SUSE-CU-2022:3505-1: Security update of bci/ruby

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Dec 30 08:55:44 UTC 2022


SUSE Container Update Advisory: bci/ruby
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:3505-1
Container Tags        : bci/ruby:2 , bci/ruby:2.5 , bci/ruby:2.5-32.7 , bci/ruby:latest
Container Release     : 32.7
Severity              : important
Type                  : security
References            : 1200723 1205000 1206337 CVE-2022-4415 CVE-2022-46908 
-----------------------------------------------------------------

The container bci/ruby was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:4628-1
Released:    Wed Dec 28 09:23:13 2022
Summary:     Security update for sqlite3
Type:        security
Severity:    moderate
References:  1206337,CVE-2022-46908
This update for sqlite3 fixes the following issues:

- CVE-2022-46908: Properly implement the azProhibitedFunctions protection mechanism, 
  when relying on --safe for execution of an untrusted CLI script (bsc#1206337).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:4629-1
Released:    Wed Dec 28 09:24:07 2022
Summary:     Security update for systemd
Type:        security
Severity:    important
References:  1200723,1205000,CVE-2022-4415
This update for systemd fixes the following issues:

- CVE-2022-4415: Fixed systemd-coredump that did not respect the fs.suid_dumpable kernel setting (bsc#1205000).

Bug fixes:

- Support by-path devlink for multipath nvme block devices (bsc#1200723).


The following package changes have been done:

- libudev1-249.12-150400.8.16.1 updated
- libsqlite3-0-3.39.3-150000.3.20.1 updated
- libsystemd0-249.12-150400.8.16.1 updated
- sqlite3-devel-3.39.3-150000.3.20.1 updated


More information about the sle-security-updates mailing list