[ELSA-2023-2204] Image Builder security, bug fix, and enhancement update
cockpit-composer
[45-1.0.1]
- Make per page documentation links point to Oracle Linux [Orabug: 32013095], [Orabug:34398922]
[45-1]
- New upstream release
[44-1]
- New upstream release
[43-1]
- New upstream release
[42-1]
- New upstream release
osbuild
[81-1]
- New upstream release
[80-1]
- New upstream release
[79-1]
- New upstream release
[78-1]
- New upstream release
[77-1]
- New upstream release
[76-1]
- New upstream release
[75-1]
- New upstream release
[74-1]
- New upstream release
[73-1]
- New upstream release
[72-1]
- New upstream release
[71-1]
- New upstream release
[70-1]
- New upstream release
[69-1]
- New upstream release
osbuild-composer
[76-2]
- distro/rhel: add payload repos to os package set (rhbz#2177699)
- Manifest: always set kernel options in grub2 stage (rhbz#2162299)
[76-1]
- New upstream release
[75-1]
- New upstream release
[74-1]
- New upstream release
[73-1]
- New upstream release
[72-1]
- New upstream release
[71-1]
- New upstream release
[70-1]
- New upstream release
[69-1]
- New upstream release
[68-1]
- New upstream release
[67-2]
- Fix functional tests to make them pass in RHEL-9.2 gating
[67-1]
- New upstream release
[62-1]
- New upstream release
[60-1]
- New upstream release
[59-1]
- New upstream release
[58-1]
- New upstream release
[57-1]
- New upstream release
[55-1]
- New upstream release
[54-1]
- New upstream release
[53-1]
- New upstream release
[51-1]
- New upstream release
[46-1]
- New upstream release
[45-1]
- New upstream release
[44-1]
- New upstream release
[43-1]
- New upstream release
[42-1]
- New upstream release
[41-1]
- New upstream release
[40-1]
- New upstream release
[39-1]
- New upstream release
[38-1]
- New upstream release
- Tue Nov 02 2021 lavocatt - 37-1
- New upstream release
[36-1]
- New upstream release
[33-1]
- New upstream release
[32-1]
- New upstream release
[31-1]
- New upstream release
[30-2]
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
Related: rhbz#1991688
[30-1]
- New upstream release
[29-3]
- Rebuilt for RHEL 9 BETA for openssl 3.0
Related: rhbz#1971065
[29-2]
- Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937
weldr-client
[35.9-1]
- Copy rhel-92.json test repository from osbuild-composer
- Update osbuild-composer test repositories from osbuild-composer
- New release: 35.9 (bcl)
Resolves: rhbz#2164560
- tests: Replace os.MkdirTemp with t.TempDir (bcl)
- blueprint save: Allow overriding bad blueprint names (bcl)
- tests: Clean up checking err in tests (bcl)
- composer-cli: Implement blueprints diff (bcl)
- saveBlueprint: Return the filename to the caller (bcl)
- composer-cli: Add tests for using --commit with old servers (bcl)
- weldr: Return error about the blueprints change route (bcl)
- weldr: Save the http status code as part of APIResponse (bcl)
- Add --commit support to blueprints save (bcl)
- Add --commit to blueprints show (bcl)
- gitleaks: Exclude the test password used in tests (bcl)
- ci: add tags to AWS instances (tlavocat)
- Update github.com/BurntSushi/toml to 1.2.1
- Update github.com/stretchr/testify to 1.8.1
