SUSE-CU-2025:4398-1: Security update of suse/manager/5.0/x86_64/proxy-ssh

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Wed Jun 18 07:16:43 UTC 2025


SUSE Container Update Advisory: suse/manager/5.0/x86_64/proxy-ssh
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:4398-1
Container Tags        : suse/manager/5.0/x86_64/proxy-ssh:5.0.4 , suse/manager/5.0/x86_64/proxy-ssh:5.0.4.7.17.1 , suse/manager/5.0/x86_64/proxy-ssh:latest
Container Release     : 7.17.1
Severity              : important
Type                  : security
References            : 1220893 1220895 1220896 1225936 1225939 1225941 1225942 1227637
                        1230959 1231472 1231748 1232234 1232326 1234128 1234713 1235873
                        1236136 1236165 1236177 1236282 1236619 1236826 1236858 1236960
                        1237496 1239671 1239883 1240366 1240414 1240607 1241012 1241020
                        1241078 1241189 1241605 1242060 1242938 1243259 1243317 CVE-2024-10041
                        CVE-2024-13176 CVE-2025-0395 CVE-2025-24528 CVE-2025-27587 CVE-2025-29087
                        CVE-2025-29088 CVE-2025-31115 CVE-2025-32728 CVE-2025-3277 CVE-2025-4802
-----------------------------------------------------------------

The container suse/manager/5.0/x86_64/proxy-ssh was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:358-1
Released:    Wed Feb  5 10:06:22 2025
Summary:     Recommended update for permissions
Type:        recommended
Severity:    moderate
References:  1235873
This update for permissions fixes the following issues:

- Version update 20240826:
  * permissions: remove legacy and nonsensical entries.
  * permissions: remove traceroute entry.
  * permissions: remove outdated sudo directories.
  * permissions: remove legacy RPM directory entries.
  * permissions: remove some static /var/spool/* dirs.
  * permissions: remove unnecessary static dirs and devices (bsc#1235873).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:401-1
Released:    Mon Feb 10 10:38:28 2025
Summary:     Security update for crypto-policies, krb5
Type:        security
Severity:    moderate
References:  1236619,CVE-2025-24528
This update for crypto-policies and krb5 fixes the following issues:

Security issue fixed:

- CVE-2025-24528: Fixed out-of-bounds write caused by overflow when calculating ulog block size can lead to process crash (bsc#1236619).

Feature addition:

- Add crypto-policies support; (jsc#PED-12018)

  * The default krb5.conf has been updated to include config
    snippets in the krb5.conf.d directory, where crypto-policies
    drops its.

- Allow to use KRB5KDF in FIPS mode; (jsc#PED-12018); 

  * This key derivation function is used by AES256-CTS-HMAC-SHA1-96 
    and AES128-CTS-HMAC-SHA1-96 encryption types, used by Active
    directory. If these encryption types are allowed or not in 
    FIPS mode is enforced now by the FIPS:AD-SUPPORT subpolicy.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:430-1
Released:    Tue Feb 11 15:13:32 2025
Summary:     Security update for openssl-3
Type:        security
Severity:    moderate
References:  1236136,CVE-2024-13176
This update for openssl-3 fixes the following issues:

- CVE-2024-13176: Fixed timing side-channel in ECDSA signature computation (bsc#1236136).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:501-1
Released:    Thu Feb 13 10:53:21 2025
Summary:     Recommended update for permissions
Type:        recommended
Severity:    moderate
References:  1236960
This update for permissions fixes the following issues:

- Version update 20240826.
- Reintroduced nscd socket, this is a whitelisting for glibc (bsc#1236960).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:508-1
Released:    Thu Feb 13 12:29:31 2025
Summary:     Recommended update for findutils
Type:        recommended
Severity:    moderate
References:  1231472
This update for findutils fixes the following issue:

- fix crash when file system loop was encountered (bsc#1231472).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:582-1
Released:    Tue Feb 18 15:55:29 2025
Summary:     Security update for glibc
Type:        security
Severity:    low
References:  1236282,CVE-2025-0395
This update for glibc fixes the following issues:

- CVE-2025-0395: Fix underallocation of abort_msg_s struct (bsc#1236282)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:626-1
Released:    Fri Feb 21 12:18:09 2025
Summary:     Recommended update for crypto-policies
Type:        recommended
Severity:    moderate
References:  1236858
This update for crypto-policies fixes the following issue:

- Remove dangling symlink for the libreswan config (bsc#1236858).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:915-1
Released:    Wed Mar 19 08:04:05 2025
Summary:     Recommended update for libgcrypt
Type:        recommended
Severity:    moderate
References:  1220893,1220895,1220896,1225936,1225939,1225941,1225942
This update for libgcrypt fixes the following issues:

