SUSE-CU-2025:4643-1: Security update of suse/sle-micro/5.2/toolbox
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Fri Jun 20 14:22:50 UTC 2025
SUSE Container Update Advisory: suse/sle-micro/5.2/toolbox
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:4643-1
Container Tags : suse/sle-micro/5.2/toolbox:14.2 , suse/sle-micro/5.2/toolbox:14.2-7.11.136 , suse/sle-micro/5.2/toolbox:latest
Container Release : 7.11.136
Severity : important
Type : security
References : 1205000 1208958 1211576 1211725 1215241 1243935 CVE-2022-4415
CVE-2023-26604 CVE-2025-4598
-----------------------------------------------------------------
The container suse/sle-micro/5.2/toolbox was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2019-1
Released: Thu Jun 19 09:57:43 2025
Summary: Security update for systemd
Type: security
Severity: important
References: 1205000,1208958,1211576,1211725,1215241,1243935,CVE-2022-4415,CVE-2023-26604,CVE-2025-4598
This update for systemd fixes the following issues:
- CVE-2025-4598: Race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump (bsc#1243935).
- CVE-2023-26604: Privilege escalation via the less pager (bsc#1208958).
- CVE-2022-4415: systemd-coredump was not respecting fs.suid_dumpable kernel setting (bsc#1205000).
Other bugfixes:
- clarify passno and noauto combination in /etc/fstab (bsc#1211725)
- handle -EINTR return from bus_poll() (bsc#1215241)
- /usr/ should never be unmounted regardless of HAVE_SPLIT_USR or not (bsc#1211576)
The following package changes have been done:
- libsystemd0-246.16-150300.7.60.1 updated
- libudev1-246.16-150300.7.60.1 updated
More information about the sle-container-updates
mailing list