{"affected":[{"ecosystem_specific":{"binaries":[{"docker":"27.5.1_ce-98.126.1","docker-bash-completion":"27.5.1_ce-98.126.1","docker-stable":"24.0.9_ce-1.11.1","docker-stable-bash-completion":"24.0.9_ce-1.11.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"docker","purl":"pkg:rpm/suse/docker&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"27.5.1_ce-98.126.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"docker":"27.5.1_ce-98.126.1","docker-bash-completion":"27.5.1_ce-98.126.1","docker-stable":"24.0.9_ce-1.11.1","docker-stable-bash-completion":"24.0.9_ce-1.11.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"docker-stable","purl":"pkg:rpm/suse/docker-stable&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"24.0.9_ce-1.11.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"docker":"27.5.1_ce-98.126.1","docker-bash-completion":"27.5.1_ce-98.126.1","docker-stable":"24.0.9_ce-1.11.1","docker-stable-bash-completion":"24.0.9_ce-1.11.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"docker","purl":"pkg:rpm/suse/docker&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"27.5.1_ce-98.126.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"docker":"27.5.1_ce-98.126.1","docker-bash-completion":"27.5.1_ce-98.126.1","docker-stable":"24.0.9_ce-1.11.1","docker-stable-bash-completion":"24.0.9_ce-1.11.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"docker-stable","purl":"pkg:rpm/suse/docker-stable&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"24.0.9_ce-1.11.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for docker, docker-stable fixes the following issues:\n\n- CVE-2025-22868: Fixed unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239185).\n- CVE-2025-22869: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239322).\n- CVE-2024-29018: Fixed external DNS requests from 'internal' networks leading to data exfiltration (bsc#1234089).\n- CVE-2024-23650: Fixed BuildKit daemon crash via malicious BuildKit client or frontend request (bsc#1219437).\n\nOther fixes:\n- Make container-selinux requirement conditional on selinux-policy (bsc#1237367).\n- Updated docker-buildx to 0.19.3.\n","id":"SUSE-SU-2025:1102-1","modified":"2025-04-02T09:39:33Z","published":"2025-04-02T09:39:33Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20251102-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219437"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234089"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237367"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239185"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239322"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-23650"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-23653"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-29018"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22868"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22869"}],"related":["CVE-2024-23650","CVE-2024-23653","CVE-2024-29018","CVE-2024-41110","CVE-2025-22868","CVE-2025-22869"],"summary":"Security update for docker, docker-stable","upstream":["CVE-2024-23650","CVE-2024-23653","CVE-2024-29018","CVE-2024-41110","CVE-2025-22868","CVE-2025-22869"]}