SUSE-CU-2022:237-1: Security update of trento/trento-db

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon Feb 28 16:29:04 UTC 2022


SUSE Container Update Advisory: trento/trento-db
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:237-1
Container Tags        : trento/trento-db:14.1 , trento/trento-db:14.1-rev1.0.0 , trento/trento-db:14.1-rev1.0.0-build2.2.34 , trento/trento-db:latest
Container Release     : 2.2.34
Severity              : important
Type                  : security
References            : 1191826 1192637 1193086 1194178 1194640 1194768 1194770 1194785
                        1195054 1195217 CVE-2021-3997 CVE-2021-3999 CVE-2022-23218 CVE-2022-23219
                        CVE-2022-23852 CVE-2022-23990 
-----------------------------------------------------------------

The container trento/trento-db was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:330-1
Released:    Fri Feb  4 09:29:08 2022
Summary:     Security update for glibc
Type:        security
Severity:    important
References:  1194640,1194768,1194770,1194785,CVE-2021-3999,CVE-2022-23218,CVE-2022-23219

This update for glibc fixes the following issues:

- CVE-2021-3999: Fixed incorrect errno in getcwd (bsc#1194640)
- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770)

Features added:

- IBM Power 10 string operation improvements (bsc#1194785, jsc#SLE-18195)


-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:343-1
Released:    Mon Feb  7 15:16:58 2022
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  1193086
This update for systemd fixes the following issues:

- disable DNSSEC until the following issue is solved: https://github.com/systemd/systemd/issues/10579
- disable fallback DNS servers and fail when no DNS server info could be obtained from the links.
- DNSSEC support requires openssl therefore document this build dependency in systemd-network sub-package.
- Improve warning messages (bsc#1193086).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:498-1
Released:    Fri Feb 18 10:46:56 2022
Summary:     Security update for expat
Type:        security
Severity:    important
References:  1195054,1195217,CVE-2022-23852,CVE-2022-23990
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:539-1
Released:    Mon Feb 21 13:47:51 2022
Summary:     Security update for systemd
Type:        security
Severity:    moderate
References:  1191826,1192637,1194178,CVE-2021-3997
This update for systemd fixes the following issues:

- CVE-2021-3997: Fixed an uncontrolled recursion in systemd's systemd-tmpfiles (bsc#1194178).

The following non-security bugs were fixed:
- udev/net_id: don't generate slot based names if multiple devices might claim the same slot (bsc#1192637)
- localectl: don't omit keymaps files that are symlinks (bsc#1191826)


The following package changes have been done:

- glibc-locale-base-2.31-150300.9.12.1 updated
- libexpat1-2.2.5-3.12.1 updated
- glibc-locale-2.31-150300.9.12.1 updated
- systemd-246.16-150300.7.39.1 updated
- udev-246.16-150300.7.39.1 updated


More information about the sle-security-updates mailing list