SUSE-CU-2025:9183-1: Security update of suse/manager/5.0/x86_64/server-migration-14-16

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Fri Dec 19 08:28:06 UTC 2025


SUSE Container Update Advisory: suse/manager/5.0/x86_64/server-migration-14-16
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:9183-1
Container Tags        : suse/manager/5.0/x86_64/server-migration-14-16:5.0.6 , suse/manager/5.0/x86_64/server-migration-14-16:5.0.6.7.29.1 , suse/manager/5.0/x86_64/server-migration-14-16:latest
Container Release     : 7.29.1
Severity              : important
Type                  : security
References            : 1224386 1227888 1228260 1228535 1230093 1230516 1232526 1232528
                        1234068 1235151 1236588 1236589 1236590 1238491 1239566 1239938
                        1240788 1241219 1243397 1243706 1243794 1243933 1243991 1244050
                        1245199 1245309 1245310 1245311 1245314 1246197 1246197 1246974
                        1247498 1248501 1249191 1249191 1249348 1249348 1249367 1249367
                        1249375 1250553 1251305 1251979 1252160 1252974 1253332 1253332
                        1253332 1253333 1253333 1253333 CVE-2024-11053 CVE-2024-6197
                        CVE-2024-6874 CVE-2024-7264 CVE-2024-8096 CVE-2024-9681 CVE-2025-0167
                        CVE-2025-0665 CVE-2025-0725 CVE-2025-10148 CVE-2025-10148 CVE-2025-10911
                        CVE-2025-11731 CVE-2025-12817 CVE-2025-12817 CVE-2025-12817 CVE-2025-12818
                        CVE-2025-12818 CVE-2025-12818 CVE-2025-3576 CVE-2025-4877 CVE-2025-4878
                        CVE-2025-4947 CVE-2025-5025 CVE-2025-5318 CVE-2025-5372 CVE-2025-5399
                        CVE-2025-6075 CVE-2025-8114 CVE-2025-8277 CVE-2025-8291 CVE-2025-9086
                        CVE-2025-9086 
-----------------------------------------------------------------

The container suse/manager/5.0/x86_64/server-migration-14-16 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:2784-1
Released:    Tue Aug  6 14:58:38 2024
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1227888,1228535,CVE-2024-6197,CVE-2024-7264
This update for curl fixes the following issues:

- CVE-2024-7264: Fixed ASN.1 date parser overread (bsc#1228535)
- CVE-2024-6197: Fixed freeing stack buffer in utf8asn1str (bsc#1227888)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:3204-1
Released:    Wed Sep 11 10:55:22 2024
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1230093,CVE-2024-8096
This update for curl fixes the following issues:

- CVE-2024-8096: OCSP stapling bypass with GnuTLS. (bsc#1230093)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:3476-1
Released:    Fri Sep 27 15:16:38 2024
Summary:     Recommended update for curl
Type:        recommended
Severity:    moderate
References:  1230516
This update for curl fixes the following issue:

- Make special characters in URL work with aws-sigv4 (bsc#1230516).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:3925-1
Released:    Wed Nov  6 11:14:28 2024
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1232528,CVE-2024-9681
This update for curl fixes the following issues:

- CVE-2024-9681: Fixed HSTS subdomain overwrites parent cache entry (bsc#1232528)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:4288-1
Released:    Wed Dec 11 09:31:32 2024
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1234068,CVE-2024-11053
This update for curl fixes the following issues:

  - CVE-2024-11053: Fixed password leak used for the first host to the followed-to host under certain circumstances (bsc#1234068)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:77-1
Released:    Mon Jan 13 10:43:05 2025
Summary:     Recommended update for curl
Type:        recommended
Severity:    moderate
References:  1235151

This update for curl fixes the following issue:

- smtp: for starttls, do full upgrade [bsc#1235151]
  * Make sure the TLS handshake after a successful STARTTLS command
    is fully done before further sending/receiving on the connection.
  
