SUSE-CU-2025:4643-1: Security update of suse/sle-micro/5.2/toolbox

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Fri Jun 20 14:22:50 UTC 2025


SUSE Container Update Advisory: suse/sle-micro/5.2/toolbox
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:4643-1
Container Tags        : suse/sle-micro/5.2/toolbox:14.2 , suse/sle-micro/5.2/toolbox:14.2-7.11.136 , suse/sle-micro/5.2/toolbox:latest
Container Release     : 7.11.136
Severity              : important
Type                  : security
References            : 1205000 1208958 1211576 1211725 1215241 1243935 CVE-2022-4415
                        CVE-2023-26604 CVE-2025-4598 
-----------------------------------------------------------------

The container suse/sle-micro/5.2/toolbox was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2019-1
Released:    Thu Jun 19 09:57:43 2025
Summary:     Security update for systemd
Type:        security
Severity:    important
References:  1205000,1208958,1211576,1211725,1215241,1243935,CVE-2022-4415,CVE-2023-26604,CVE-2025-4598
This update for systemd fixes the following issues:

- CVE-2025-4598: Race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump (bsc#1243935).
- CVE-2023-26604: Privilege escalation via the less pager (bsc#1208958).
- CVE-2022-4415: systemd-coredump was not respecting fs.suid_dumpable kernel setting (bsc#1205000).

Other bugfixes:

- clarify passno and noauto combination in /etc/fstab (bsc#1211725)
- handle -EINTR return from bus_poll() (bsc#1215241)
- /usr/ should never be unmounted regardless of HAVE_SPLIT_USR or not (bsc#1211576)


The following package changes have been done:

- libsystemd0-246.16-150300.7.60.1 updated
- libudev1-246.16-150300.7.60.1 updated


More information about the sle-container-updates mailing list