SUSE-CU-2024:340-1: Security update of suse/rmt-server
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Thu Jan 25 10:29:46 UTC 2024
SUSE Container Update Advisory: suse/rmt-server
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2024:340-1
Container Tags : suse/rmt-server:2.14 , suse/rmt-server:2.14-14.6 , suse/rmt-server:latest
Container Release : 14.6
Severity : important
Type : security
References : 1211188 1211190 1214668 1215241 1217000 1217460 1218126 1218186
1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004
CVE-2023-6918 CVE-2024-22365
-----------------------------------------------------------------
The container suse/rmt-server was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:136-1
Released: Thu Jan 18 09:53:47 2024
Summary: Security update for pam
Type: security
Severity: moderate
References: 1217000,1218475,CVE-2024-22365
This update for pam fixes the following issues:
- CVE-2024-22365: Fixed a local denial of service during PAM login
due to a missing check during path manipulation (bsc#1218475).
- Check localtime_r() return value to fix crashing (bsc#1217000)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:140-1
Released: Thu Jan 18 11:34:58 2024
Summary: Security update for libssh
Type: security
Severity: important
References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918
This update for libssh fixes the following issues:
Security fixes:
- CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209)
- CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126)
- CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186)
- CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188)
- CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190)
Other fixes:
- Update to version 0.9.8
- Allow @ in usernames when parsing from URI composes
- Update to version 0.9.7
- Fix several memory leaks in GSSAPI handling code
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:214-1
Released: Wed Jan 24 16:01:31 2024
Summary: Recommended update for systemd
Type: recommended
Severity: moderate
References: 1214668,1215241,1217460
This update for systemd fixes the following issues:
- resolved: actually check authenticated flag of SOA transaction
- core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive
- core: Add trace logging to mount_add_device_dependencies()
- core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460)
- core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies
- core: wrap some long comment
- utmp-wtmp: Handle EINTR gracefully when waiting to write to tty
- utmp-wtmp: Fix error in case isatty() fails
- homed: Handle EINTR gracefully when waiting for device node
- resolved: Handle EINTR returned from fd_wait_for_event() better
- sd-netlink: Handle EINTR from poll() gracefully, as success
- varlink: Handle EINTR gracefully when waiting for EIO via ppoll()
- stdio-bridge: Don't be bothered with EINTR
- sd-bus: Handle EINTR return from bus_poll() (bsc#1215241)
- core: Replace slice dependencies as they get added (bsc#1214668)
The following package changes have been done:
- libssh-config-0.9.8-150400.3.3.1 updated
- libudev1-249.17-150400.8.40.1 updated
- libsystemd0-249.17-150400.8.40.1 updated
- libssh4-0.9.8-150400.3.3.1 updated
- pam-1.3.0-150000.6.66.1 updated
- container:sles15-image-15.0.0-36.5.75 updated
More information about the sle-updates
mailing list