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:369-1
Released:    Wed Feb  5 16:32:36 2025
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1236588,1236590,CVE-2025-0167,CVE-2025-0725
This update for curl fixes the following issues:

- CVE-2025-0725: Fixed gzip integer overflow (bsc#1236590)
- CVE-2025-0167: Fixed netrc and default credential leak (bsc#1236588)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2229-1
Released:    Fri Jul  4 18:02:30 2025
Summary:     Security update for libssh
Type:        security
Severity:    important
References:  1245309,1245310,1245311,1245314,CVE-2025-4877,CVE-2025-4878,CVE-2025-5318,CVE-2025-5372
This update for libssh fixes the following issues:

- CVE-2025-5318: Fixed likely read beyond bounds in sftp server handle management (bsc#1245311).
- CVE-2025-4877: Fixed write beyond bounds in binary to base64 conversion functions (bsc#1245309).
- CVE-2025-4878: Fixed use of uninitialized variable in privatekey_from_file() (bsc#1245310).
- CVE-2025-5372: Fixed cases where ssh_kdf() returns a success code on certain failures (bsc#1245314).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3198-1
Released:    Fri Sep 12 14:15:08 2025
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1228260,1236589,1243397,1243706,1243933,1246197,1249191,1249348,1249367,CVE-2024-6874,CVE-2025-0665,CVE-2025-10148,CVE-2025-4947,CVE-2025-5025,CVE-2025-5399,CVE-2025-9086
This update for curl fixes the following issues:

Update to version 8.14.1 (jsc#PED-13055, jsc#PED-13056).    
    
Security issues fixed:

- CVE-2025-0665: eventfd double close can cause libcurl to act unreliably (bsc#1236589).
- CVE-2025-4947: QUIC certificate check is skipped with wolfSSL allows for MITM attacks (bsc#1243397).
- CVE-2025-5025: no QUIC certificate pinning with wolfSSL can lead to connections to impostor servers that are not
  easily noticed (bsc#1243706).
- CVE-2025-5399: bug in websocket code can cause libcurl to get trapped in an endless busy-loop when processing
  specially crafted packets (bsc#1243933).
- CVE-2024-6874: punycode conversions to/from IDN can leak stack content when libcurl is built to use the macidn IDN
  backend (bsc#1228260).
- CVE-2025-9086: bug in patch comparison logic when processing cookies can lead to out-of-bounds read in heap buffer
  (bsc#1249191).
- CVE-2025-10148: predictable websocket mask can lead to proxy cache poisoning by malicious server (bsc#1249348).

Other issues fixed:
    
- Fix wrong return code when --retry is used (bsc#1249367).
  * tool_operate: fix return code when --retry is used but not triggered [b42776b]
    
- Fix the --ftp-pasv option in curl v8.14.1 (bsc#1246197).
  * tool_getparam: fix --ftp-pasv [5f805ee]

- Fixed with version 8.14.1:
  * TLS: add CURLOPT_SSL_SIGNATURE_ALGORITHMS and --sigalgs.
  * websocket: add option to disable auto-pong reply.
  * huge number of bugfixes.

  Please see https://curl.se/ch/ for full changelogs.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3268-1
Released:    Thu Sep 18 13:08:10 2025
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1246197,1249191,1249348,1249367,CVE-2025-10148,CVE-2025-9086
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2025-9086: bug in patch comparison logic when processing cookies can lead to out-of-bounds read in heap buffer
  (bsc#1249191).
- CVE-2025-10148: predictable websocket mask can lead to proxy cache poisoning by malicious server (bsc#1249348).
    
Other issues fixed:
    
- Fix the --ftp-pasv option in curl v8.14.1 (bsc#1246197).
  * tool_getparam: fix --ftp-pasv [5f805ee]

- Update to version 8.14.1 (jsc#PED-13055, jsc#PED-13056).
  * TLS: add CURLOPT_SSL_SIGNATURE_ALGORITHMS and --sigalgs.
  * websocket: add option to disable auto-pong reply.
  * huge number of bugfixes.

  Please see https://curl.se/ch/ for full changelogs.


