SUSE-CU-2022:3067-1: Security update of suse/sle-micro/5.1/toolbox

sle-security-updates at sle-security-updates at
Sun Nov 20 09:07:11 UTC 2022

SUSE Container Update Advisory: suse/sle-micro/5.1/toolbox
Container Advisory ID : SUSE-CU-2022:3067-1
Container Tags        : suse/sle-micro/5.1/toolbox:11.1 , suse/sle-micro/5.1/toolbox:11.1-2.2.318 , suse/sle-micro/5.1/toolbox:latest
Container Release     : 2.2.318
Severity              : important
Type                  : security
References            : 1190818 1199944 1203201 1204986 CVE-2022-1664 CVE-2022-43995

The container suse/sle-micro/5.1/toolbox was updated. The following patches have been included in this update:

Advisory ID: SUSE-SU-2022:4077-1
Released:    Fri Nov 18 15:05:28 2022
Summary:     Security update for sudo
Type:        security
Severity:    important
References:  1190818,1203201,1204986,CVE-2022-43995
This update for sudo fixes the following issues:

- CVE-2022-43995: Fixed a potential heap-based buffer over-read when entering a passwor dof seven characters or fewer and using the crypt() password backend (bsc#1204986).

- Fix wrong information output in the error message (bsc#1190818).
- Make sure SIGCHLD is not ignored when sudo is executed; fixes race condition (bsc#1203201).

Advisory ID: SUSE-SU-2022:4081-1
Released:    Fri Nov 18 15:40:46 2022
Summary:     Security update for dpkg
Type:        security
Severity:    low
References:  1199944,CVE-2022-1664
This update for dpkg fixes the following issues:

- CVE-2022-1664: Fixed a directory traversal vulnerability in Dpkg::Source::Archive (bsc#1199944).

The following package changes have been done:

- sudo-1.9.5p2-150300.3.13.1 updated
- update-alternatives- updated

More information about the sle-security-updates mailing list