Security update for sccache
| Announcement ID: | SUSE-SU-2022:4073-1 | 
|---|---|
| Rating: | moderate | 
| References: | |
| Cross-References: | |
| CVSS scores: | 
                    
  | 
            
| Affected Products: | 
                
  | 
        
An update that solves two vulnerabilities and has one security fix can now be installed.
Description:
This update for sccache fixes the following issues:
Updated to version 0.3.0:
- CVE-2022-24713: Fixed Regex denial of service (bsc#1196972).
 - CVE-2021-45710: Fixed tokio data race with memory corruption (bsc#1194119).
 - Added hardening to systemd service(s) (bsc#1181400).
 
Patch Instructions:
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".
        Alternatively you can run the command listed for your product:
    
- 
                openSUSE Leap 15.3
                
                    
                        
zypper in -t patch SUSE-2022-4073=1 - 
                Development Tools Module 15-SP3
                
                    
                        
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-4073=1 
Package List:
- 
                    openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
                    
- sccache-debugsource-0.3.0~git5.14a4b8b-150300.7.9.1
 - sccache-0.3.0~git5.14a4b8b-150300.7.9.1
 - sccache-debuginfo-0.3.0~git5.14a4b8b-150300.7.9.1
 
 - 
                    Development Tools Module 15-SP3 (aarch64 x86_64)
                    
- sccache-debugsource-0.3.0~git5.14a4b8b-150300.7.9.1
 - sccache-0.3.0~git5.14a4b8b-150300.7.9.1
 - sccache-debuginfo-0.3.0~git5.14a4b8b-150300.7.9.1