SUSE-CU-2022:237-1: Security update of trento/trento-db
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Mon Feb 28 16:29:04 UTC 2022
SUSE Container Update Advisory: trento/trento-db
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:237-1
Container Tags : trento/trento-db:14.1 , trento/trento-db:14.1-rev1.0.0 , trento/trento-db:14.1-rev1.0.0-build2.2.34 , trento/trento-db:latest
Container Release : 2.2.34
Severity : important
Type : security
References : 1191826 1192637 1193086 1194178 1194640 1194768 1194770 1194785
1195054 1195217 CVE-2021-3997 CVE-2021-3999 CVE-2022-23218 CVE-2022-23219
CVE-2022-23852 CVE-2022-23990
-----------------------------------------------------------------
The container trento/trento-db was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:330-1
Released: Fri Feb 4 09:29:08 2022
Summary: Security update for glibc
Type: security
Severity: important
References: 1194640,1194768,1194770,1194785,CVE-2021-3999,CVE-2022-23218,CVE-2022-23219
This update for glibc fixes the following issues:
- CVE-2021-3999: Fixed incorrect errno in getcwd (bsc#1194640)
- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770)
Features added:
- IBM Power 10 string operation improvements (bsc#1194785, jsc#SLE-18195)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:343-1
Released: Mon Feb 7 15:16:58 2022
Summary: Recommended update for systemd
Type: recommended
Severity: moderate
References: 1193086
This update for systemd fixes the following issues:
- disable DNSSEC until the following issue is solved: https://github.com/systemd/systemd/issues/10579
- disable fallback DNS servers and fail when no DNS server info could be obtained from the links.
- DNSSEC support requires openssl therefore document this build dependency in systemd-network sub-package.
- Improve warning messages (bsc#1193086).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:498-1
Released: Fri Feb 18 10:46:56 2022
Summary: Security update for expat
Type: security
Severity: important
References: 1195054,1195217,CVE-2022-23852,CVE-2022-23990
This update for expat fixes the following issues:
- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:539-1
Released: Mon Feb 21 13:47:51 2022
Summary: Security update for systemd
Type: security
Severity: moderate
References: 1191826,1192637,1194178,CVE-2021-3997
This update for systemd fixes the following issues:
- CVE-2021-3997: Fixed an uncontrolled recursion in systemd's systemd-tmpfiles (bsc#1194178).
The following non-security bugs were fixed:
- udev/net_id: don't generate slot based names if multiple devices might claim the same slot (bsc#1192637)
- localectl: don't omit keymaps files that are symlinks (bsc#1191826)
The following package changes have been done:
- glibc-locale-base-2.31-150300.9.12.1 updated
- libexpat1-2.2.5-3.12.1 updated
- glibc-locale-2.31-150300.9.12.1 updated
- systemd-246.16-150300.7.39.1 updated
- udev-246.16-150300.7.39.1 updated
More information about the sle-security-updates
mailing list