SUSE-CU-2023:3178-1: Security update of suse/389-ds

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Sep 29 07:08:36 UTC 2023


SUSE Container Update Advisory: suse/389-ds
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2023:3178-1
Container Tags        : suse/389-ds:2.2 , suse/389-ds:2.2-15.4 , suse/389-ds:latest
Container Release     : 15.4
Severity              : important
Type                  : security
References            : 1211829 1212819 1212910 1214692 1215026 CVE-2023-38039 CVE-2023-40217
-----------------------------------------------------------------

The container suse/389-ds was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:3814-1
Released:    Wed Sep 27 18:08:17 2023
Summary:     Recommended update for glibc
Type:        recommended
Severity:    moderate
References:  1211829,1212819,1212910
This update for glibc fixes the following issues:

- nscd: Fix netlink cache invalidation if epoll is used (bsc#1212910, BZ #29415)
- Restore lookup of IPv4 mapped addresses in files database (bsc#1212819, BZ #25457)
- elf: Remove excessive p_align check on PT_LOAD segments (bsc#1211829, BZ #28688)
- elf: Properly align PT_LOAD segments (bsc#1211829, BZ #28676)
- ld.so: Always use MAP_COPY to map the first segment (BZ #30452)
- add GB18030-2022 charmap (jsc#PED-4908, BZ #30243)


-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:3823-1
Released:    Wed Sep 27 18:42:38 2023
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1215026,CVE-2023-38039
This update for curl fixes the following issues:

- CVE-2023-38039: Fixed possible DoS when receiving too large HTTP header. (bsc#1215026)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:3828-1
Released:    Wed Sep 27 19:07:38 2023
Summary:     Security update for python3
Type:        security
Severity:    important
References:  1214692,CVE-2023-40217
This update for python3 fixes the following issues:

- CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692).


The following package changes have been done:

- glibc-2.31-150300.58.1 updated
- libcurl4-8.0.1-150400.5.29.1 updated
- python3-base-3.6.15-150300.10.51.1 updated
- libpython3_6m1_0-3.6.15-150300.10.51.1 updated
- python3-3.6.15-150300.10.51.1 updated
- container:sles15-image-15.0.0-36.5.37 updated


More information about the sle-security-updates mailing list