SUSE-CU-2022:3505-1: Security update of bci/ruby
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Fri Dec 30 08:55:44 UTC 2022
SUSE Container Update Advisory: bci/ruby
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:3505-1
Container Tags : bci/ruby:2 , bci/ruby:2.5 , bci/ruby:2.5-32.7 , bci/ruby:latest
Container Release : 32.7
Severity : important
Type : security
References : 1200723 1205000 1206337 CVE-2022-4415 CVE-2022-46908
-----------------------------------------------------------------
The container bci/ruby was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:4628-1
Released: Wed Dec 28 09:23:13 2022
Summary: Security update for sqlite3
Type: security
Severity: moderate
References: 1206337,CVE-2022-46908
This update for sqlite3 fixes the following issues:
- CVE-2022-46908: Properly implement the azProhibitedFunctions protection mechanism,
when relying on --safe for execution of an untrusted CLI script (bsc#1206337).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:4629-1
Released: Wed Dec 28 09:24:07 2022
Summary: Security update for systemd
Type: security
Severity: important
References: 1200723,1205000,CVE-2022-4415
This update for systemd fixes the following issues:
- CVE-2022-4415: Fixed systemd-coredump that did not respect the fs.suid_dumpable kernel setting (bsc#1205000).
Bug fixes:
- Support by-path devlink for multipath nvme block devices (bsc#1200723).
The following package changes have been done:
- libudev1-249.12-150400.8.16.1 updated
- libsqlite3-0-3.39.3-150000.3.20.1 updated
- libsystemd0-249.12-150400.8.16.1 updated
- sqlite3-devel-3.39.3-150000.3.20.1 updated
More information about the sle-updates
mailing list