![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2022.4635.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2022:4635-1) |
Summary: | The remote host is missing an update for the 'conmon' package(s) announced via the SUSE-SU-2022:4635-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'conmon' package(s) announced via the SUSE-SU-2022:4635-1 advisory. Vulnerability Insight: This update for conmon fixes the following issues: conmon was updated to version 2.1.5: don't leak syslog_identifier logging: do not read more that the buf size logging: fix error handling Makefile: Fix install for FreeBSD signal: Track changes to get_signal_descriptor in the FreeBSD version Packit: initial enablement Update to version 2.1.4: Fix a bug where conmon crashed when it got a SIGCHLD update to 2.1.3: Stop using g_unix_signal_add() to avoid threads Rename CLI optionlog-size-global-max to log-global-size-max Update to version 2.1.2: add log-global-size-max option to limit the total output conmon processes (CVE-2022-1708 bsc#1200285) journald: print tag and name if both are specified drop some logs to debug level Update to version 2.1.0 logging: buffer partial messages to journald exit: close all fds >= 3 fix: cgroup: Free memory_cgroup_file_path if open fails. Update to version 2.0.32 Fix: Avoid mainfd_std{in,out} sharing the same file descriptor. exit_command: Fix: unset subreaper attribute before running exit command Update to version 2.0.31 logging: new mode -l passthrough ctr_logs: use container name or ID as SYSLOG_IDENTIFIER for journald conmon: Fix: free userdata files before exec cleanup Affected Software/OS: 'conmon' package(s) on SUSE Linux Enterprise Micro 5.3, SUSE Linux Enterprise Module for Containers 15-SP4. Solution: Please install the updated package(s). CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-1708 https://bugzilla.redhat.com/show_bug.cgi?id=2085361 https://github.com/cri-o/cri-o/commit/f032cf649ecc7e0c46718bd9e7814bfb317cb544 https://github.com/cri-o/cri-o/security/advisories/GHSA-fcm2-6c3h-pg6j |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |