Security update for elemental-operator
| Announcement ID: | SUSE-SU-2025:20328-1 |
|---|---|
| Release Date: | May 15, 2025, 5:45 p.m. |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves two vulnerabilities can now be installed.
Description:
This update for elemental-operator fixes the following issues:
- Updated to v1.7.2:
- Updated header year
- CVE-2025-22870: golang.org/x/net/proxy: Fixed proxy bypass using IPv6 zone IDs (bsc#1238700)
- CVE-2025-22869: golang.org/x/crypto/ssh: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239335)
- Label Templates: add IP addresses to the Network variables (#885, #894)
- Fixed generation of already present resources (#892, #893)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Micro 6.1
zypper in -t patch SUSE-SLE-Micro-6.1-111=1
Package List:
-
SUSE Linux Micro 6.1 (aarch64 x86_64)
- elemental-register-1.7.2-slfo.1.1_1.1
- elemental-support-1.7.2-slfo.1.1_1.1