SUSE-CU-2023:676-1: Security update of suse/sles/15.5/cdi-cloner

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu Mar 16 08:03:39 UTC 2023


SUSE Container Update Advisory: suse/sles/15.5/cdi-cloner
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2023:676-1
Container Tags        : suse/sles/15.5/cdi-cloner:1.55.0 , suse/sles/15.5/cdi-cloner:1.55.0-150500.3.13 , suse/sles/15.5/cdi-cloner:1.55.0.17.169
Container Release     : 17.169
Severity              : important
Type                  : security
References            : 1177047 1180713 1186642 1198062 1198922 1202436 1207753 1207789
                        CVE-2022-1271 CVE-2022-48303 
-----------------------------------------------------------------

The container suse/sles/15.5/cdi-cloner was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2020:3791-1
Released:    Mon Dec 14 17:39:19 2020
Summary:     Recommended update for gzip
Type:        recommended
Severity:    moderate
References:  
This update for gzip fixes the following issue:

- Enable `DFLTCC` (Deflate Conversion Call) compression for s390x for levels 1-6 to `CFLAGS`. (jsc#SLE-13775)
  
  Enable by adding `-DDFLTCC_LEVEL_MASK=0x7e` to `CFLAGS`.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1018-1
Released:    Tue Apr  6 14:29:13 2021
Summary:     Recommended update for gzip
Type:        recommended
Severity:    moderate
References:  1180713
This update for gzip fixes the following issues:

- Fixes an issue when 'gzexe' counts the lines to skip wrong. (bsc#1180713)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1289-1
Released:    Wed Apr 21 14:02:46 2021
Summary:     Recommended update for gzip
Type:        recommended
Severity:    moderate
References:  1177047
This update for gzip fixes the following issues:

- Fixed a potential segfault when zlib acceleration is enabled (bsc#1177047)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1935-1
Released:    Thu Jun 10 10:45:09 2021
Summary:     Recommended update for gzip
Type:        recommended
Severity:    moderate
References:  1186642

This update for gzip fixes the following issue:

- gzip had a lower release number in 15 sp2 and sp3 than in 15 sp1, which could lead
  to migration issues. (bsc#1186642)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1617-1
Released:    Tue May 10 14:40:12 2022
Summary:     Security update for gzip
Type:        security
Severity:    important
References:  1198062,1198922,CVE-2022-1271
This update for gzip fixes the following issues:

- CVE-2022-1271: Fix escaping of malicious filenames. (bsc#1198062)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:463-1
Released:    Mon Feb 20 16:33:39 2023
Summary:     Security update for tar
Type:        security
Severity:    moderate
References:  1202436,1207753,CVE-2022-48303
This update for tar fixes the following issues:

- CVE-2022-48303: Fixed a one-byte out-of-bounds read that resulted in use of uninitialized memory for a conditional jump (bsc#1207753). 

Bug fixes:

- Fix hang when unpacking test tarball (bsc#1202436).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:464-1
Released:    Mon Feb 20 18:11:37 2023
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  
This update for systemd fixes the following issues:

- Merge of v249.15
- Drop workaround related to systemd-timesyncd that addressed a Factory issue.
- Conditionalize the use of /lib/modprobe.d only on systems with split usr
  support enabled (i.e. SLE).
- Make use of the %systemd_* rpm macros consistently. Using the upstream
  variants will ease the backports of Factory changes to SLE since Factory
  systemd uses the upstream variants exclusively.
- machines.target belongs to systemd-container, do its init/cleanup steps from
  the scriptlets of this sub-package.
- Make sure we apply the presets on units shipped by systemd package.
- systemd-testsuite: move the integration tests in a dedicated sub directory.
- Move systemd-cryptenroll into udev package.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:617-1
Released:    Fri Mar  3 16:49:06 2023
Summary:     Recommended update for jitterentropy
Type:        recommended
Severity:    moderate
References:  1207789
This update for jitterentropy fixes the following issues:

- build jitterentropy library with debuginfo (bsc#1207789)


The following package changes have been done:

- libsasl2-3-2.1.28-150500.1.1 updated
- libgcrypt20-1.9.4-150500.10.11 updated
- libgcrypt20-hmac-1.9.4-150500.10.11 updated
- libjitterentropy3-3.4.0-150000.1.9.1 updated
- libsystemd0-249.15-150400.8.22.1 updated
- libopenssl1_1-1.1.1l-150500.13.2 updated
- libopenssl1_1-hmac-1.1.1l-150500.13.2 updated
- sles-release-15.5-150500.35.2 updated
- tar-1.34-150000.3.31.1 updated
- gzip-1.10-150200.10.1 added
- containerized-data-importer-cloner-1.55.0-150500.3.13 updated
- container:sles15-image-15.0.0-34.4 updated


More information about the sle-updates mailing list