SUSE-CU-2022:961-1: Security update of bci/bci-init

sle-security-updates at sle-security-updates at
Wed May 11 07:55:47 UTC 2022

SUSE Container Update Advisory: bci/bci-init
Container Advisory ID : SUSE-CU-2022:961-1
Container Tags        : bci/bci-init:15.3 , bci/bci-init: , bci/bci-init:latest
Container Release     : 14.12
Severity              : important
Type                  : security
References            : 1198062 1198090 1198114 1198922 CVE-2022-1271 

The container bci/bci-init was updated. The following patches have been included in this update:

Advisory ID: SUSE-SU-2022:1617-1
Released:    Tue May 10 14:40:12 2022
Summary:     Security update for gzip
Type:        security
Severity:    important
References:  1198062,1198922,CVE-2022-1271
This update for gzip fixes the following issues:

- CVE-2022-1271: Fix escaping of malicious filenames. (bsc#1198062)

Advisory ID: SUSE-RU-2022:1626-1
Released:    Tue May 10 15:55:13 2022
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  1198090,1198114
This update for systemd fixes the following issues:

- tmpfiles.d: only 'w+' can have multiple lines for the same path (bsc#1198090)
- journald: make sure journal_file_open() doesn't leave a corrupted file around after failing (bsc#1198114)
- tmpfiles: constify item_compatible() parameters
- test tmpfiles: add a test for 'w+'
- test: add test checking tmpfiles conf file precedence
- journald: make use of CLAMP() in cache_space_refresh()
- journal-file: port journal_file_open() to openat_report_new()
- fs-util: make sure openat_report_new() initializes return param also on shortcut
- fs-util: fix typos in comments
- fs-util: add openat_report_new() wrapper around openat()

The following package changes have been done:

- gzip-1.10-150200.10.1 updated
- libsystemd0-246.16-150300.7.45.1 updated
- libudev1-246.16-150300.7.45.1 updated
- systemd-246.16-150300.7.45.1 updated
- udev-246.16-150300.7.45.1 updated
- container:sles15-image-15.0.0-17.14.10 updated

More information about the sle-security-updates mailing list