SUSE-IU-2025:586-1: Security update of suse-sles-15-sp5-chost-byos-v20250212-hvm-ssd-x86_64

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Thu Feb 13 12:11:44 UTC 2025


SUSE Image Update Advisory: suse-sles-15-sp5-chost-byos-v20250212-hvm-ssd-x86_64
-----------------------------------------------------------------
Image Advisory ID : SUSE-IU-2025:586-1
Image Tags        : suse-sles-15-sp5-chost-byos-v20250212-hvm-ssd-x86_64:20250212
Image Release     : 
Severity          : important
Type              : security
References        : 1185551 1212476 1216091 1219680 1227237 1229106 1230795 1232458
                        1234444 1234752 1235636 1235991 1235992 1236136 1236460 1236588
                        1236590 1236596 1236619 CVE-2021-31879 CVE-2022-49043 CVE-2024-11187
                        CVE-2024-13176 CVE-2025-0167 CVE-2025-0725 CVE-2025-24528 
-----------------------------------------------------------------

The container suse-sles-15-sp5-chost-byos-v20250212-hvm-ssd-x86_64 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:287-1
Released:    Wed Jan 29 16:24:46 2025
Summary:     Recommended update for cloud-init
Type:        recommended
Severity:    moderate
References:  1212476,1219680,1227237
This update for cloud-init fixes the following issues:

- remove dependency on /usr/bin/python3 via using the macros (bsc#1212476).
  + Brute force approach to skip renames if the device is already present
- cloud-init: Wait for udev once if we cannot find the expected MAC (bsc#1227237).
- cloud-init: rename devices below VLAN fails again/on SLES 15 SP5 (bsc#1219680).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:304-1
Released:    Thu Jan 30 15:52:19 2025
Summary:     Security update for krb5
Type:        security
Severity:    moderate
References:  1236619,CVE-2025-24528
This update for krb5 fixes the following issues:

- CVE-2025-24528: Fixed out-of-bounds write caused by overflow when calculating ulog block size can lead to process crash (bsc#1236619).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:321-1
Released:    Mon Feb  3 08:37:56 2025
Summary:     Recommended update for python-instance-billing-flavor-check
Type:        recommended
Severity:    moderate
References:  1235991,1235992
This update for python-instance-billing-flavor-check fixes the following issues:

- Add time stamp to log (bsc#1235991, bsc#1235992)
- Doc improvements clarifying exit status codes

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:345-1
Released:    Mon Feb  3 21:03:54 2025
Summary:     Security update for openssl-1_1
Type:        security
Severity:    moderate
References:  1236136,CVE-2024-13176
This update for openssl-1_1 fixes the following issues:

- CVE-2024-13176: Fixed timing side-channel in the ECDSA signature computation (bsc#1236136) 

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:348-1
Released:    Tue Feb  4 08:10:23 2025
Summary:     Security update for libxml2
Type:        security
Severity:    important
References:  1236460,CVE-2022-49043
This update for libxml2 fixes the following issues:

- CVE-2022-49043: Fixed a use-after-free in xmlXIncludeAddNode. (bsc#1236460)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:359-1
Released:    Wed Feb  5 10:08:48 2025
Summary:     Security update for bind
Type:        security
Severity:    important
References:  1236596,CVE-2024-11187
This update for bind fixes the following issues:

- CVE-2024-11187: Fixes CPU exhaustion caused by many records in the additional section (bsc#1236596)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:362-1
Released:    Wed Feb  5 11:01:18 2025
Summary:     Recommended update for libzypp, zypper
Type:        recommended
Severity:    moderate
References:  1216091,1229106,1232458,1234752,1235636
This update for libzypp, zypper fixes the following issues:

- Create '.keep_packages' in the package cache dir to enforce keeping downloaded packages
  of all repos cached there (bsc#1232458)
- Fix missing UID checks in repomanager workflow
- Move cmake config files to LIB_INSTALL_DIR/cmake/Zypp
- Fix 'zypper ps' when running in incus container. Should apply to lxc and lxd containers as well. (bsc#1229106)
- Re-enable 'rpm --runposttrans' usage for chrooted systems (bsc#1216091)
- lr: show the repositories keep-packages flag (bsc#1232458)
  It is shown in the  details view or by using -k,--keep-packages.
  In addition libyzpp supports to enforce keeping downloaded
  packages of all repos within a package cache by creating a
  '.keep_packages' file there.
- Try to refresh update repos first to have updated GPG keys on
  the fly (bsc#1234752)
  An update repo may contain a prolonged GPG key for the GA repo.
  Refreshing the update repo first updates a trusted key on the fly
  and avoids a 'key has expired' warning being issued when
  refreshing the GA repo.
- Refresh: Restore legacy behavior and suppress Exception
  reporting as non-root (bsc#1235636)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:366-1
Released:    Wed Feb  5 11:57:42 2025
Summary:     Security update for wget
Type:        security
Severity:    moderate
References:  1185551,1230795,CVE-2021-31879
This update for wget fixes the following issues:

- CVE-2021-31879: Authorization header disclosed upon redirects to different origins. (bsc#1185551)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:370-1
Released:    Wed Feb  5 16:33:28 2025
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1236588,1236590,CVE-2025-0167,CVE-2025-0725
This update for curl fixes the following issues:

- CVE-2025-0725: Fixed gzip integer overflow (bsc#1236590)
- CVE-2025-0167: Fixed netrc and default credential leak (bsc#1236588)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:437-1
Released:    Wed Feb 12 06:04:18 2025
Summary:     Recommended update for python-instance-billing-flavor-check
Type:        recommended
Severity:    important
References:  1234444
This update for python-instance-billing-flavor-check fixes the following issues:

- Improve detection of IPv4 and IPv6 network setup and use appropriate IP version to access the update servers (bsc#1234444)
- Improve reliability of flavor detection, use cached value in case of timeout (bsc#1234444)


The following package changes have been done:

- bind-utils-9.16.50-150500.8.24.1 updated
- cloud-init-config-suse-23.3-150100.8.85.4 updated
- cloud-init-23.3-150100.8.85.4 updated
- curl-8.0.1-150400.5.62.1 updated
- krb5-1.20.1-150500.3.12.1 updated
- libcurl4-8.0.1-150400.5.62.1 updated
- libopenssl1_1-1.1.1l-150500.17.40.1 updated
- libxml2-2-2.10.3-150500.5.20.1 updated
- libzypp-17.35.19-150500.6.36.1 updated
- openssl-1_1-1.1.1l-150500.17.40.1 updated
- python-instance-billing-flavor-check-0.1.2-150000.1.17.1 updated
- python3-bind-9.16.50-150500.8.24.1 updated
- wget-1.20.3-150000.3.29.1 updated
- zypper-1.14.81-150500.6.20.1 updated


More information about the sle-container-updates mailing list