SUSE-CU-2022:222-1: Security update of bci/ruby
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Feb 24 08:14:14 UTC 2022
SUSE Container Update Advisory: bci/ruby
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:222-1
Container Tags : bci/ruby:2.5 , bci/ruby:2.5-12.9 , bci/ruby:latest
Container Release : 12.9
Severity : important
Type : security
References : 1191826 1192637 1194178 1194265 1194968 1195054 1195217 CVE-2021-3997
CVE-2022-23852 CVE-2022-23990
-----------------------------------------------------------------
The container bci/ruby was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:383-1
Released: Tue Feb 15 17:47:36 2022
Summary: Recommended update for cyrus-sasl
Type: recommended
Severity: moderate
References: 1194265
This update for cyrus-sasl fixes the following issues:
- Fixed an issue when in postfix 'sasl' authentication with password fails. (bsc#1194265)
- Add config parameter '--with-dblib=gdbm'
- Avoid converting of '/etc/sasldb2 by every update. Convert '/etc/sasldb2' only if it is a Berkeley DB.
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:498-1
Released: Fri Feb 18 10:46:56 2022
Summary: Security update for expat
Type: security
Severity: important
References: 1195054,1195217,CVE-2022-23852,CVE-2022-23990
This update for expat fixes the following issues:
- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:520-1
Released: Fri Feb 18 12:45:19 2022
Summary: Recommended update for rpm
Type: recommended
Severity: moderate
References: 1194968
This update for rpm fixes the following issues:
- Revert unwanted /usr/bin/python to /usr/bin/python2 change we got with the update to 4.14.3 (bsc#1194968)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:539-1
Released: Mon Feb 21 13:47:51 2022
Summary: Security update for systemd
Type: security
Severity: moderate
References: 1191826,1192637,1194178,CVE-2021-3997
This update for systemd fixes the following issues:
- CVE-2021-3997: Fixed an uncontrolled recursion in systemd's systemd-tmpfiles (bsc#1194178).
The following non-security bugs were fixed:
- udev/net_id: don't generate slot based names if multiple devices might claim the same slot (bsc#1192637)
- localectl: don't omit keymaps files that are symlinks (bsc#1191826)
The following package changes have been done:
- libexpat1-2.2.5-3.12.1 updated
- libsasl2-3-2.1.27-150300.4.3.1 updated
- libsystemd0-246.16-150300.7.39.1 updated
- libudev1-246.16-150300.7.39.1 updated
- openssl-1_1-1.1.1d-11.38.1 added
- rpm-ndb-4.14.3-150300.46.1 updated
- container:sles15-image-15.0.0-17.8.81 updated
More information about the sle-security-updates
mailing list