SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:3659-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.14.13 , suse/sle15:15.5 , suse/sle15:15.5.36.14.13 Container Release : 36.14.13 Severity : moderate Type : security References : 1159034 1194818 1222285 1226463 1227138 CVE-2024-5535 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:2887-1 Released: Tue Aug 13 10:52:45 2024 Summary: Recommended update for util-linux Type: recommended Severity: moderate References: 1159034,1194818,1222285 This update for util-linux fixes the following issues: - agetty: Prevent login cursor escape (bsc#1194818). - Document unexpected side effects of lazy destruction (bsc#1159034). - Don't delete binaries not common for all architectures. Create an util-linux-extra subpackage instead, so users of third party tools can use them (bsc#1222285). - agetty: Prevent login cursor escape (bsc#1194818). - Document unexpected side effects of lazy destruction (bsc#1159034). - Don't delete binaries not common for all architectures. Create an util-linux-extra subpackage instead, so users of third party tools can use them (bsc#1222285). - agetty: Prevent login cursor escape (bsc#1194818). - Document unexpected side effects of lazy destruction (bsc#1159034). - Don't delete binaries not common for all architectures. Create an util-linux-extra subpackage instead, so users of third party tools can use them (bsc#1222285). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:2891-1 Released: Tue Aug 13 11:39:53 2024 Summary: Security update for openssl-1_1 Type: security Severity: moderate References: 1226463,1227138,CVE-2024-5535 This update for openssl-1_1 fixes the following issues: - CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138) Other fixes: - Build with no-afalgeng (bsc#1226463) The following package changes have been done: - libblkid1-2.37.4-150500.9.14.2 updated - libfdisk1-2.37.4-150500.9.14.2 updated - libmount1-2.37.4-150500.9.14.2 updated - libopenssl1_1-hmac-1.1.1l-150500.17.34.1 updated - libopenssl1_1-1.1.1l-150500.17.34.1 updated - libsmartcols1-2.37.4-150500.9.14.2 updated - libuuid1-2.37.4-150500.9.14.2 updated - openssl-1_1-1.1.1l-150500.17.34.1 updated - util-linux-2.37.4-150500.9.14.2 updated