SUSE-CU-2025:5950-1: Security update of suse/manager/4.3/proxy-httpd

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Tue Aug 5 12:04:51 UTC 2025


SUSE Container Update Advisory: suse/manager/4.3/proxy-httpd
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:5950-1
Container Tags        : suse/manager/4.3/proxy-httpd:4.3.16 , suse/manager/4.3/proxy-httpd:4.3.16.9.67.10 , suse/manager/4.3/proxy-httpd:latest
Container Release     : 9.67.10
Severity              : important
Type                  : security
References            : 1243935 1246169 1246296 1246302 1246303 1246305 1246306 1246307
                        1246477 CVE-2024-42516 CVE-2024-43204 CVE-2024-47252 CVE-2025-23048
                        CVE-2025-4598 CVE-2025-49630 CVE-2025-49812 CVE-2025-53020 CVE-2025-7425
-----------------------------------------------------------------

The container suse/manager/4.3/proxy-httpd was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2620-1
Released:    Mon Aug  4 09:42:43 2025
Summary:     Security update for libxml2
Type:        security
Severity:    important
References:  1246296,CVE-2025-7425
This update for libxml2 fixes the following issues:

- CVE-2025-7425: Fixed heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr (bsc#1246296)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2675-1
Released:    Mon Aug  4 15:53:48 2025
Summary:     Security update for systemd
Type:        security
Severity:    moderate
References:  1243935,CVE-2025-4598
This update for systemd fixes the following issues:

- CVE-2025-4598: Fixed race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump (bsc#1243935).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2682-1
Released:    Mon Aug  4 17:05:33 2025
Summary:     Security update for apache2
Type:        security
Severity:    important
References:  1246169,1246302,1246303,1246305,1246306,1246307,1246477,CVE-2024-42516,CVE-2024-43204,CVE-2024-47252,CVE-2025-23048,CVE-2025-49630,CVE-2025-49812,CVE-2025-53020
This update for apache2 fixes the following issues:

- CVE-2024-42516: Fixed HTTP response splitting. (bsc#1246477)
- CVE-2024-43204: Fixed a SSRF when mod_proxy is loaded that allows an attacker to send outbound proxy requests to a URL controlled by them. (bsc#1246305)
- CVE-2024-47252: Fixed insufficient escaping of user-supplied data in mod_ssl allows an untrusted SSL/TLS client to insert escape characters into log file. (bsc#1246303)
- CVE-2025-23048: Fixed access control bypass by trusted clients through TLS 1.3 session resumption in some mod_ssl configurations. (bsc#1246302)
- CVE-2025-49630: Fixed denial of service can be triggered by untrusted clients causing an assertion in mod_proxy_http2. (bsc#1246307)
- CVE-2025-49812: Fixed Opossum Attack Application Layer Desynchronization using Opportunistic TLS. (bsc#1246169)
- CVE-2025-53020: Fixed HTTP/2 denial of service due to late release of memory after effective lifetime. (bsc#1246306)


The following package changes have been done:

- libxml2-2-2.9.14-150400.5.47.1 updated
- apache2-utils-2.4.51-150400.6.46.1 updated
- systemd-249.17-150400.8.49.2 updated
- python3-libxml2-2.9.14-150400.5.47.1 updated
- apache2-2.4.51-150400.6.46.1 updated
- apache2-prefork-2.4.51-150400.6.46.1 updated
- container:sles15-ltss-image-15.4.0-2.62 updated


More information about the sle-container-updates mailing list