openSUSE-SU-2025:0025-1: moderate: Security update for cheat
openSUSE-SU-2025:0030-1: moderate: Security update for dante
openSUSE-SU-2025:14681-1: moderate: grafana-11.3.2-1.1 on GA media
SUSE-SU-2025:0226-1: moderate: Security update for docker-stable
openSUSE-SU-2025:0025-1: moderate: Security update for cheat
openSUSE Security Update: Security update for cheat
_______________________________
Announcement ID: openSUSE-SU-2025:0025-1
Rating: moderate
References: #1234584
Cross-References: CVE-2024-45337
CVSS scores:
CVE-2024-45337 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________
An update that fixes one vulnerability is now available.
Description:
This update for cheat fixes the following issues:
- Update to 4.4.2:
* Bump chroma to newest version
* Remove plan9 support due to build failure
* Upgrade to yaml.v3
- Update to 4.4.1:
* Update dependencies
* Make minor changes to appease revive (linter)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2025-25=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):
cheat-4.4.2-bp156.3.3.1
References:
https://www.suse.com/security/cve/CVE-2024-45337.html
https://bugzilla.suse.com/1234584
openSUSE-SU-2025:0030-1: moderate: Security update for dante
openSUSE Security Update: Security update for dante
_______________________________
Announcement ID: openSUSE-SU-2025:0030-1
Rating: moderate
References: #1234688
Cross-References: CVE-2024-54662
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________
An update that fixes one vulnerability is now available.
Description:
This update for dante fixes the following issues:
- Update to version 1.4.4
* Fixed incorrect access control for some sockd.conf configurations
involving socksmethod (boo#1234688, CVE-2024-54662).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2025-30=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le s390x x86_64):
dante-1.4.4-bp156.4.3.1
dante-devel-1.4.4-bp156.4.3.1
dante-server-1.4.4-bp156.4.3.1
libsocks0-1.4.4-bp156.4.3.1
- openSUSE Backports SLE-15-SP6 (aarch64_ilp32):
dante-devel-64bit-1.4.4-bp156.4.3.1
libsocks0-64bit-1.4.4-bp156.4.3.1
References:
https://www.suse.com/security/cve/CVE-2024-54662.html
https://bugzilla.suse.com/1234688
openSUSE-SU-2025:14681-1: moderate: grafana-11.3.2-1.1 on GA media
# grafana-11.3.2-1.1 on GA media
Announcement ID: openSUSE-SU-2025:14681-1
Rating: moderate
Cross-References:
* CVE-2024-9476
CVSS scores:
* CVE-2024-9476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the grafana-11.3.2-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* grafana 11.3.2-1.1
## References:
* https://www.suse.com/security/cve/CVE-2024-9476.html
SUSE-SU-2025:0226-1: moderate: Security update for docker-stable
# Security update for docker-stable
Announcement ID: SUSE-SU-2025:0226-1
Release Date: 2025-01-23T13:54:20Z
Rating: moderate
References:
* bsc#1219437
* bsc#1234089
Cross-References:
* CVE-2024-2365
* CVE-2024-23650
* CVE-2024-23653
* CVE-2024-29018
* CVE-2024-41110
CVSS scores:
* CVE-2024-23650 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23650 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-23653 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-23653 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-29018 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-29018 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Affected Products:
* Containers Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves five vulnerabilities can now be installed.
## Description:
This update for docker-stable fixes the following issues:
* CVE-2024-29018: Fixed external DNS request handling from 'internal' networks
that could have led to data exfiltration (bsc#1234089).
* CVE-2024-23650: Fixed possibile BuildKit daemon crash via malicious BuildKit
client or frontend request (bsc#1219437).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-226=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-226=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* docker-stable-24.0.9_ce-150000.1.11.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.11.1
* openSUSE Leap 15.6 (noarch)
* docker-stable-fish-completion-24.0.9_ce-150000.1.11.1
* docker-stable-bash-completion-24.0.9_ce-150000.1.11.1
* docker-stable-rootless-extras-24.0.9_ce-150000.1.11.1
* docker-stable-zsh-completion-24.0.9_ce-150000.1.11.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* docker-stable-24.0.9_ce-150000.1.11.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.11.1
* Containers Module 15-SP6 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.11.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2365.html
* https://www.suse.com/security/cve/CVE-2024-23650.html
* https://www.suse.com/security/cve/CVE-2024-23653.html
* https://www.suse.com/security/cve/CVE-2024-29018.html
* https://www.suse.com/security/cve/CVE-2024-41110.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219437
* https://bugzilla.suse.com/show_bug.cgi?id=1234089