SUSE-CU-2025:7597-1: Security update of bci/spack
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Sun Oct 26 08:12:08 UTC 2025
SUSE Container Update Advisory: bci/spack
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:7597-1
Container Tags : bci/spack:0.23 , bci/spack:0.23.1 , bci/spack:0.23.1-18.3 , bci/spack:latest
Container Release : 18.3
Severity : important
Type : security
References : 1240954 1241219 1245743 1250232 1251264 CVE-2025-3576 CVE-2025-9230
-----------------------------------------------------------------
The container bci/spack was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3596-1
Released: Wed Oct 15 09:51:21 2025
Summary: Recommended update for curl
Type: recommended
Severity: moderate
References: 1251264
This update for curl fixes the following issue:
- rebuilds it against a newer nghttp2 to fix handling 2 or more whitespaces in headers. (bsc#1251264)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3623-1
Released: Thu Oct 16 16:36:00 2025
Summary: Recommended update for sudo
Type: recommended
Severity: important
References: 1240954,1245743
This update for sudo fixes the following issues:
- Fix loss of SSH connection does not propagate through sudo (bsc#1240954, bsc#1245743).
If user's tty goes away, tell monitor to revoke the tty in its session.
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3635-1
Released: Fri Oct 17 16:33:06 2025
Summary: Security update for openssl-1_1
Type: security
Severity: important
References: 1250232,CVE-2025-9230
This update for openssl-1_1 fixes the following issues:
- CVE-2025-9230: fixed out of bounds read and write in RFC 3211 KEK unwrap (bsc#1250232)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3699-1
Released: Tue Oct 21 12:07:47 2025
Summary: Security update for krb5
Type: security
Severity: moderate
References: 1241219,CVE-2025-3576
This update for krb5 fixes the following issues:
- CVE-2025-3576: weakness in the MD5 checksum design allows for spoofing of GSSAPI-protected messages that are using
RC4-HMAC-MD5 (bsc#1241219).
Krb5 as very old protocol supported quite a number of ciphers
that are not longer up to current cryptographic standards.
To avoid problems with those, SUSE has by default now disabled
those alorithms.
The following algorithms have been removed from valid krb5 enctypes:
- des3-cbc-sha1
- arcfour-hmac-md5
To reenable those algorithms, you can use allow options in krb5.conf:
[libdefaults]
allow_des3 = true
allow_rc4 = true
to reenable them.
The following package changes have been done:
- krb5-1.20.1-150600.11.14.1 updated
- libcurl4-8.14.1-150700.7.2.1 updated
- curl-8.14.1-150700.7.2.1 updated
- libopenssl1_1-1.1.1w-150700.11.6.1 updated
- sudo-1.9.15p5-150600.3.12.1 updated
- krb5-devel-1.20.1-150600.11.14.1 updated
- libcurl-devel-8.14.1-150700.7.2.1 updated
- container:registry.suse.com-bci-bci-base-15.7-231a93ad62347ed0484baa9242d06c7c7fc48241452613423a9c25e30102fb8f-0 updated
More information about the sle-container-updates
mailing list