SUSE-CU-2022:2264-1: Security update of suse/sles/15.4/cdi-importer
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Fri Sep 16 07:24:17 UTC 2022
SUSE Container Update Advisory: suse/sles/15.4/cdi-importer
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:2264-1
Container Tags : suse/sles/15.4/cdi-importer:1.43.0 , suse/sles/15.4/cdi-importer:1.43.0-150400.2.4 , suse/sles/15.4/cdi-importer:1.43.0.16.27
Container Release : 16.27
Severity : important
Type : security
References : 1197178 1198731 1198752 1200800 1202011 1202175 1202310 1202593
CVE-2022-35252 CVE-2022-37434
-----------------------------------------------------------------
The container suse/sles/15.4/cdi-importer was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:2929-1
Released: Mon Aug 29 11:21:47 2022
Summary: Recommended update for timezone
Type: recommended
Severity: important
References: 1202310
This update for timezone fixes the following issue:
- Reflect new Chile DST change (bsc#1202310)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:2947-1
Released: Wed Aug 31 09:16:21 2022
Summary: Security update for zlib
Type: security
Severity: important
References: 1202175,CVE-2022-37434
This update for zlib fixes the following issues:
- CVE-2022-37434: Fixed heap-based buffer over-read or buffer overflow via large gzip header extra field (bsc#1202175).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:2977-1
Released: Thu Sep 1 12:30:19 2022
Summary: Recommended update for util-linux
Type: recommended
Severity: moderate
References: 1197178,1198731
This update for util-linux fixes the following issues:
- agetty: Resolve tty name even if stdin is specified (bsc#1197178)
- libmount: When moving a mount point, update all sub mount entries in utab (bsc#1198731)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:3003-1
Released: Fri Sep 2 15:01:44 2022
Summary: Security update for curl
Type: security
Severity: low
References: 1202593,CVE-2022-35252
This update for curl fixes the following issues:
- CVE-2022-35252: Fixed a potential injection of control characters
into cookies, which could be exploited by sister sites to cause a
denial of service (bsc#1202593).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3118-1
Released: Tue Sep 6 15:43:53 2022
Summary: Recommended update for lvm2
Type: recommended
Severity: moderate
References: 1202011
This update for lvm2 fixes the following issues:
- Do not use udev for device listing or device information (bsc#1202011)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3127-1
Released: Wed Sep 7 04:36:10 2022
Summary: Recommended update for libtirpc
Type: recommended
Severity: moderate
References: 1198752,1200800
This update for libtirpc fixes the following issues:
- Exclude ipv6 addresses in client protocol version 2 code (bsc#1200800)
- Fix memory leak in params.r_addr assignement (bsc#1198752)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3217-1
Released: Thu Sep 8 21:14:58 2022
Summary: Recommended update for nbdkit
Type: recommended
Severity: important
References:
This update for nbdkit fixes the following issues:
- Update to version 1.30.7 (jsc#ECO-3633)
* configure: Use printf to print $ISOPROG
* configure: Print the version of curl, libnbd and libssh
* configure: Make the 'feature' function print the dots
* tests/test-protect.c: Fix typo in previous commit
* tests/test-protect.c: Skip test if 'disk' was not created
* common/include: Rename BUILD_BUG_ON_ZERO to something more meaningful
* common/include/test-array-size.c: Avoid Clang warning
* vddk: Demote another 'phone home' error message to debug
* Use ARRAY_SIZE macro in various places in nbdkit
* common/include: Add ARRAY_SIZE macro
* tests/test-parallel-sh.sh: Skip test under valgrind + debuginfod
* tests/test-parallel-sh.sh: Small cleanups
* server: Work around incorrect include in gnutls/socket.h
* server: Display kTLS setting in debug output
* exitwhen: Check nbdkit doesn't exit before the pipe is closed
* valgrind: Update comment about valgrind bug affecting OCaml
* ocaml: Add further valgrind suppression
* ocaml: Add valgrind suppression for OCaml 4.14 bug
* perl: Move GCC diagnostic ignored earlier
* docs/nbdkit-protocol.pod: block size support was added in 1.30
- Enable linuxdisk plugin
The following package changes have been done:
- libtirpc-netconfig-1.2.6-150300.3.11.1 updated
- libuuid1-2.37.2-150400.8.3.1 updated
- libsmartcols1-2.37.2-150400.8.3.1 updated
- libblkid1-2.37.2-150400.8.3.1 updated
- libfdisk1-2.37.2-150400.8.3.1 updated
- libz1-1.2.11-150000.3.33.1 updated
- libmount1-2.37.2-150400.8.3.1 updated
- libtirpc3-1.2.6-150300.3.11.1 updated
- sles-release-15.5-150500.10.2 updated
- libcurl4-7.79.1-150400.5.6.1 updated
- util-linux-2.37.2-150400.8.3.1 updated
- timezone-2022a-150000.75.10.1 updated
- libdevmapper1_03-1.02.163-150400.17.3.1 updated
- libnettle8-3.8.1-150500.1.4 updated
- libhogweed6-3.8.1-150500.1.4 updated
- libmpath0-0.9.1+52+suse.be8809e-150500.1.1 updated
- nbdkit-server-1.30.7-150400.3.3.1 updated
- util-linux-systemd-2.37.2-150400.8.3.1 updated
- nbdkit-xz-filter-1.30.7-150400.3.3.1 updated
- nbdkit-vddk-plugin-1.30.7-150400.3.3.1 updated
- nbdkit-gzip-filter-1.30.7-150400.3.3.1 updated
- nbdkit-curl-plugin-1.30.7-150400.3.3.1 updated
- nbdkit-basic-plugins-1.30.7-150400.3.3.1 updated
- nbdkit-basic-filters-1.30.7-150400.3.3.1 updated
- nbdkit-1.30.7-150400.3.3.1 updated
- container:sles15-image-15.0.0-31.13 updated
More information about the sle-security-updates
mailing list