SUSE-CU-2022:2264-1: Security update of suse/sles/15.4/cdi-importer

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Sep 16 07:24:17 UTC 2022


SUSE Container Update Advisory: suse/sles/15.4/cdi-importer
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:2264-1
Container Tags        : suse/sles/15.4/cdi-importer:1.43.0 , suse/sles/15.4/cdi-importer:1.43.0-150400.2.4 , suse/sles/15.4/cdi-importer:1.43.0.16.27
Container Release     : 16.27
Severity              : important
Type                  : security
References            : 1197178 1198731 1198752 1200800 1202011 1202175 1202310 1202593
                        CVE-2022-35252 CVE-2022-37434 
-----------------------------------------------------------------

The container suse/sles/15.4/cdi-importer was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:2929-1
Released:    Mon Aug 29 11:21:47 2022
Summary:     Recommended update for timezone
Type:        recommended
Severity:    important
References:  1202310
This update for timezone fixes the following issue:

- Reflect new Chile DST change (bsc#1202310)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:2947-1
Released:    Wed Aug 31 09:16:21 2022
Summary:     Security update for zlib
Type:        security
Severity:    important
References:  1202175,CVE-2022-37434
This update for zlib fixes the following issues:

- CVE-2022-37434: Fixed heap-based buffer over-read or buffer overflow via large gzip header extra field (bsc#1202175).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:2977-1
Released:    Thu Sep  1 12:30:19 2022
Summary:     Recommended update for util-linux
Type:        recommended
Severity:    moderate
References:  1197178,1198731
This update for util-linux fixes the following issues:

- agetty: Resolve tty name even if stdin is specified (bsc#1197178)
- libmount: When moving a mount point, update all sub mount entries in utab (bsc#1198731)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:3003-1
Released:    Fri Sep  2 15:01:44 2022
Summary:     Security update for curl
Type:        security
Severity:    low
References:  1202593,CVE-2022-35252
This update for curl fixes the following issues:

- CVE-2022-35252: Fixed a potential injection of control characters
  into cookies, which could be exploited by sister sites to cause a
  denial of service (bsc#1202593).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3118-1
Released:    Tue Sep  6 15:43:53 2022
Summary:     Recommended update for lvm2
Type:        recommended
Severity:    moderate
References:  1202011
This update for lvm2 fixes the following issues:

- Do not use udev for device listing or device information (bsc#1202011)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3127-1
Released:    Wed Sep  7 04:36:10 2022
Summary:     Recommended update for libtirpc
Type:        recommended
Severity:    moderate
References:  1198752,1200800
This update for libtirpc fixes the following issues:

- Exclude ipv6 addresses in client protocol version 2 code (bsc#1200800)
- Fix memory leak in params.r_addr assignement (bsc#1198752)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3217-1
Released:    Thu Sep  8 21:14:58 2022
Summary:     Recommended update for nbdkit
Type:        recommended
Severity:    important
References:  
This update for nbdkit fixes the following issues:

- Update to version 1.30.7 (jsc#ECO-3633)
  * configure: Use printf to print $ISOPROG
  * configure: Print the version of curl, libnbd and libssh
  * configure: Make the 'feature' function print the dots
  * tests/test-protect.c: Fix typo in previous commit
  * tests/test-protect.c: Skip test if 'disk' was not created
  * common/include: Rename BUILD_BUG_ON_ZERO to something more meaningful
  * common/include/test-array-size.c: Avoid Clang warning
  * vddk: Demote another 'phone home' error message to debug
  * Use ARRAY_SIZE macro in various places in nbdkit
  * common/include: Add ARRAY_SIZE macro
  * tests/test-parallel-sh.sh: Skip test under valgrind + debuginfod
  * tests/test-parallel-sh.sh: Small cleanups
  * server: Work around incorrect include in gnutls/socket.h
  * server: Display kTLS setting in debug output
  * exitwhen: Check nbdkit doesn't exit before the pipe is closed
  * valgrind: Update comment about valgrind bug affecting OCaml
  * ocaml: Add further valgrind suppression
  * ocaml: Add valgrind suppression for OCaml 4.14 bug
  * perl: Move GCC diagnostic ignored earlier
  * docs/nbdkit-protocol.pod: block size support was added in 1.30
- Enable linuxdisk plugin


The following package changes have been done:

- libtirpc-netconfig-1.2.6-150300.3.11.1 updated
- libuuid1-2.37.2-150400.8.3.1 updated
- libsmartcols1-2.37.2-150400.8.3.1 updated
- libblkid1-2.37.2-150400.8.3.1 updated
- libfdisk1-2.37.2-150400.8.3.1 updated
- libz1-1.2.11-150000.3.33.1 updated
- libmount1-2.37.2-150400.8.3.1 updated
- libtirpc3-1.2.6-150300.3.11.1 updated
- sles-release-15.5-150500.10.2 updated
- libcurl4-7.79.1-150400.5.6.1 updated
- util-linux-2.37.2-150400.8.3.1 updated
- timezone-2022a-150000.75.10.1 updated
- libdevmapper1_03-1.02.163-150400.17.3.1 updated
- libnettle8-3.8.1-150500.1.4 updated
- libhogweed6-3.8.1-150500.1.4 updated
- libmpath0-0.9.1+52+suse.be8809e-150500.1.1 updated
- nbdkit-server-1.30.7-150400.3.3.1 updated
- util-linux-systemd-2.37.2-150400.8.3.1 updated
- nbdkit-xz-filter-1.30.7-150400.3.3.1 updated
- nbdkit-vddk-plugin-1.30.7-150400.3.3.1 updated
- nbdkit-gzip-filter-1.30.7-150400.3.3.1 updated
- nbdkit-curl-plugin-1.30.7-150400.3.3.1 updated
- nbdkit-basic-plugins-1.30.7-150400.3.3.1 updated
- nbdkit-basic-filters-1.30.7-150400.3.3.1 updated
- nbdkit-1.30.7-150400.3.3.1 updated
- container:sles15-image-15.0.0-31.13 updated


More information about the sle-security-updates mailing list