- Update bump github.com/spf13/cobra to 1.6.1
- New release: 35.8 (bcl)
- completion: Remove providers from bash completion script (bcl)
- completion: Filter out new headers from compose list (bcl)
- docs: Remove unneeded Long descriptions (bcl)
- docs: Use a custom help template (bcl)
- docs: Add more command documentation (bcl)
- cmdline: Add package glob support to modules list command (bcl)
- workflow: Add govulncheck on go v1.18 (bcl)
- tests: Update to use golangci-lint 1.49.0 (bcl)
- New release: 35.7 (bcl)
- spec: Move %gometa macro above %gourl (bcl)
- weldr: When starting a compose pass size as bytes, not MiB (bcl)
- tests: Use correct size value in bytes for test (bcl)
- workflow: Add Go 1.18 to text matrix (bcl)
- Replace deprecated ioutil functions (bcl)
- New release: 35.6 (bcl)
- tests: Update tests for osbuild-composer changes (bcl)
- CMD: Compose status format (eloy.coto)
- CMD: Compose list format (eloy.coto)
- tests: Update tests to check for JSON list output (bcl)
- composer-cli: Change JSON output to be a list of objects (bcl)
- weldr: Simplify the old ComposeLog, etc. functions (bcl)
- composer-cli: Add --filename to blueprints freeze save command (bcl)
- composer-cli: Add --filename to blueprints save command (bcl)
- composer-cli: Add --filename to compose logs command (bcl)
- composer-cli: Add --filename to compose image command (bcl)
- composer-cli: Add --filename to compose metadata command (bcl)
- composer-cli: Add --filename to compose results command (bcl)
- weldr: Add saving to a new filename to GetFilePath function (bcl)
- github: Fix issue with codecov and forced pushes in PRs (bcl)
- Use golangci-lint 1.45.2 in workflow (bcl)
- Run workflow tests for go 1.16.x and 1.17.x (bcl)
- Move go.mod to go 1.16 (bcl)
- workflows/trigger-gitlab: run Gitlab CI in new image-builder project (jrusz)
- Update GitHub actions/setup-go to 3
- Update GitHub actions/checkout to 3
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/weldr-client?distro=oraclelinux-9 | < 35.9-1.el9 |
pkg:rpm/oraclelinux/python3-osbuild?distro=oraclelinux-9 | < 81-1.el9 |
pkg:rpm/oraclelinux/osbuild?distro=oraclelinux-9 | < 81-1.el9 |
pkg:rpm/oraclelinux/osbuild-selinux?distro=oraclelinux-9 | < 81-1.el9 |
pkg:rpm/oraclelinux/osbuild-ostree?distro=oraclelinux-9 | < 81-1.el9 |
pkg:rpm/oraclelinux/osbuild-lvm2?distro=oraclelinux-9 | < 81-1.el9 |
pkg:rpm/oraclelinux/osbuild-luks2?distro=oraclelinux-9 | < 81-1.el9 |
pkg:rpm/oraclelinux/osbuild-composer?distro=oraclelinux-9.2 | < 76-2.el9_2 |
pkg:rpm/oraclelinux/osbuild-composer-worker?distro=oraclelinux-9.2 | < 76-2.el9_2 |
pkg:rpm/oraclelinux/osbuild-composer-dnf-json?distro=oraclelinux-9.2 | < 76-2.el9_2 |
pkg:rpm/oraclelinux/osbuild-composer-core?distro=oraclelinux-9.2 | < 76-2.el9_2 |
pkg:rpm/oraclelinux/cockpit-composer?distro=oraclelinux-9.2 | < 45-1.0.1.el9_2 |
- ID
- ELSA-2023-2204
- Severity
- moderate
- URL
- https://linux.oracle.com/errata/ELSA-2023-2204.html
- Published
-
2023-05-15T00:00:00
(16 months ago) - Modified
-
2023-05-15T00:00:00
(16 months ago) - Rights
- Copyright 2023 Oracle, Inc.
