SUSE-CU-2022:276-1: Security update of suse/sle15

sle-security-updates at sle-security-updates at
Tue Mar 15 08:37:05 UTC 2022

SUSE Container Update Advisory: suse/sle15
Container Advisory ID : SUSE-CU-2022:276-1
Container Tags        : suse/sle15:15.0 , suse/sle15:
Container Release     : 4.22.524
Severity              : important
Type                  : security
References            : 1193625 1194640 1194768 1194770 1195258 1195560 CVE-2015-8985
                        CVE-2021-22570 CVE-2021-3999 CVE-2022-23218 CVE-2022-23219 

The container suse/sle15 was updated. The following patches have been included in this update:

Advisory ID: SUSE-SU-2022:823-1
Released:    Mon Mar 14 15:16:37 2022
Summary:     Security update for protobuf
Type:        security
Severity:    moderate
References:  1195258,CVE-2021-22570
This update for protobuf fixes the following issues:

- CVE-2021-22570: Fix incorrect parsing of nullchar in the proto symbol (bsc#1195258).

Advisory ID: SUSE-SU-2022:832-1
Released:    Mon Mar 14 17:27:03 2022
Summary:     Security update for glibc
Type:        security
Severity:    important
References:  1193625,1194640,1194768,1194770,1195560,CVE-2015-8985,CVE-2021-3999,CVE-2022-23218,CVE-2022-23219

glibc was updated to fix the following issues:

Security issues fixed:

- CVE-2022-23219: Fixed Buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
- CVE-2015-8985: Fixed Assertion failure in pop_fail_stack when executing a malformed regexp (bsc#1193625)

Also the following bug was fixed:

- Fix pthread_rwlock_try*lock stalls (bsc#1195560)

The following package changes have been done:

- glibc-2.26-13.65.1 updated
- libprotobuf-lite15-3.5.0-5.5.1 updated

More information about the sle-security-updates mailing list