RHSA-2024:10289: Low: SUSE Liberty Linux security update for aardvark-dns
Update Advisories for SUSE Liberty Linux
suse-liberty-linux-updates at lists.suse.com
Wed Nov 27 16:06:11 UTC 2024
# security update for aardvark-dns
Announcement ID: RHSA-2024:10289
Rating: Low
Cross-References:
* CVE-2021-33198
* CVE-2021-4024
* CVE-2024-9676
CVSS scores:
* CVE-2021-33198 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-4024 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-9676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-9676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* SUSE Liberty Linux 8
An update that solves 3 vulnerabilities can now be installed.
## Description:
This security update provides a functional equivalent of RHSA-2024:10289.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10289.
## Package List:
* SUSE Liberty Linux 8:
* aardvark-dns 1.10.1-2.module+el8.10.0+22417+2fb00970
* buildah 1.33.11-1.module+el8.10.0+22417+2fb00970
* buildah-tests 1.33.11-1.module+el8.10.0+22417+2fb00970
* cockpit-podman 84.1-1.module+el8.10.0+22417+2fb00970
* conmon 2.1.10-1.module+el8.10.0+22417+2fb00970
* container-selinux 2.229.0-2.module+el8.10.0+22417+2fb00970
* containernetworking-plugins 1.4.0-5.module+el8.10.0+22417+2fb00970
* containers-common 1-82.module+el8.10.0+22417+2fb00970
* crit 3.18-5.module+el8.10.0+22417+2fb00970
* criu 3.18-5.module+el8.10.0+22417+2fb00970
* criu-devel 3.18-5.module+el8.10.0+22417+2fb00970
* criu-libs 3.18-5.module+el8.10.0+22417+2fb00970
* crun 1.14.3-2.module+el8.10.0+22417+2fb00970
* fuse-overlayfs 1.13-1.module+el8.10.0+22417+2fb00970
* libslirp 4.4.0-2.module+el8.10.0+22417+2fb00970
* libslirp-devel 4.4.0-2.module+el8.10.0+22417+2fb00970
* netavark 1.10.3-1.module+el8.10.0+22417+2fb00970
* oci-seccomp-bpf-hook 1.2.10-1.module+el8.10.0+22417+2fb00970
* podman 4.9.4-18.module+el8.10.0+22417+2fb00970
* podman-catatonit 4.9.4-18.module+el8.10.0+22417+2fb00970
* podman-docker 4.9.4-18.module+el8.10.0+22417+2fb00970
* podman-gvproxy 4.9.4-18.module+el8.10.0+22417+2fb00970
* podman-plugins 4.9.4-18.module+el8.10.0+22417+2fb00970
* podman-remote 4.9.4-18.module+el8.10.0+22417+2fb00970
* podman-tests 4.9.4-18.module+el8.10.0+22417+2fb00970
* python3-criu 3.18-5.module+el8.10.0+22417+2fb00970
* python3-podman 4.9.0-3.module+el8.10.0+22417+2fb00970
* runc 1.1.12-5.module+el8.10.0+22417+2fb00970
* skopeo 1.14.5-3.module+el8.10.0+22417+2fb00970
* skopeo-tests 1.14.5-3.module+el8.10.0+22417+2fb00970
* slirp4netns 1.2.3-1.module+el8.10.0+22417+2fb00970
* toolbox 0.0.99.5-2.module+el8.10.0+22417+2fb00970
* toolbox-tests 0.0.99.5-2.module+el8.10.0+22417+2fb00970
* udica 0.2.6-21.module+el8.10.0+22417+2fb00970
## References:
* https://www.suse.com/security/cve/CVE-2021-33198.html
* https://www.suse.com/security/cve/CVE-2021-4024.html
* https://www.suse.com/security/cve/CVE-2024-9676.html
More information about the suse-liberty-linux-updates
mailing list