- FIPS: Differentiate non-compliant flags in the SLI [bsc#1225939]
- FIPS: Implement KAT for non-deterministic ECDSA [bsc#1225939]
- FIPS: Disable setting the library in non-FIPS mode [bsc#1220893]
- FIPS: Disallow rsa < 2048 [bsc#1225941]
  * Mark RSA operations with keysize < 2048 as non-approved in the SLI
- FIPS: Service level indicator for libgcrypt [bsc#1225939]
- FIPS: Consider deprecate sha1 [bsc#1225942]
  * In FIPS 180-5 revision, NIST announced EOL for SHA-1 and will
    transition at the end of 2030. Mark SHA1 as non-approved in SLI.
- FIPS: Unnecessary RSA KAT Encryption/Decryption [bsc#1225936]
  * cipher: Do not run RSA encryption selftest by default
- FIPS: Make sure that Libgcrypt makes use of the built-in Jitter RNG
  for the whole length entropy buffer in FIPS mode. [bsc#1220893]
- FIPS: Set the FSM into error state if Jitter RNG is returning an
  error code to the caller when an health test error occurs when
  random bytes are requested through the jent_read_entropy_safe()
  function. [bsc#1220895]
- FIPS: Replace the built-in jitter rng with standalone version
  * Remove the internal jitterentropy copy [bsc#1220896]

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:969-1
Released:    Thu Mar 20 14:28:47 2025
Summary:     Recommended update for crypto-policies
Type:        recommended
Severity:    moderate
References:  1227637,1236165
This update for crypto-policies fixes the following issues:

- Fix fips-mode-setup in EFI or Secure Boot mode (bsc#1227637).
- tolerate fips dracut module presence w/o FIPS
  * Fixes the 'Inconsistent state detected' warning when disabling the FIPS mode
    (bsc#1236165).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1137-1
Released:    Thu Apr  3 17:11:02 2025
Summary:     Security update for xz
Type:        security
Severity:    important
References:  1240414,CVE-2025-31115
This update for xz fixes the following issues:

- CVE-2025-31115: Fixed heap use after free and writing to an address based on the null pointer plus an offset (bsc#1240414)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1198-1
Released:    Fri Apr 11 09:46:09 2025
Summary:     Recommended update for glibc
Type:        recommended
Severity:    important
References:  1234128,1234713,1239883
This update for glibc fixes the following issues:

- Fix the lost wakeup from a bug in signal stealing (bsc#1234128)
- Mark functions in libc_nonshared.a as hidden (bsc#1239883)
- Bump minimal kernel version to 4.3 to enable use of direct socketcalls
  on x86-32 and s390x (bsc#1234713)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1334-1
Released:    Thu Apr 17 09:03:05 2025
Summary:     Security update for pam
Type:        security
Severity:    moderate
References:  1232234,CVE-2024-10041
This update for pam fixes the following issues:

- CVE-2024-10041: sensitive data exposure while performing authentications. (bsc#1232234)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1376-1
Released:    Fri Apr 25 18:11:02 2025
Summary:     Recommended update for libgcrypt
Type:        recommended
Severity:    moderate
References:  1241605
This update for libgcrypt fixes the following issues:

- FIPS: Pad PKCS1.5 signatures with SHA3 correctly [bsc#1241605]

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1377-1
Released:    Fri Apr 25 19:43:34 2025
Summary:     Recommended update for patterns-base
Type:        recommended
Severity:    moderate
References:  
This update for patterns-base fixes the following issues:

- add bpftool to patterns enhanced base. jsc#PED-8375

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1394-1
Released:    Mon Apr 28 16:15:21 2025
Summary:     Recommended update for glibc
Type:        recommended
Severity:    important
References:  
This update for glibc fixes the following issues:

- Add support for userspace livepatching for ppc64le (jsc#PED-11850)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1456-1
Released:    Wed May  7 17:13:32 2025
Summary:     Security update for sqlite3
Type:        security
Severity:    moderate
References:  1241020,1241078,1241189,CVE-2025-29087,CVE-2025-29088,CVE-2025-3277
This update for sqlite3 fixes the following issues:

- CVE-2025-29087,CVE-2025-3277: Fixed integer overflow in sqlite concat function (bsc#1241020)
- CVE-2025-29088: Fixed integer overflow through the SQLITE_DBCONFIG_LOOKASIDE component (bsc#1241078)

Other fixes:

- Updated to version 3.49.1 from Factory (jsc#SLE-16032)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1550-1
Released:    Fri May 16 02:16:11 2025
Summary:     Security update for openssl-3
Type:        security
Severity:    moderate
References:  1230959,1231748,1232326,1240366,1240607,CVE-2025-27587
This update for openssl-3 fixes the following issues:

Security:
  
- CVE-2025-27587: Timing side channel vulnerability in the P-384
  implementation when used with ECDSA in the PPC architecture (bsc#1240366).
- Missing null pointer check before accessing handshake_func in ssl_lib.c (bsc#1240607).
  
