SUSE alert SUSE-SU-2025:1102-1 (docker, docker-stable)
| From: | SLE-SECURITY-UPDATES <null@suse.de> | |
| To: | sle-security-updates@lists.suse.com | |
| Subject: | SUSE-SU-2025:1102-1: important: Security update for docker, docker-stable | |
| Date: | Wed, 02 Apr 2025 12:30:19 -0000 | |
| Message-ID: | <174359701953.17718.14808964284629141130@smelt2.prg2.suse.org> |
# Security update for docker, docker-stable Announcement ID: SUSE-SU-2025:1102-1 Release Date: 2025-04-02T09:39:37Z Rating: important References: * bsc#1219437 * bsc#1234089 * bsc#1237367 * bsc#1239185 * bsc#1239322 Cross-References: * CVE-2024-2365 * CVE-2024-23650 * CVE-2024-23653 * CVE-2024-29018 * CVE-2024-41110 * CVE-2025-22868 * CVE-2025-22869 CVSS scores: * CVE-2024-23650 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23650 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-23653 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23653 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-29018 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-29018 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves seven vulnerabilities can now be installed. ## Description: This update for docker, docker-stable fixes the following issues: * CVE-2025-22868: Fixed unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239185). * CVE-2025-22869: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239322). * CVE-2024-29018: Fixed external DNS requests from 'internal' networks leading to data exfiltration (bsc#1234089). * CVE-2024-23650: Fixed BuildKit daemon crash via malicious BuildKit client or frontend request (bsc#1219437). Other fixes: \- Make container-selinux requirement conditional on selinux-policy (bsc#1237367). \- Updated docker-buildx to 0.19.3. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1102=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1102=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * docker-debuginfo-27.5.1_ce-98.126.1 * docker-stable-24.0.9_ce-1.11.1 * docker-stable-debuginfo-24.0.9_ce-1.11.1 * docker-27.5.1_ce-98.126.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * docker-stable-bash-completion-24.0.9_ce-1.11.1 * docker-bash-completion-27.5.1_ce-98.126.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * docker-debuginfo-27.5.1_ce-98.126.1 * docker-stable-24.0.9_ce-1.11.1 * docker-stable-debuginfo-24.0.9_ce-1.11.1 * docker-27.5.1_ce-98.126.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * docker-stable-bash-completion-24.0.9_ce-1.11.1 * docker-bash-completion-27.5.1_ce-98.126.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2365.html * https://www.suse.com/security/cve/CVE-2024-23650.html * https://www.suse.com/security/cve/CVE-2024-23653.html * https://www.suse.com/security/cve/CVE-2024-29018.html * https://www.suse.com/security/cve/CVE-2024-41110.html * https://www.suse.com/security/cve/CVE-2025-22868.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://bugzilla.suse.com/show_bug.cgi?id=1219437 * https://bugzilla.suse.com/show_bug.cgi?id=1234089 * https://bugzilla.suse.com/show_bug.cgi?id=1237367 * https://bugzilla.suse.com/show_bug.cgi?id=1239185 * https://bugzilla.suse.com/show_bug.cgi?id=1239322
Attachment: None (type=text/html)
(HTML attachment elided)
