SUSE-CU-2023:1488-1: Security update of suse/sles/15.5/cdi-uploadserver

sle-security-updates at sle-security-updates at
Tue May 9 16:09:08 UTC 2023

SUSE Container Update Advisory: suse/sles/15.5/cdi-uploadserver
Container Advisory ID : SUSE-CU-2023:1488-1
Container Tags        : suse/sles/15.5/cdi-uploadserver:1.55.0 , suse/sles/15.5/cdi-uploadserver:1.55.0-150500.4.2 , suse/sles/15.5/cdi-uploadserver:
Container Release     : 17.278
Severity              : important
Type                  : security
References            : 1209713 1209714 1210135 1210507 CVE-2023-24593 CVE-2023-25180

The container suse/sles/15.5/cdi-uploadserver was updated. The following patches have been included in this update:

Advisory ID: SUSE-RU-2023:1805-1
Released:    Tue Apr 11 10:12:41 2023
Summary:     Recommended update for timezone
Type:        recommended
Severity:    important
This update for timezone fixes the following issues:

- Version update from 2022g to 2023c:
  * Egypt now uses DST again, from April through October.
  * This year Morocco springs forward April 23, not April 30.
  * Palestine delays the start of DST this year.
  * Much of Greenland still uses DST from 2024 on.
  * America/Yellowknife now links to America/Edmonton.
  * tzselect can now use current time to help infer timezone.
  * The code now defaults to C99 or later.

Advisory ID: SUSE-SU-2023:2060-1
Released:    Thu Apr 27 17:04:25 2023
Summary:     Security update for glib2
Type:        security
Severity:    moderate
References:  1209713,1209714,1210135,CVE-2023-24593,CVE-2023-25180
This update for glib2 fixes the following issues:

- CVE-2023-24593: Fixed a denial of service caused by handling a malicious text-form variant (bsc#1209714).
- CVE-2023-25180: Fixed a denial of service caused by malicious serialised variant (bsc#1209713).

The following non-security bug was fixed:

- Fixed regression on s390x (bsc#1210135, glgo#GNOME/glib!2978).

Advisory ID: SUSE-SU-2023:2066-1
Released:    Fri Apr 28 13:54:17 2023
Summary:     Security update for shadow
Type:        security
Severity:    moderate
References:  1210507,CVE-2023-29383
This update for shadow fixes the following issues:

- CVE-2023-29383: Fixed apparent /etc/shadow manipulation via chfn (bsc#1210507).

The following package changes have been done:

- libz1-1.2.13-150500.1.19 updated
- libuuid1-2.37.4-150500.7.13 updated
- libsmartcols1-2.37.4-150500.7.13 updated
- libblkid1-2.37.4-150500.7.13 updated
- libgcrypt20-1.9.4-150500.10.17 updated
- libgcrypt20-hmac-1.9.4-150500.10.17 updated
- libfdisk1-2.37.4-150500.7.13 updated
- libglib-2_0-0-2.70.5-150400.3.8.1 updated
- libopenssl1_1-1.1.1l-150500.15.2 updated
- libopenssl1_1-hmac-1.1.1l-150500.15.2 updated
- libmount1-2.37.4-150500.7.13 updated
- krb5-1.20.1-150500.1.2 updated
- login_defs-4.8.1-150400.10.6.1 updated
- sles-release-15.5-150500.42.1 updated
- shadow-4.8.1-150400.10.6.1 updated
- util-linux-2.37.4-150500.7.13 updated
- timezone-2023c-150000.75.23.1 updated
- libdevmapper1_03-2.03.16_1.02.185-150500.5.3 updated
- libgmodule-2_0-0-2.70.5-150400.3.8.1 updated
- libnettle8-3.8.1-150500.2.23 updated
- libhogweed6-3.8.1-150500.2.23 updated
- libmpath0-0.9.4+71+suse.c648a77-150500.1.2 updated
- qemu-tools-7.1.0-150500.47.13 updated
- containerized-data-importer-uploadserver-1.55.0-150500.4.2 updated
- container:sles15-image-15.0.0-34.31 updated

More information about the sle-security-updates mailing list