postfix: add postlog setgid for maildrop binary (bsc#1201385)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:2672-1
Released: Thu Aug 4 14:06:24 2022
Summary: Security update for go1.18
Type: security
Severity: important
References: 1193742,1201434,1201436,1201437,1201440,1201443,1201444,1201445,1201447,1201448,1202035,CVE-2022-1705,CVE-2022-1962,CVE-2022-28131,CVE-2022-30630,CVE-2022-30631,CVE-2022-30632,CVE-2022-30633,CVE-2022-30635,CVE-2022-32148,CVE-2022-32189
This update for go1.18 fixes the following issues:
Update to go version 1.18.5 (bsc#1193742):
- CVE-2022-32189: encoding/gob, math/big: decoding big.Float and big.Rat can panic (bsc#1202035).
- CVE-2022-1705: net/http: improper sanitization of Transfer-Encoding header (bsc#1201434)
- CVE-2022-32148: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (bsc#1201436)
- CVE-2022-30631: compress/gzip: stack exhaustion in Reader.Read (bsc#1201437).
- CVE-2022-30633: encoding/xml: stack exhaustion in Unmarshal (bsc#1201440).
- CVE-2022-28131: encoding/xml: stack exhaustion in Decoder.Skip (bsc#1201443).
- CVE-2022-30635: encoding/gob: stack exhaustion in Decoder.Decode (bsc#1201444).
- CVE-2022-30632: path/filepath: stack exhaustion in Glob (bsc#1201445).
- CVE-2022-30630: io/fs: stack exhaustion in Glob (bsc#1201447).
- CVE-2022-1962: go/parser: stack exhaustion in all Parse* functions (bsc#1201448).
The following package changes have been done:
- permissions-20201225-150400.5.8.1 updated
- go1.18-1.18.5-150000.1.25.1 updated
- container:sles15-image-15.0.0-27.11.9 updated
More information about the sle-security-updates
mailing list