SUSE Container Update Advisory: suse/sles/15.5/virt-handler ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2023:1493-1 Container Tags : suse/sles/15.5/virt-handler:0.58.0 , suse/sles/15.5/virt-handler:0.58.0-150500.5.2 , suse/sles/15.5/virt-handler:0.58.0.18.316 Container Release : 18.316 Severity : important Type : security References : 1209713 1209714 1210135 1210507 CVE-2023-24593 CVE-2023-25180 CVE-2023-29383 ----------------------------------------------------------------- The container suse/sles/15.5/virt-handler was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:1805-1 Released: Tue Apr 11 10:12:41 2023 Summary: Recommended update for timezone Type: recommended Severity: important References: This update for timezone fixes the following issues: - Version update from 2022g to 2023c: * Egypt now uses DST again, from April through October. * This year Morocco springs forward April 23, not April 30. * Palestine delays the start of DST this year. * Much of Greenland still uses DST from 2024 on. * America/Yellowknife now links to America/Edmonton. * tzselect can now use current time to help infer timezone. * The code now defaults to C99 or later. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:2060-1 Released: Thu Apr 27 17:04:25 2023 Summary: Security update for glib2 Type: security Severity: moderate References: 1209713,1209714,1210135,CVE-2023-24593,CVE-2023-25180 This update for glib2 fixes the following issues: - CVE-2023-24593: Fixed a denial of service caused by handling a malicious text-form variant (bsc#1209714). - CVE-2023-25180: Fixed a denial of service caused by malicious serialised variant (bsc#1209713). The following non-security bug was fixed: - Fixed regression on s390x (bsc#1210135, glgo#GNOME/glib!2978). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:2066-1 Released: Fri Apr 28 13:54:17 2023 Summary: Security update for shadow Type: security Severity: moderate References: 1210507,CVE-2023-29383 This update for shadow fixes the following issues: - CVE-2023-29383: Fixed apparent /etc/shadow manipulation via chfn (bsc#1210507). The following package changes have been done: - libz1-1.2.13-150500.1.19 updated - libuuid1-2.37.4-150500.7.13 updated - libsmartcols1-2.37.4-150500.7.13 updated - libblkid1-2.37.4-150500.7.13 updated - libgcrypt20-1.9.4-150500.10.17 updated - libgcrypt20-hmac-1.9.4-150500.10.17 updated - libfdisk1-2.37.4-150500.7.13 updated - libglib-2_0-0-2.70.5-150400.3.8.1 updated - libopenssl1_1-1.1.1l-150500.15.2 updated - libopenssl1_1-hmac-1.1.1l-150500.15.2 updated - libmount1-2.37.4-150500.7.13 updated - krb5-1.20.1-150500.1.2 updated - login_defs-4.8.1-150400.10.6.1 updated - sles-release-15.5-150500.42.1 updated - shadow-4.8.1-150400.10.6.1 updated - util-linux-2.37.4-150500.7.13 updated - timezone-2023c-150000.75.23.1 updated - kubevirt-container-disk-0.58.0-150500.5.2 updated - kubevirt-virt-handler-0.58.0-150500.5.2 updated - libdevmapper1_03-2.03.16_1.02.185-150500.5.3 updated - libgmodule-2_0-0-2.70.5-150400.3.8.1 updated - libnettle8-3.8.1-150500.2.23 updated - libhogweed6-3.8.1-150500.2.23 updated - libmpath0-0.9.4+71+suse.c648a77-150500.1.2 updated - qemu-tools-7.1.0-150500.47.13 updated - util-linux-systemd-2.37.4-150500.7.2 updated - container:sles15-image-15.0.0-34.31 updated