SUSE Container Update Advisory: suse/sle15
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2024:287-1
Container Tags        : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.74 , suse/sle15:15.5 , suse/sle15:15.5.36.5.74
Container Release     : 36.5.74
Severity              : important
Type                  : security
References            : 1211188 1211190 1212475 1217000 1218126 1218186 1218209 1218475
                        CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918
                        CVE-2024-22365 
-----------------------------------------------------------------

The container suse/sle15 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:136-1
Released:    Thu Jan 18 09:53:47 2024
Summary:     Security update for pam
Type:        security
Severity:    moderate
References:  1217000,1218475,CVE-2024-22365
This update for pam fixes the following issues:

- CVE-2024-22365: Fixed a local denial of service during PAM login
  due to a missing check during path manipulation (bsc#1218475).
- Check localtime_r() return value to fix crashing (bsc#1217000) 

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:139-1
Released:    Thu Jan 18 11:33:54 2024
Summary:     Recommended update for go1.21
Type:        recommended
Severity:    moderate
References:  1212475
This update for go1.21 fixes the following issues:

go1.21.6 (released 2024-01-09) includes fixes to the compiler,
the runtime, and the crypto/tls, maps, and runtime/pprof
packages. (bsc#1212475)

* x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders
* runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal
* cmd/compile: linux/s390x: inlining bug in s390x
* maps: maps.Clone reference semantics when cloning a map with large value types
* runtime: excessive memory use between 1.21.0 -> 1.21.1
* cmd/compile: max/min builtin broken when used with string(byte) conversions
* runtime/pprof: incorrect function names for generics functions
* crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3
* runtime: race condition raised with parallel tests, panic(nil) and -race

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:140-1
Released:    Thu Jan 18 11:34:58 2024
Summary:     Security update for libssh
Type:        security
Severity:    important
References:  1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918
This update for libssh fixes the following issues:

Security fixes:

  - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209)
  - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126)
  - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186)
  - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm  guessing (bsc#1211188)
  - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190)

Other fixes:

- Update to version 0.9.8
  - Allow @ in usernames when parsing from URI composes

- Update to version 0.9.7
  - Fix several memory leaks in GSSAPI handling code


The following package changes have been done:

- container-suseconnect-2.4.0-150000.4.48.1 updated
- libssh-config-0.9.8-150400.3.3.1 updated
- libssh4-0.9.8-150400.3.3.1 updated
- pam-1.3.0-150000.6.66.1 updated

SUSE: 2024:287-1 suse/sle15 Security Update

January 20, 2024
The container suse/sle15 was updated

Summary

Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important

References

References : 1211188 1211190 1212475 1217000 1218126 1218186 1218209 1218475

CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918

CVE-2024-22365

1217000,1218475,CVE-2024-22365

This update for pam fixes the following issues:

- CVE-2024-22365: Fixed a local denial of service during PAM login

due to a missing check during path manipulation (bsc#1218475).

- Check localtime_r() return value to fix crashing (bsc#1217000)

1212475

This update for go1.21 fixes the following issues:

go1.21.6 (released 2024-01-09) includes fixes to the compiler,

the runtime, and the crypto/tls, maps, and runtime/pprof

packages. (bsc#1212475)

* x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders

* runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal

* cmd/compile: linux/s390x: inlining bug in s390x

* maps: maps.Clone reference semantics when cloning a map with large value types

* runtime: excessive memory use between 1.21.0 -> 1.21.1

* cmd/compile: max/min builtin broken when used with string(byte) conversions

* runtime/pprof: incorrect function names for generics functions

* crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3

* runtime: race condition raised with parallel tests, panic(nil) and -race

1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918

This update for libssh fixes the following issues:

Security fixes:

- CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209)

- CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126)

- CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186)

- CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188)

- CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190)

Other fixes:

- Update to version 0.9.8

- Allow @ in usernames when parsing from URI composes

- Update to version 0.9.7

- Fix several memory leaks in GSSAPI handling code

The following package changes have been done:

- container-suseconnect-2.4.0-150000.4.48.1 updated

- libssh-config-0.9.8-150400.3.3.1 updated

- libssh4-0.9.8-150400.3.3.1 updated

- pam-1.3.0-150000.6.66.1 updated

Severity
Container Advisory ID : SUSE-CU-2024:287-1
Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.74 , suse/sle15:15.5 , suse/sle15:15.5.36.5.74
Container Release : 36.5.74
Severity : important
Type : security

Related News

News

Powered By

Footer Logo

Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.

Powered By

Footer Logo