- Other Advisories
-
- ALAS-2022-1635
- ALAS-2023-1731
- ALAS-2023-1825
- ALAS-2023-1848
- ALAS2-2022-1851
- ALAS2-2022-1858
- ALAS2-2022-1859
- ALAS2-2022-1860
- ALAS2-2022-1861
- ALAS2-2022-1862
- ALAS2-2022-1863
- ALAS2-2022-1864
- ALAS2-2022-1865
- ALAS2-2022-1887
- ALAS2-2023-1913
- ALAS2-2023-1926
- ALAS2-2023-2015
- ALAS2-2023-2238
- ALPINE:CVE-2022-27664
- ALPINE:CVE-2022-2879
- ALPINE:CVE-2022-2880
- ALPINE:CVE-2022-41715
- ALPINE:CVE-2022-41717
- ALSA-2022:7129
- ALSA-2023:0328
- ALSA-2023:0446
- ALSA-2023:2167
- ALSA-2023:2177
- ALSA-2023:2193
- ALSA-2023:2204
- ALSA-2023:2222
- ALSA-2023:2236
- ALSA-2023:2253
- ALSA-2023:2282
- ALSA-2023:2283
- ALSA-2023:2357
- ALSA-2023:2367
- ALSA-2023:2758
- ALSA-2023:2780
- ALSA-2023:2784
- ALSA-2023:2785
- ALSA-2023:2802
- ALSA-2023:2866
- ALSA-2023:6420
- ALSA-2024:0121
- ALSA-2024:3254
- ELSA-2022-24267
- ELSA-2022-7129
- ELSA-2023-0328
- ELSA-2023-0446
- ELSA-2023-18908
- ELSA-2023-2167
- ELSA-2023-2177
- ELSA-2023-2222
- ELSA-2023-2253
- ELSA-2023-2282
- ELSA-2023-2283
- ELSA-2023-2357
- ELSA-2023-2367
- ELSA-2023-2592
- ELSA-2023-2758
- ELSA-2023-2780
- ELSA-2023-2784
- ELSA-2023-2785
- ELSA-2023-2802
- ELSA-2023-2866
- ELSA-2023-6420
- ELSA-2024-0121
- ELSA-2024-2988
- ELSA-2024-3254
- FEDORA-2022-0e313cc582
- FEDORA-2022-45097317b4
- FEDORA-2022-59a20edab2
- FEDORA-2022-67ec8c61d0
- FEDORA-2023-0c354a3f9a
- FEDORA-2023-0fa7715821
- FEDORA-2023-0fff8bc164
- FEDORA-2023-2663dc67d8
- FEDORA-2023-267503a090
- FEDORA-2023-2df9d60e4c
- FEDORA-2023-322314ad50
- FEDORA-2023-327346caa5
- FEDORA-2023-3baf3f43a0
- FEDORA-2023-3dba09f630
- FEDORA-2023-4e2068ba5d
- FEDORA-2023-5eca6a8326
- FEDORA-2023-62ce942e75
- FEDORA-2023-6550d9323b
- FEDORA-2023-6cfe7492c1
- FEDORA-2023-6d71ff268e
- FEDORA-2023-70eb8ba61e
- FEDORA-2023-74e5545901
- FEDORA-2023-8b700042ac
- FEDORA-2023-8c02aee138
- FEDORA-2023-8ecc0e487e
- FEDORA-2023-946dfaf17f
- FEDORA-2023-a5a5542890
- FEDORA-2023-aa7c75ed4a
- FEDORA-2023-abb47e24d8
- FEDORA-2023-ac4651c9b2
- FEDORA-2023-af2e3d1c18
- FEDORA-2023-c0149844e2
- FEDORA-2023-c9b2182a4e
- FEDORA-2023-ca444fdecf
- FEDORA-2023-cb3a59a3df
- FEDORA-2023-ce2836acfa
- FEDORA-2023-e16469fdec
- FEDORA-2023-e359fd31d2
- FEDORA-2023-e82fd2abcb
- FEDORA-2023-e8c27ba884
- FEDORA-2023-ee472c698c
- FEDORA-2023-f4bd7ab2f7
- FEDORA-2024-ae653fb07b
- FEDORA-2024-b85b97c0e9
- FEDORA-2024-fb32950d11
- FEDORA-2024-fd3545a844
- FREEBSD:6F5192F5-75A7-11ED-83C0-411D43CE7FE4
- FREEBSD:6FEA7103-2EA4-11ED-B403-3DAE8AC60D3E
- FREEBSD:854C2AFB-4424-11ED-AF97-ADCABF310F9B
- GLSA-202209-26
- GLSA-202311-09
- GO-2022-0969
- GO-2022-1037
- GO-2022-1038
- GO-2022-1039
- GO-2022-1144
- MS:CVE-2022-27664
- MS:CVE-2022-41717
- RHSA-2022:7129
- RHSA-2023:0328
- RHSA-2023:0446
- RHSA-2023:2167
- RHSA-2023:2177
- RHSA-2023:2193
- RHSA-2023:2204
- RHSA-2023:2222
- RHSA-2023:2236
- RHSA-2023:2253
- RHSA-2023:2282
- RHSA-2023:2283
- RHSA-2023:2357
