SUSE-CU-2022:3015-1: Security update of suse/389-ds
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Nov 17 09:02:43 UTC 2022
SUSE Container Update Advisory: suse/389-ds
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:3015-1
Container Tags : suse/389-ds:2.0 , suse/389-ds:2.0-17.42 , suse/389-ds:latest
Container Release : 17.42
Severity : important
Type : security
References : 1194119 1201959 1203652 1204179 1204211 1204493 1204748 1204968
1205146 CVE-2021-45710 CVE-2022-3821
-----------------------------------------------------------------
The container suse/389-ds was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3961-1
Released: Mon Nov 14 07:33:50 2022
Summary: Recommended update for zlib
Type: recommended
Severity: important
References: 1203652
This update for zlib fixes the following issues:
- Fix updating strm.adler with inflate() if DFLTCC is used (bsc#1203652)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3974-1
Released: Mon Nov 14 15:39:20 2022
Summary: Recommended update for util-linux
Type: recommended
Severity: moderate
References: 1201959,1204211
This update for util-linux fixes the following issues:
- Fix file conflict during upgrade (bsc#1204211)
- libuuid improvements (bsc#1201959, PED-1150):
libuuid: Fix range when parsing UUIDs.
Improve cache handling for short running applications-increment the cache size over runtime.
Implement continuous clock handling for time based UUIDs.
Check clock value from clock file to provide seamless libuuid.
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:3996-1
Released: Tue Nov 15 17:06:52 2022
Summary: Security update for 389-ds
Type: security
Severity: low
References: 1194119,1204493,1204748,1205146,CVE-2021-45710
This update for 389-ds fixes the following issues:
- CVE-2021-45710: Fixed tokio data race with memory corruption (bsc#1194119).
- Update to version 2.0.16~git56.d15a0a7:
- Failure to migrate from openldap if pwdPolicyChecker present (bsc#1205146).
- Resolve issue with checklist post migration when dds is present (bsc#1204748).
- Improve reliability of migrations from openldap when dynamic directory services is configured (bsc#1204493).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:3999-1
Released: Tue Nov 15 17:08:04 2022
Summary: Security update for systemd
Type: security
Severity: moderate
References: 1204179,1204968,CVE-2022-3821
This update for systemd fixes the following issues:
- CVE-2022-3821: Fixed buffer overrun in format_timespan() function (bsc#1204968).
- Import commit 0cd50eedcc0692c1f907b24424215f8db7d3b428
* 0469b9f2bc pstore: do not try to load all known pstore modules
* ad05f54439 pstore: Run after modules are loaded
* ccad817445 core: Add trigger limit for path units
* 281d818fe3 core/mount: also add default before dependency for automount mount units
* ffe5b4afa8 logind: fix crash in logind on user-specified message string
- Document udev naming scheme (bsc#1204179)
- Make 'sle15-sp3' net naming scheme still available for backward compatibility
reason
The following package changes have been done:
- libuuid1-2.37.2-150400.8.8.1 updated
- libsmartcols1-2.37.2-150400.8.8.1 updated
- libblkid1-2.37.2-150400.8.8.1 updated
- libfdisk1-2.37.2-150400.8.8.1 updated
- libz1-1.2.11-150000.3.36.1 updated
- libsystemd0-249.12-150400.8.13.1 updated
- libmount1-2.37.2-150400.8.8.1 updated
- util-linux-2.37.2-150400.8.8.1 updated
- libsvrcore0-2.0.16~git56.d15a0a7-150400.3.15.1 updated
- lib389-2.0.16~git56.d15a0a7-150400.3.15.1 updated
- 389-ds-2.0.16~git56.d15a0a7-150400.3.15.1 updated
- container:sles15-image-15.0.0-27.14.14 updated
More information about the sle-security-updates
mailing list