FIPS:
    
- Disabling EMS in OpenSSL configuration prevents sshd from starting (bsc#1230959, bsc#1232326, bsc#1231748).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1638-1
Released:    Wed May 21 12:48:35 2025
Summary:     Security update for openssh
Type:        security
Severity:    moderate
References:  1236826,1239671,1241012,CVE-2025-32728
This update for openssh fixes the following issue:

Security fixes:

- CVE-2025-32728: Fixed logic error in DisableForwarding option (bsc#1241012)

Other fixes:
- Fix ssh client segfault with GSSAPIKeyExchange=yes in ssh_kex2
  due to gssapi proposal not being correctly initialized (bsc#1236826).
  The problem was introduced in the rebase of the patch for 9.6p1
- Enable --with-logind to call the SetTTY dbus method in systemd.
  This allows 'wall' to print messages in ssh ttys (bsc#1239671)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1702-1
Released:    Sat May 24 11:50:53 2025
Summary:     Security update for glibc
Type:        security
Severity:    important
References:  1243317,CVE-2025-4802
This update for glibc fixes the following issues:

- CVE-2025-4802: possible execution of attacker controlled code when statically linked setuid binaries using dlopen
  search for libraries to load in LD_LIBRARY_PATH (bsc#1243317).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1714-1
Released:    Tue May 27 13:23:20 2025
Summary:     Recommended update for ncurses
Type:        recommended
Severity:    moderate
References:  
This update for ncurses fixes the following issues:

- Backport sclp terminfo description entry if for s390 sclp terminal lines 
- Add a further sclp entry for qemu s390 based systems
- Make use of dumb

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1733-1
Released:    Wed May 28 17:59:52 2025
Summary:     Recommended update for krb5
Type:        recommended
Severity:    moderate
References:  1242060
This update for krb5 fixes the following issue:

- Remove references to the LMDB backend in the kdc.conf manpage (bsc#1242060).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1739-1
Released:    Thu May 29 11:40:51 2025
Summary:     Recommended update for systemd
Type:        recommended
Severity:    important
References:  1236177,1237496,1242938,1243259
This update for systemd fixes the following issues:

- Add missing 'systemd-journal-remote' package
  to 15-SP7 (bsc#1243259)
- umount: do not move busy network mounts (bsc#1236177)
- Apply coredump sysctl settings on systemd-coredump updates/removals.
- Fix the issue with journalctl not working
  for users in Container UID range (bsc#1242938)
  Don't write messages sent from users with UID falling into the container UID
  range to the system journal. Daemons in the container don't talk to the
  outside journald as they talk to the inner one directly, which does its
  journal splitting based on shifted uids.
- man/pstore.conf: pstore.conf template is not always installed in /etc
- man: coredump.conf template is not always installed in /etc (bsc#1237496)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1863-1
Released:    Tue Jun 10 14:33:20 2025
Summary:     Recommended update for sles15-image
Type:        recommended
Severity:    moderate
References:  
This update for sles15-image fixes the following issues:

- add support EOL date for SP6 general support
- fix use SOURCEURL_WITH for proper README url in all cases
- do check rpm signatures


The following package changes have been done:

- crypto-policies-20230920.570ea89-150600.3.9.2 updated
- glibc-2.38-150600.14.32.1 updated
- liblzma5-5.4.1-150600.3.3.1 updated
- libsqlite3-0-3.49.1-150000.3.27.1 updated
- libncurses6-6.1-150000.5.30.1 updated
- terminfo-base-6.1-150000.5.30.1 updated
- libudev1-254.24-150600.4.33.1 updated
- libopenssl3-3.1.4-150600.5.27.1 updated
- libgcrypt20-1.10.3-150600.3.6.1 updated
- libopenssl-3-fips-provider-3.1.4-150600.5.27.1 updated
- krb5-1.20.1-150600.11.11.2 updated
- patterns-base-fips-20200124-150600.32.6.1 updated
- findutils-4.8.0-150300.3.3.2 updated
- permissions-20240826-150600.10.18.2 updated
- pam-1.3.0-150000.6.76.1 updated
- openssh-common-9.6p1-150600.6.26.1 updated
- libsystemd0-254.24-150600.4.33.1 updated
- openssh-fips-9.6p1-150600.6.26.1 updated
- openssh-clients-9.6p1-150600.6.26.1 updated
- openssh-server-9.6p1-150600.6.26.1 updated
- openssh-9.6p1-150600.6.26.1 updated
- container:sles15-image-15.6.0-47.21.1 updated


More information about the sle-container-updates mailing list