SUSE-CU-2022:3025-1: Security update of bci/golang
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Fri Nov 18 08:51:15 UTC 2022
SUSE Container Update Advisory: bci/golang
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:3025-1
Container Tags : bci/golang:1.19 , bci/golang:1.19-18.29 , bci/golang:latest
Container Release : 18.29
Severity : important
Type : security
References : 1200441 1201959 1203652 1204179 1204211 1204941 1204968 CVE-2022-3821
CVE-2022-41716
-----------------------------------------------------------------
The container bci/golang was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3961-1
Released: Mon Nov 14 07:33:50 2022
Summary: Recommended update for zlib
Type: recommended
Severity: important
References: 1203652
This update for zlib fixes the following issues:
- Fix updating strm.adler with inflate() if DFLTCC is used (bsc#1203652)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3974-1
Released: Mon Nov 14 15:39:20 2022
Summary: Recommended update for util-linux
Type: recommended
Severity: moderate
References: 1201959,1204211
This update for util-linux fixes the following issues:
- Fix file conflict during upgrade (bsc#1204211)
- libuuid improvements (bsc#1201959, PED-1150):
libuuid: Fix range when parsing UUIDs.
Improve cache handling for short running applications-increment the cache size over runtime.
Implement continuous clock handling for time based UUIDs.
Check clock value from clock file to provide seamless libuuid.
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:3999-1
Released: Tue Nov 15 17:08:04 2022
Summary: Security update for systemd
Type: security
Severity: moderate
References: 1204179,1204968,CVE-2022-3821
This update for systemd fixes the following issues:
- CVE-2022-3821: Fixed buffer overrun in format_timespan() function (bsc#1204968).
- Import commit 0cd50eedcc0692c1f907b24424215f8db7d3b428
* 0469b9f2bc pstore: do not try to load all known pstore modules
* ad05f54439 pstore: Run after modules are loaded
* ccad817445 core: Add trigger limit for path units
* 281d818fe3 core/mount: also add default before dependency for automount mount units
* ffe5b4afa8 logind: fix crash in logind on user-specified message string
- Document udev naming scheme (bsc#1204179)
- Make 'sle15-sp3' net naming scheme still available for backward compatibility
reason
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:4054-1
Released: Thu Nov 17 15:36:58 2022
Summary: Security update for go1.19
Type: security
Severity: low
References: 1200441,1204941,CVE-2022-41716
This update for go1.19 fixes the following issues:
Update to go 1.19.3 (released 2022-11-01) (bsc#1200441):
Security fixes:
- CVE-2022-41716: Fixed unsanitized NUL in environment variables in syscalls, os/exec (go#56327) (bsc#1204941).
Bugfixes:
- runtime: lock count' fatal error when cgo is enabled (go#56308).
- cmd/compile: libFuzzer instrumentation fakePC overflow on 386 arch (go#56168).
- internal/fuzz: array literal initialization causes ICE 'unhandled stmt ASOP' while fuzzing (go#56106).
The following package changes have been done:
- libuuid1-2.37.2-150400.8.8.1 updated
- libudev1-249.12-150400.8.13.1 updated
- libsmartcols1-2.37.2-150400.8.8.1 updated
- libblkid1-2.37.2-150400.8.8.1 updated
- libfdisk1-2.37.2-150400.8.8.1 updated
- libz1-1.2.11-150000.3.36.1 updated
- libsystemd0-249.12-150400.8.13.1 updated
- libmount1-2.37.2-150400.8.8.1 updated
- util-linux-2.37.2-150400.8.8.1 updated
- go1.19-1.19.3-150000.1.15.1 updated
- container:sles15-image-15.0.0-27.14.14 updated
More information about the sle-updates
mailing list