-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3369-1
Released:    Fri Sep 26 12:54:43 2025
Summary:     Security update for libssh
Type:        security
Severity:    moderate
References:  1246974,1249375,CVE-2025-8114,CVE-2025-8277
This update for libssh fixes the following issues:

- CVE-2025-8277: memory exhaustion leading to client-side DoS due to improper memory management when KEX process is
  repeated with incorrect guesses (bsc#1249375).
- CVE-2025-8114: NULL pointer dereference when an allocation error happens during the calculation of the KEX session ID
  (bsc#1246974).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3699-1
Released:    Tue Oct 21 12:07:47 2025
Summary:     Security update for krb5
Type:        security
Severity:    moderate
References:  1241219,CVE-2025-3576
This update for krb5 fixes the following issues:

- CVE-2025-3576: weakness in the MD5 checksum design allows for spoofing of GSSAPI-protected messages that are using
  RC4-HMAC-MD5 (bsc#1241219).

Krb5 as very old protocol supported quite a number of ciphers
that are not longer up to current cryptographic standards.

To avoid problems with those, SUSE has by default now disabled
those alorithms.

The following algorithms have been removed from valid krb5 enctypes:

- des3-cbc-sha1
- arcfour-hmac-md5

To reenable those algorithms, you can use allow options in krb5.conf:

[libdefaults]
allow_des3 = true
allow_rc4 = true

to reenable them.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3836-1
Released:    Tue Oct 28 11:38:00 2025
Summary:     Recommended update for bash
Type:        recommended
Severity:    important
References:  1245199
This update for bash fixes the following issues:

- Fix histfile missing timestamp for the oldest record (bsc#1245199)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3875-1
Released:    Thu Oct 30 16:26:57 2025
Summary:     Security update for libxslt
Type:        security
Severity:    important
References:  1250553,1251979,CVE-2025-10911,CVE-2025-11731
This update for libxslt fixes the following issues:

  - CVE-2025-11731: fixed a type confusion in exsltFuncResultComp function leading to denial of service (bsc#1251979)
  - CVE-2025-10911: last fix caused a regression, patch was temporary disabled (bsc#1250553)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3877-1
Released:    Fri Oct 31 05:29:41 2025
Summary:     Recommended update for libselinux
Type:        recommended
Severity:    important
References:  1252160
This update for libselinux fixes the following issues:

- Ship license file (bsc#1252160)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3930-1
Released:    Tue Nov  4 09:26:22 2025
Summary:     Recommended update for gcc15
Type:        recommended
Severity:    moderate
References:  1232526,1238491,1239566,1239938,1240788,1243794,1243991,1244050
This update for gcc15 fixes the following issues:

This update ships the GNU Compiler Collection GCC 15.2. (jsc#PED-12029)

The compiler runtime libraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 14 ones.

The new compilers for C, C++, and Fortran are provided for SUSE Linux
Enterprise 15 SP6 and SP7, and provided in the 'Development Tools' module.

The Go, D, Ada and Modula 2 language compiler parts are available
unsupported via the PackageHub repositories.

To use gcc15 compilers use:

- install 'gcc15' or 'gcc15-c++' or one of the other 'gcc15-COMPILER' frontend packages.
- override your Makefile to use CC=gcc15, CXX=g++15 and similar overrides for the other languages.

For a full changelog with all new GCC15 features, check out

	https://gcc.gnu.org/gcc-15/changes.html


Update to GCC 15.2 release:

  * the GCC 15.2 release contains regression fixes accumulated since
    the GCC 15.1 release

- Prune the use of update-alternatives from openSUSE Factory and
  SLFO.

- Adjust crosses to conflict consistently where they did not
  already and make them use unsuffixed binaries.

- Tune for power10 for SLES 16.  [jsc#PED-12029]
- Tune for z15 for SLES 16.  [jsc#PED-253]

- Fix PR120827, ICE due to splitter emitting constant loads directly

- Exclude shared objects present for link editing in the GCC specific
  subdirectory from provides processing via __provides_exclude_from.
  [bsc#1244050][bsc#1243991]

- Make cross-*-gcc15-bootstrap package conflict with the non-bootstrap
  variant conflict with the unversioned cross-*-gcc package.

- Enable C++ for offload compilers.  [bsc#1243794]

- Add libgcobol and libquadmath-devel dependence to the cobol frontend
  package.

Update to GCC 15 branch head, 15.1.1+git9595

  * includes GCC 15.1 release

- Enable gfx9-generic, gfx10-3-generic and gfx11-generic multilibs
  for the AMD GCN offload compiler when llvm is new enough.
- Make sure link editing is done against our own shared library
  copy rather than the installed system runtime.  [bsc#1240788]
- Fix newlib libm miscompilation for GCN offloading.

Update to GCC trunk head, 15.0.1+git9001

  * includes -msplit-patch-nops required for user-space livepatching
    on powerpc
  * includes fix for Ada build with --enable-host-pie

- Build GCC executables PIE on SLE.  [bsc#1239938]
- Includes change to also record -D_FORTIFY_SOURCE=2 in the DWARF
  debug info DW_AT_producer string.  [bsc#1239566]
- Package GCC COBOL compiler for openSUSE Factory for supported
  targets which are x86_64, aarch64 and ppc64le.
- Disable profiling during build when %want_reproducible_builds is set
  [bsc#1238491]
- Includes fix for emacs JIT use
- Bumps libgo SONAME to libgo24 which should fix go1.9 build
- Adjust cross compiler requirements to use %requires_ge
- For cross compilers require the same or newer binutils, newlib
  or cross-glibc that was used at build time.  [bsc#1232526]

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3934-1
Released:    Tue Nov  4 12:23:11 2025
Summary:     Recommended update for cyrus-sasl
Type:        recommended
Severity:    moderate
References:  1247498
This update for cyrus-sasl fixes the following issue:

- Replace insecure MD5 with ephemeral HMAC-SHA256 (bsc#1247498).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:4138-1
Released:    Wed Nov 19 11:15:12 2025
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  1224386,1248501
This update for systemd fixes the following issues:

- systemd.spec: use %sysusers_generate_pre so that some systemd users are
  already available in %pre. This is important because D-Bus automatically
  reloads its configuration whenever new configuration files are installed,
  i.e. between %pre and %post. (bsc#1248501)
  
  No needs for systemd and udev packages as they are always installed during
  the initial installation.

- Split systemd-network into two new sub-packages: systemd-networkd and
  systemd-resolved (bsc#1224386 jsc#PED-12669)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:4363-1
Released:    Thu Dec 11 11:10:57 2025
Summary:     Security update for postgresql17, postgresql18
Type:        security
Severity:    important
References:  1253332,1253333,CVE-2025-12817,CVE-2025-12818
This update for postgresql17, postgresql18 fixes the following issues:

Changes in postgresql18:

- Fix build with uring for post SLE15 code streams.

Update to 18.1:

  * https://www.postgresql.org/about/news/p-3171/
  * https://www.postgresql.org/docs/release/18.1/
  * bsc#1253332, CVE-2025-12817: Missing check for CREATE
    privileges on the schema in CREATE STATISTICS allowed table
    owners to create statistics in any schema, potentially leading
    to unexpected naming conflicts.
  * bsc#1253333, CVE-2025-12818: Several places in libpq were not
    sufficiently careful about computing the required size of a
    memory allocation. Sufficiently large inputs could cause
    integer overflow, resulting in an undersized buffer, which
    would then lead to writing past the end of the buffer.

- pg_config --libs returns -lnuma so we need to require it.

Update to 18.0:

  * https://www.postgresql.org/about/news/p-3142/
  * https://www.postgresql.org/docs/18/release-18.html


Changes in postgresql17:

Update to 17.7:

  * https://www.postgresql.org/about/news/p-3171/
  * https://www.postgresql.org/docs/release/17.7/
  * bsc#1253332, CVE-2025-12817: Missing check for CREATE
    privileges on the schema in CREATE STATISTICS allowed table
    owners to create statistics in any schema, potentially leading
    to unexpected naming conflicts.
  * bsc#1253333, CVE-2025-12818: Several places in libpq were not
    sufficiently careful about computing the required size of a
    memory allocation. Sufficiently large inputs could cause
    integer overflow, resulting in an undersized buffer, which
    would then lead to writing past the end of the buffer.

- switch library to pg 18

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:4368-1
Released:    Thu Dec 11 16:12:16 2025
Summary:     Security update for python3
Type:        security
Severity:    low
References:  1251305,1252974,CVE-2025-6075,CVE-2025-8291
This update for python3 fixes the following issues:

- CVE-2025-6075: quadratic complexity in `os.path.expandvars()` can lead to performance degradation when values passed
  to it are user-controlled (bsc#1252974).
- CVE-2025-8291: lack of validity checks on the ZIP64 End of Central Directory (EOCD) record allows for the creation of
  ZIP archives that are processed inconsistently by the `zipfile` module (bsc#1251305).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:4371-1
Released:    Thu Dec 11 20:04:44 2025
Summary:     Security update for postgresql14
Type:        security
Severity:    important
References:  1253332,1253333,CVE-2025-12817,CVE-2025-12818
This update for postgresql14 fixes the following issues:

Upgraded to 14.20:

- CVE-2025-12817: Fixed missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332)
- CVE-2025-12818: Fixed integer overflow in allocation-size calculations within libpq (bsc#1253333)
  
Other fixes:

- Use %product_libs_llvm_ver to determine the LLVM version.
- Remove conditionals for obsolete PostgreSQL releases.
- Sync spec file from version 18.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:4388-1
Released:    Fri Dec 12 14:36:27 2025
Summary:     Security update for postgresql16
Type:        security
Severity:    important
References:  1253332,1253333,CVE-2025-12817,CVE-2025-12818
This update for postgresql16 fixes the following issues:

Upgraded to 16.11:

- CVE-2025-12817: Fixed missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332)
- CVE-2025-12818: Fixed integer overflow in allocation-size calculations within libpq (bsc#1253333)
  
Other fixes:

- Use %product_libs_llvm_ver to determine the LLVM version.
- Remove conditionals for obsolete PostgreSQL releases.
- Sync spec file from version 18.


The following package changes have been done:

- libssh-config-0.9.8-150600.11.6.1 added
- libsasl2-3-2.1.28-150600.7.9.2 updated
- libunistring2-0.9.10-1.1 added
- libnghttp2-14-1.40.0-150600.23.2 added
- libbrotlicommon1-1.0.7-150200.3.5.1 added
- libbrotlidec1-1.0.7-150200.3.5.1 added
- libgcc_s1-15.2.0+git10201-150000.1.3.3 updated
- libidn2-0-2.2.0-3.6.1 added
- libstdc++6-15.2.0+git10201-150000.1.3.3 updated
- libpsl5-0.20.1-150000.3.3.1 added
- libselinux1-3.5-150600.3.3.1 updated
- krb5-1.20.1-150600.11.14.1 updated
- libssh4-0.9.8-150600.11.6.1 added
- libreadline7-7.0-150400.27.6.1 updated
- bash-4.4-150400.27.6.1 updated
- bash-sh-4.4-150400.27.6.1 updated
- libcurl4-8.14.1-150600.4.28.1 added
- libsystemd0-254.27-150600.4.46.2 updated
- libpq5-18.1-150600.13.3.1 updated
- libxslt1-1.1.34-150400.3.13.1 updated
- libpython3_6m1_0-3.6.15-150300.10.100.1 updated
- python3-base-3.6.15-150300.10.100.1 updated
- postgresql-18-150600.17.9.1 updated
- postgresql14-14.20-150600.16.23.1 updated
- postgresql16-16.11-150600.16.25.1 updated
- postgresql-server-18-150600.17.9.1 updated
- postgresql14-server-14.20-150600.16.23.1 updated
- postgresql16-server-16.11-150600.16.25.1 updated
- postgresql16-contrib-16.11-150600.16.25.1 updated
- postgresql-contrib-18-150600.17.9.1 updated
- postgresql14-contrib-14.20-150600.16.23.1 updated
- container:suse-manager-5.0-init-5.0.6-5.0.6-7.27.8 added
- container:suse-manager-5.0-init-5.0.5.1-5.0.5.1-7.24.10 removed


More information about the sle-container-updates mailing list