SUSE-CU-2025:5657-1: Security update of suse/sl-micro/6.0/toolbox
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Tue Jul 29 07:22:09 UTC 2025
SUSE Container Update Advisory: suse/sl-micro/6.0/toolbox
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:5657-1
Container Tags : suse/sl-micro/6.0/toolbox:13.2 , suse/sl-micro/6.0/toolbox:13.2-9.16 , suse/sl-micro/6.0/toolbox:latest
Container Release : 9.16
Severity : important
Type : security
References : 1174091 1216091 1218459 1221107 1227378 1241052 1242844 1243155
1243273 1243772 1244032 1244056 1244059 1244060 1244061 1244596
1244705 831629 CVE-2019-20907 CVE-2019-9947 CVE-2020-15523 CVE-2020-15801
CVE-2024-12718 CVE-2024-2236 CVE-2025-4138 CVE-2025-4330 CVE-2025-4373
CVE-2025-4435 CVE-2025-4516 CVE-2025-4517 CVE-2025-48964 CVE-2025-6052
CVE-2025-6069
-----------------------------------------------------------------
The container suse/sl-micro/6.0/toolbox was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: 381
Released: Fri Jul 11 11:20:30 2025
Summary: Security update for libgcrypt
Type: security
Severity: moderate
References: 1221107,CVE-2024-2236
This update for libgcrypt fixes the following issues:
- CVE-2024-2236: Fixed timing based side-channel in RSA implementation (bsc#1221107)
-----------------------------------------------------------------
Advisory ID: 379
Released: Fri Jul 11 11:47:32 2025
Summary: Security update for python311
Type: security
Severity: important
References: 1174091,1227378,1243155,1243273,1244032,1244056,1244059,1244060,1244061,1244705,831629,CVE-2019-20907,CVE-2019-9947,CVE-2020-15523,CVE-2020-15801,CVE-2024-12718,CVE-2025-4138,CVE-2025-4330,CVE-2025-4435,CVE-2025-4516,CVE-2025-4517,CVE-2025-6069
This update for python311 fixes the following issues:
- CVE-2025-6069: Avoid worst case quadratic complexity when processing
certain crafted malformed inputs with HTMLParser (bsc#1244705).
Update to 3.11.13:
- Security
- gh-135034: Fixes multiple issues that allowed tarfile
extraction filters (filter='data' and filter='tar')
to be bypassed using crafted symlinks and hard links.
Addresses CVE-2024-12718 (bsc#1244056), CVE-2025-4138
(bsc#1244059), CVE-2025-4330 (bsc#1244060), and
CVE-2025-4517 (bsc#1244032). Also addresses CVE-2025-4435
(gh#135034, bsc#1244061).
- gh-133767: Fix use-after-free in the âunicode-escapeâ
decoder with a non-âstrictâ error handler (CVE-2025-4516,
bsc#1243273).
- gh-128840: Short-circuit the processing of long IPv6
addresses early in ipaddress to prevent excessive memory
consumption and a minor denial-of-service.
- Library
- gh-128840: Fix parsing long IPv6 addresses with embedded
IPv4 address.
- gh-134062: ipaddress: fix collisions in __hash__() for
IPv4Network and IPv6Network objects.
- gh-123409: Fix ipaddress.IPv6Address.reverse_pointer output
according to RFC 3596, §2.5. Patch by Bénédikt Tran.
- bpo-43633: Improve the textual representation of
IPv4-mapped IPv6 addresses (RFC 4291 Sections 2.2, 2.5.5.2)
in ipaddress. Patch by Oleksandr Pavliuk.
- CVE-2025-4516: Fixed blocking DecodeError handling
vulnerability, which could lead to DoS. (bsc#1243273)
-----------------------------------------------------------------
Advisory ID: 388
Released: Mon Jul 21 11:01:26 2025
Summary: Recommended update for rpm
Type: recommended
Severity: important
References: 1216091,1218459,1241052
This update for rpm fixes the following issues:
- fix --runposttrans not working correctly with the --root
option [bsc#1216091]
* added 'rpm_fixed_runposttrans' provides for libzypp
- print scriptlet messages in --runposttrans
* needed to fix leaking tmp files [bsc#1218459]
- fix memory leak in str2locale [bsc#1241052]
-----------------------------------------------------------------
Advisory ID: 390
Released: Mon Jul 21 12:04:01 2025
Summary: Security update for iputils
Type: security
Severity: moderate
References: 1243772,CVE-2025-48964
This update for iputils fixes the following issues:
- CVE-2025-48964: Fixed integer overflow in ping statistics via zero timestamp (bsc#1243772)
-----------------------------------------------------------------
Advisory ID: 395
Released: Thu Jul 24 13:51:08 2025
Summary: Security update for glib2
Type: security
Severity: important
References: 1242844,1244596,CVE-2025-4373,CVE-2025-6052
This update for glib2 fixes the following issues:
- CVE-2025-4373: Fixed buffer underflow through glib/gstring.c via
function g_string_insert_unichar (bsc#1242844)
- CVE-2025-6052: Fixed integer overflow in g_string_maybe_expand()
leads to potential buffer overflow in GString (bsc#1244596)
The following package changes have been done:
- SL-Micro-release-6.0-25.37 updated
- iputils-20221126-6.1 updated
- libgcrypt20-1.10.3-2.1 updated
- libglib-2_0-0-2.76.2-9.1 updated
- libgmodule-2_0-0-2.76.2-9.1 updated
- libpython3_11-1_0-3.11.13-1.1 updated
- libzypp-17.37.12-1.1 updated
- python311-base-3.11.13-1.1 updated
- rpm-4.18.0-7.1 updated
- skelcd-EULA-SL-Micro-2024.01.19-8.36 updated
More information about the sle-container-updates
mailing list