SUSE-CU-2022:3015-1: Security update of suse/389-ds

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Thu Nov 17 09:02:43 UTC 2022


SUSE Container Update Advisory: suse/389-ds
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:3015-1
Container Tags        : suse/389-ds:2.0 , suse/389-ds:2.0-17.42 , suse/389-ds:latest
Container Release     : 17.42
Severity              : important
Type                  : security
References            : 1194119 1201959 1203652 1204179 1204211 1204493 1204748 1204968
                        1205146 CVE-2021-45710 CVE-2022-3821 
-----------------------------------------------------------------

The container suse/389-ds was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3961-1
Released:    Mon Nov 14 07:33:50 2022
Summary:     Recommended update for zlib
Type:        recommended
Severity:    important
References:  1203652
This update for zlib fixes the following issues:

- Fix updating strm.adler with inflate() if DFLTCC is used (bsc#1203652)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3974-1
Released:    Mon Nov 14 15:39:20 2022
Summary:     Recommended update for util-linux
Type:        recommended
Severity:    moderate
References:  1201959,1204211
This update for util-linux fixes the following issues:

- Fix file conflict during upgrade (bsc#1204211)
- libuuid improvements (bsc#1201959, PED-1150):
  libuuid: Fix range when parsing UUIDs.
  Improve cache handling for short running applications-increment the cache size over runtime.
  Implement continuous clock handling for time based UUIDs.
  Check clock value from clock file to provide seamless libuuid.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:3996-1
Released:    Tue Nov 15 17:06:52 2022
Summary:     Security update for 389-ds
Type:        security
Severity:    low
References:  1194119,1204493,1204748,1205146,CVE-2021-45710
This update for 389-ds fixes the following issues:

- CVE-2021-45710: Fixed tokio data race with memory corruption (bsc#1194119).

- Update to version 2.0.16~git56.d15a0a7:
- Failure to migrate from openldap if pwdPolicyChecker present (bsc#1205146). 
- Resolve issue with checklist post migration when dds is present (bsc#1204748). 
- Improve reliability of migrations from openldap when dynamic directory services is configured (bsc#1204493).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:3999-1
Released:    Tue Nov 15 17:08:04 2022
Summary:     Security update for systemd
Type:        security
Severity:    moderate
References:  1204179,1204968,CVE-2022-3821
This update for systemd fixes the following issues:

- CVE-2022-3821: Fixed buffer overrun in format_timespan() function (bsc#1204968).

- Import commit 0cd50eedcc0692c1f907b24424215f8db7d3b428
  * 0469b9f2bc pstore: do not try to load all known pstore modules
  * ad05f54439 pstore: Run after modules are loaded
  * ccad817445 core: Add trigger limit for path units
  * 281d818fe3 core/mount: also add default before dependency for automount mount units
  * ffe5b4afa8 logind: fix crash in logind on user-specified message string

- Document udev naming scheme (bsc#1204179)
- Make 'sle15-sp3' net naming scheme still available for backward compatibility
  reason


The following package changes have been done:

- libuuid1-2.37.2-150400.8.8.1 updated
- libsmartcols1-2.37.2-150400.8.8.1 updated
- libblkid1-2.37.2-150400.8.8.1 updated
- libfdisk1-2.37.2-150400.8.8.1 updated
- libz1-1.2.11-150000.3.36.1 updated
- libsystemd0-249.12-150400.8.13.1 updated
- libmount1-2.37.2-150400.8.8.1 updated
- util-linux-2.37.2-150400.8.8.1 updated
- libsvrcore0-2.0.16~git56.d15a0a7-150400.3.15.1 updated
- lib389-2.0.16~git56.d15a0a7-150400.3.15.1 updated
- 389-ds-2.0.16~git56.d15a0a7-150400.3.15.1 updated
- container:sles15-image-15.0.0-27.14.14 updated


More information about the sle-security-updates mailing list