SUSE 5281 Published by

SUSE Linux has been updated with several security enhancements, which include moderate patches for cheat, dante, grafana, and docker-stable.

openSUSE-SU-2025:0025-1: moderate: Security update for cheat
openSUSE-SU-2025:0030-1: moderate: Security update for dante
openSUSE-SU-2025:14681-1: moderate: grafana-11.3.2-1.1 on GA media
SUSE-SU-2025:0226-1: moderate: Security update for docker-stable




openSUSE-SU-2025:0025-1: moderate: Security update for cheat


openSUSE Security Update: Security update for cheat
_______________________________

Announcement ID: openSUSE-SU-2025:0025-1
Rating: moderate
References: #1234584
Cross-References: CVE-2024-45337
CVSS scores:
CVE-2024-45337 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________

An update that fixes one vulnerability is now available.

Description:

This update for cheat fixes the following issues:

- Update to 4.4.2:
* Bump chroma to newest version
* Remove plan9 support due to build failure
* Upgrade to yaml.v3

- Update to 4.4.1:
* Update dependencies
* Make minor changes to appease revive (linter)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2025-25=1

Package List:

- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):

cheat-4.4.2-bp156.3.3.1

References:

https://www.suse.com/security/cve/CVE-2024-45337.html
https://bugzilla.suse.com/1234584



openSUSE-SU-2025:0030-1: moderate: Security update for dante


openSUSE Security Update: Security update for dante
_______________________________

Announcement ID: openSUSE-SU-2025:0030-1
Rating: moderate
References: #1234688
Cross-References: CVE-2024-54662
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________

An update that fixes one vulnerability is now available.

Description:

This update for dante fixes the following issues:

- Update to version 1.4.4
* Fixed incorrect access control for some sockd.conf configurations
involving socksmethod (boo#1234688, CVE-2024-54662).

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2025-30=1

Package List:

- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le s390x x86_64):

dante-1.4.4-bp156.4.3.1
dante-devel-1.4.4-bp156.4.3.1
dante-server-1.4.4-bp156.4.3.1
libsocks0-1.4.4-bp156.4.3.1

- openSUSE Backports SLE-15-SP6 (aarch64_ilp32):

dante-devel-64bit-1.4.4-bp156.4.3.1
libsocks0-64bit-1.4.4-bp156.4.3.1

References:

https://www.suse.com/security/cve/CVE-2024-54662.html
https://bugzilla.suse.com/1234688



openSUSE-SU-2025:14681-1: moderate: grafana-11.3.2-1.1 on GA media


# grafana-11.3.2-1.1 on GA media

Announcement ID: openSUSE-SU-2025:14681-1
Rating: moderate

Cross-References:

* CVE-2024-9476

CVSS scores:

* CVE-2024-9476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the grafana-11.3.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* grafana 11.3.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2024-9476.html



SUSE-SU-2025:0226-1: moderate: Security update for docker-stable


# Security update for docker-stable

Announcement ID: SUSE-SU-2025:0226-1
Release Date: 2025-01-23T13:54:20Z
Rating: moderate
References:

* bsc#1219437
* bsc#1234089

Cross-References:

* CVE-2024-2365
* CVE-2024-23650
* CVE-2024-23653
* CVE-2024-29018
* CVE-2024-41110

CVSS scores:

* CVE-2024-23650 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23650 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-23653 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-23653 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-29018 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-29018 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Affected Products:

* Containers Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves five vulnerabilities can now be installed.

## Description:

This update for docker-stable fixes the following issues:

* CVE-2024-29018: Fixed external DNS request handling from 'internal' networks
that could have led to data exfiltration (bsc#1234089).
* CVE-2024-23650: Fixed possibile BuildKit daemon crash via malicious BuildKit
client or frontend request (bsc#1219437).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-226=1

* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-226=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* docker-stable-24.0.9_ce-150000.1.11.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.11.1
* openSUSE Leap 15.6 (noarch)
* docker-stable-fish-completion-24.0.9_ce-150000.1.11.1
* docker-stable-bash-completion-24.0.9_ce-150000.1.11.1
* docker-stable-rootless-extras-24.0.9_ce-150000.1.11.1
* docker-stable-zsh-completion-24.0.9_ce-150000.1.11.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* docker-stable-24.0.9_ce-150000.1.11.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.11.1
* Containers Module 15-SP6 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.11.1

## References:

* https://www.suse.com/security/cve/CVE-2024-2365.html
* https://www.suse.com/security/cve/CVE-2024-23650.html
* https://www.suse.com/security/cve/CVE-2024-23653.html
* https://www.suse.com/security/cve/CVE-2024-29018.html
* https://www.suse.com/security/cve/CVE-2024-41110.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219437
* https://bugzilla.suse.com/show_bug.cgi?id=1234089