SUSE-CU-2022:3025-1: Security update of bci/golang

sle-security-updates at sle-security-updates at
Fri Nov 18 08:51:15 UTC 2022

SUSE Container Update Advisory: bci/golang
Container Advisory ID : SUSE-CU-2022:3025-1
Container Tags        : bci/golang:1.19 , bci/golang:1.19-18.29 , bci/golang:latest
Container Release     : 18.29
Severity              : important
Type                  : security
References            : 1200441 1201959 1203652 1204179 1204211 1204941 1204968 CVE-2022-3821

The container bci/golang was updated. The following patches have been included in this update:

Advisory ID: SUSE-RU-2022:3961-1
Released:    Mon Nov 14 07:33:50 2022
Summary:     Recommended update for zlib
Type:        recommended
Severity:    important
References:  1203652
This update for zlib fixes the following issues:

- Fix updating strm.adler with inflate() if DFLTCC is used (bsc#1203652)

Advisory ID: SUSE-RU-2022:3974-1
Released:    Mon Nov 14 15:39:20 2022
Summary:     Recommended update for util-linux
Type:        recommended
Severity:    moderate
References:  1201959,1204211
This update for util-linux fixes the following issues:

- Fix file conflict during upgrade (bsc#1204211)
- libuuid improvements (bsc#1201959, PED-1150):
  libuuid: Fix range when parsing UUIDs.
  Improve cache handling for short running applications-increment the cache size over runtime.
  Implement continuous clock handling for time based UUIDs.
  Check clock value from clock file to provide seamless libuuid.

Advisory ID: SUSE-SU-2022:3999-1
Released:    Tue Nov 15 17:08:04 2022
Summary:     Security update for systemd
Type:        security
Severity:    moderate
References:  1204179,1204968,CVE-2022-3821
This update for systemd fixes the following issues:

- CVE-2022-3821: Fixed buffer overrun in format_timespan() function (bsc#1204968).

- Import commit 0cd50eedcc0692c1f907b24424215f8db7d3b428
  * 0469b9f2bc pstore: do not try to load all known pstore modules
  * ad05f54439 pstore: Run after modules are loaded
  * ccad817445 core: Add trigger limit for path units
  * 281d818fe3 core/mount: also add default before dependency for automount mount units
  * ffe5b4afa8 logind: fix crash in logind on user-specified message string

- Document udev naming scheme (bsc#1204179)
- Make 'sle15-sp3' net naming scheme still available for backward compatibility

Advisory ID: SUSE-SU-2022:4054-1
Released:    Thu Nov 17 15:36:58 2022
Summary:     Security update for go1.19
Type:        security
Severity:    low
References:  1200441,1204941,CVE-2022-41716
This update for go1.19 fixes the following issues:

  Update to go 1.19.3 (released 2022-11-01) (bsc#1200441):

  Security fixes:
  - CVE-2022-41716: Fixed unsanitized NUL in environment variables in syscalls, os/exec (go#56327) (bsc#1204941).

  - runtime: lock count' fatal error when cgo is enabled (go#56308).
  - cmd/compile: libFuzzer instrumentation fakePC overflow on 386 arch (go#56168).
  - internal/fuzz: array literal initialization causes ICE 'unhandled stmt ASOP' while fuzzing (go#56106).

The following package changes have been done:

- libuuid1-2.37.2-150400.8.8.1 updated
- libudev1-249.12-150400.8.13.1 updated
- libsmartcols1-2.37.2-150400.8.8.1 updated
- libblkid1-2.37.2-150400.8.8.1 updated
- libfdisk1-2.37.2-150400.8.8.1 updated
- libz1-1.2.11-150000.3.36.1 updated
- libsystemd0-249.12-150400.8.13.1 updated
- libmount1-2.37.2-150400.8.8.1 updated
- util-linux-2.37.2-150400.8.8.1 updated
- go1.19-1.19.3-150000.1.15.1 updated
- container:sles15-image-15.0.0-27.14.14 updated

More information about the sle-security-updates mailing list