SUSE-SU-2025:20056-1: critical: Security update for docker

SLE-SECURITY-UPDATES null at suse.de
Wed Jun 4 08:55:11 UTC 2025



# Security update for docker

Announcement ID: SUSE-SU-2025:20056-1  
Release Date: 2025-02-03T08:56:57Z  
Rating: critical  
References:

  * bsc#1210141
  * bsc#1214855
  * bsc#1215323
  * bsc#1217513
  * bsc#1219267
  * bsc#1219268
  * bsc#1219438
  * bsc#1220339
  * bsc#1221916
  * bsc#1223409
  * bsc#1228324

  
Cross-References:

  * CVE-2024-23651
  * CVE-2024-23652
  * CVE-2024-23653
  * CVE-2024-41110

  
CVSS scores:

  * CVE-2024-23651 ( SUSE ):  7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-23651 ( NVD ):  7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
  * CVE-2024-23652 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-23652 ( NVD ):  9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-23653 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2024-23653 ( NVD ):  9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41110 ( SUSE ):  9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

  
Affected Products:

  * SUSE Linux Micro 6.0

  
  
An update that solves four vulnerabilities and has seven fixes can now be
installed.

## Description:

This update for docker fixes the following issues:

Security fixes:

  * CVE-2024-23651: Fixed arbitrary files write due to race condition on mounts
    (bsc#1219267)
  * CVE-2024-23652: Fixed insufficient validation of parent directory on mount
    (bsc#1219268)
  * CVE-2024-23653: Fixed insufficient validation on entitlement on container
    creation via buildkit (bsc#1219438)
  * CVE-2024-41110: A Authz zero length regression that could lead to
    authentication bypass was fixed (bsc#1228324)

Other changes:

  * Update to Docker 25.0.6-ce.
  * Fix BuildKit's symlink resolution logic to correctly handle non-lexical
    symlinks. (bsc#1221916)
  * Write volume options atomically so sudden system crashes won't result in
    future Docker starts failing due to empty files. (bsc#1214855)
  * Fixed world writable docker overlay files (bsc#1220339)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Micro 6.0  
    zypper in -t patch SUSE-SLE-Micro-6.0-64=1

## Package List:

  * SUSE Linux Micro 6.0 (aarch64 s390x x86_64)
    * docker-25.0.6_ce-1.1
    * docker-debuginfo-25.0.6_ce-1.1

## References:

  * https://www.suse.com/security/cve/CVE-2024-23651.html
  * https://www.suse.com/security/cve/CVE-2024-23652.html
  * https://www.suse.com/security/cve/CVE-2024-23653.html
  * https://www.suse.com/security/cve/CVE-2024-41110.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1210141
  * https://bugzilla.suse.com/show_bug.cgi?id=1214855
  * https://bugzilla.suse.com/show_bug.cgi?id=1215323
  * https://bugzilla.suse.com/show_bug.cgi?id=1217513
  * https://bugzilla.suse.com/show_bug.cgi?id=1219267
  * https://bugzilla.suse.com/show_bug.cgi?id=1219268
  * https://bugzilla.suse.com/show_bug.cgi?id=1219438
  * https://bugzilla.suse.com/show_bug.cgi?id=1220339
  * https://bugzilla.suse.com/show_bug.cgi?id=1221916
  * https://bugzilla.suse.com/show_bug.cgi?id=1223409
  * https://bugzilla.suse.com/show_bug.cgi?id=1228324

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250604/e1cff5f5/attachment.htm>


More information about the sle-security-updates mailing list