- RHSA-2023:2367
- RHSA-2023:2592
- RHSA-2023:2758
- RHSA-2023:2780
- RHSA-2023:2784
- RHSA-2023:2785
- RHSA-2023:2802
- RHSA-2023:2866
- RHSA-2023:6420
- RHSA-2024:0121
- RHSA-2024:2988
- RHSA-2024:3254
- RLSA-2022:7129
- RLSA-2023:0328
- RLSA-2023:0446
- SUSE-SU-2022:3325-1
- SUSE-SU-2022:3326-1
- SUSE-SU-2022:3668-1
- SUSE-SU-2022:3669-1
- SUSE-SU-2022:4397-1
- SUSE-SU-2022:4398-1
- SUSE-SU-2023:2182-1
- SUSE-SU-2023:2183-1
- SUSE-SU-2023:2185-1
- SUSE-SU-2023:2187-1
- SUSE-SU-2023:2312-1
- SUSE-SU-2023:2575-1
- SUSE-SU-2023:2578-1
- SUSE-SU-2023:2579-1
- SUSE-SU-2023:2598-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- SUSE-SU-2024:0486-1
- SUSE-SU-2024:0487-1
- USN-6038-1
- USN-6038-2
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2023-2204 | https://linux.oracle.com/errata/ELSA-2023-2204.html | |
CVE | CVE-2022-41715 | https://linux.oracle.com/cve/CVE-2022-41715.html | |
CVE | CVE-2022-27664 | https://linux.oracle.com/cve/CVE-2022-27664.html | |
CVE | CVE-2022-41717 | https://linux.oracle.com/cve/CVE-2022-41717.html | |
CVE | CVE-2022-2879 | https://linux.oracle.com/cve/CVE-2022-2879.html | |
CVE | CVE-2022-2880 | https://linux.oracle.com/cve/CVE-2022-2880.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/weldr-client?distro=oraclelinux-9 | oraclelinux | weldr-client | < 35.9-1.el9 | oraclelinux-9 | ||
Affected | pkg:rpm/oraclelinux/python3-osbuild?distro=oraclelinux-9 | oraclelinux | python3-osbuild | < 81-1.el9 | oraclelinux-9 | ||
Affected | pkg:rpm/oraclelinux/osbuild?distro=oraclelinux-9 | oraclelinux | osbuild | < 81-1.el9 | oraclelinux-9 | ||
Affected | pkg:rpm/oraclelinux/osbuild-selinux?distro=oraclelinux-9 | oraclelinux | osbuild-selinux | < 81-1.el9 | oraclelinux-9 | ||
Affected | pkg:rpm/oraclelinux/osbuild-ostree?distro=oraclelinux-9 | oraclelinux | osbuild-ostree | < 81-1.el9 | oraclelinux-9 | ||
Affected | pkg:rpm/oraclelinux/osbuild-lvm2?distro=oraclelinux-9 | oraclelinux | osbuild-lvm2 | < 81-1.el9 | oraclelinux-9 | ||
Affected | pkg:rpm/oraclelinux/osbuild-luks2?distro=oraclelinux-9 | oraclelinux | osbuild-luks2 | < 81-1.el9 | oraclelinux-9 | ||
Affected | pkg:rpm/oraclelinux/osbuild-composer?distro=oraclelinux-9.2 | oraclelinux | osbuild-composer | < 76-2.el9_2 | oraclelinux-9.2 | ||
Affected | pkg:rpm/oraclelinux/osbuild-composer-worker?distro=oraclelinux-9.2 | oraclelinux | osbuild-composer-worker | < 76-2.el9_2 | oraclelinux-9.2 | ||
Affected | pkg:rpm/oraclelinux/osbuild-composer-dnf-json?distro=oraclelinux-9.2 | oraclelinux | osbuild-composer-dnf-json | < 76-2.el9_2 | oraclelinux-9.2 | ||
Affected | pkg:rpm/oraclelinux/osbuild-composer-core?distro=oraclelinux-9.2 | oraclelinux | osbuild-composer-core | < 76-2.el9_2 | oraclelinux-9.2 | ||
Affected | pkg:rpm/oraclelinux/cockpit-composer?distro=oraclelinux-9.2 | oraclelinux | cockpit-composer | < 45-1.0.1.el9_2 | oraclelinux-9.2 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |