SUSE-CU-2025:762-1: Security update of suse/stunnel
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Mon Feb 10 17:07:50 UTC 2025
SUSE Container Update Advisory: suse/stunnel
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:762-1
Container Tags : suse/stunnel:5 , suse/stunnel:5.70 , suse/stunnel:5.70-37.5 , suse/stunnel:latest
Container Release : 37.5
Severity : moderate
Type : security
References : 1235873 1236619 CVE-2025-24528
-----------------------------------------------------------------
The container suse/stunnel was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:358-1
Released: Wed Feb 5 10:06:22 2025
Summary: Recommended update for permissions
Type: recommended
Severity: moderate
References: 1235873
This update for permissions fixes the following issues:
- Version update 20240826:
* permissions: remove legacy and nonsensical entries.
* permissions: remove traceroute entry.
* permissions: remove outdated sudo directories.
* permissions: remove legacy RPM directory entries.
* permissions: remove some static /var/spool/* dirs.
* permissions: remove unnecessary static dirs and devices (bsc#1235873).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:401-1
Released: Mon Feb 10 10:38:28 2025
Summary: Security update for crypto-policies, krb5
Type: security
Severity: moderate
References: 1236619,CVE-2025-24528
This update for crypto-policies and krb5 fixes the following issues:
Security issue fixed:
- CVE-2025-24528: Fixed out-of-bounds write caused by overflow when calculating ulog block size can lead to process crash (bsc#1236619).
Feature addition:
- Add crypto-policies support; (jsc#PED-12018)
* The default krb5.conf has been updated to include config
snippets in the krb5.conf.d directory, where crypto-policies
drops its.
- Allow to use KRB5KDF in FIPS mode; (jsc#PED-12018);
* This key derivation function is used by AES256-CTS-HMAC-SHA1-96
and AES128-CTS-HMAC-SHA1-96 encryption types, used by Active
directory. If these encryption types are allowed or not in
FIPS mode is enforced now by the FIPS:AD-SUPPORT subpolicy.
The following package changes have been done:
- crypto-policies-20230920.570ea89-150600.3.3.1 updated
- krb5-1.20.1-150600.11.8.1 updated
- permissions-20240826-150600.10.15.2 updated
More information about the sle-container-updates
mailing list