SUSE-CU-2022:961-1: Security update of bci/bci-init
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Wed May 11 07:55:47 UTC 2022
SUSE Container Update Advisory: bci/bci-init
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:961-1
Container Tags : bci/bci-init:15.3 , bci/bci-init:15.3.14.12 , bci/bci-init:latest
Container Release : 14.12
Severity : important
Type : security
References : 1198062 1198090 1198114 1198922 CVE-2022-1271
-----------------------------------------------------------------
The container bci/bci-init was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1617-1
Released: Tue May 10 14:40:12 2022
Summary: Security update for gzip
Type: security
Severity: important
References: 1198062,1198922,CVE-2022-1271
This update for gzip fixes the following issues:
- CVE-2022-1271: Fix escaping of malicious filenames. (bsc#1198062)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:1626-1
Released: Tue May 10 15:55:13 2022
Summary: Recommended update for systemd
Type: recommended
Severity: moderate
References: 1198090,1198114
This update for systemd fixes the following issues:
- tmpfiles.d: only 'w+' can have multiple lines for the same path (bsc#1198090)
- journald: make sure journal_file_open() doesn't leave a corrupted file around after failing (bsc#1198114)
- tmpfiles: constify item_compatible() parameters
- test tmpfiles: add a test for 'w+'
- test: add test checking tmpfiles conf file precedence
- journald: make use of CLAMP() in cache_space_refresh()
- journal-file: port journal_file_open() to openat_report_new()
- fs-util: make sure openat_report_new() initializes return param also on shortcut
- fs-util: fix typos in comments
- fs-util: add openat_report_new() wrapper around openat()
The following package changes have been done:
- gzip-1.10-150200.10.1 updated
- libsystemd0-246.16-150300.7.45.1 updated
- libudev1-246.16-150300.7.45.1 updated
- systemd-246.16-150300.7.45.1 updated
- udev-246.16-150300.7.45.1 updated
- container:sles15-image-15.0.0-17.14.10 updated
More information about the sle-security-updates
mailing list