RHSA-2024:10289: Low: SUSE Liberty Linux security update for aardvark-dns

Update Advisories for SUSE Liberty Linux suse-liberty-linux-updates at lists.suse.com
Wed Nov 27 16:06:11 UTC 2024


# security update for aardvark-dns

Announcement ID: RHSA-2024:10289
Rating: Low

Cross-References:

  * CVE-2021-33198
  * CVE-2021-4024
  * CVE-2024-9676



CVSS scores:

  * CVE-2021-33198 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-4024 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-9676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2024-9676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

  * SUSE Liberty Linux 8


An update that solves 3 vulnerabilities can now be installed.

## Description:

This security update provides a functional equivalent of RHSA-2024:10289.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10289.


## Package List:

  * SUSE Liberty Linux 8:
    * aardvark-dns 1.10.1-2.module+el8.10.0+22417+2fb00970
    * buildah 1.33.11-1.module+el8.10.0+22417+2fb00970
    * buildah-tests 1.33.11-1.module+el8.10.0+22417+2fb00970
    * cockpit-podman 84.1-1.module+el8.10.0+22417+2fb00970
    * conmon 2.1.10-1.module+el8.10.0+22417+2fb00970
    * container-selinux 2.229.0-2.module+el8.10.0+22417+2fb00970
    * containernetworking-plugins 1.4.0-5.module+el8.10.0+22417+2fb00970
    * containers-common 1-82.module+el8.10.0+22417+2fb00970
    * crit 3.18-5.module+el8.10.0+22417+2fb00970
    * criu 3.18-5.module+el8.10.0+22417+2fb00970
    * criu-devel 3.18-5.module+el8.10.0+22417+2fb00970
    * criu-libs 3.18-5.module+el8.10.0+22417+2fb00970
    * crun 1.14.3-2.module+el8.10.0+22417+2fb00970
    * fuse-overlayfs 1.13-1.module+el8.10.0+22417+2fb00970
    * libslirp 4.4.0-2.module+el8.10.0+22417+2fb00970
    * libslirp-devel 4.4.0-2.module+el8.10.0+22417+2fb00970
    * netavark 1.10.3-1.module+el8.10.0+22417+2fb00970
    * oci-seccomp-bpf-hook 1.2.10-1.module+el8.10.0+22417+2fb00970
    * podman 4.9.4-18.module+el8.10.0+22417+2fb00970
    * podman-catatonit 4.9.4-18.module+el8.10.0+22417+2fb00970
    * podman-docker 4.9.4-18.module+el8.10.0+22417+2fb00970
    * podman-gvproxy 4.9.4-18.module+el8.10.0+22417+2fb00970
    * podman-plugins 4.9.4-18.module+el8.10.0+22417+2fb00970
    * podman-remote 4.9.4-18.module+el8.10.0+22417+2fb00970
    * podman-tests 4.9.4-18.module+el8.10.0+22417+2fb00970
    * python3-criu 3.18-5.module+el8.10.0+22417+2fb00970
    * python3-podman 4.9.0-3.module+el8.10.0+22417+2fb00970
    * runc 1.1.12-5.module+el8.10.0+22417+2fb00970
    * skopeo 1.14.5-3.module+el8.10.0+22417+2fb00970
    * skopeo-tests 1.14.5-3.module+el8.10.0+22417+2fb00970
    * slirp4netns 1.2.3-1.module+el8.10.0+22417+2fb00970
    * toolbox 0.0.99.5-2.module+el8.10.0+22417+2fb00970
    * toolbox-tests 0.0.99.5-2.module+el8.10.0+22417+2fb00970
    * udica 0.2.6-21.module+el8.10.0+22417+2fb00970

## References:

  * https://www.suse.com/security/cve/CVE-2021-33198.html
  * https://www.suse.com/security/cve/CVE-2021-4024.html
  * https://www.suse.com/security/cve/CVE-2024-9676.html


More information about the suse-liberty-linux-updates mailing list