SUSE-CU-2025:5133-1: Security update of rancher/seedimage-builder
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Thu Jul 10 07:05:27 UTC 2025
SUSE Container Update Advisory: rancher/seedimage-builder
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:5133-1
Container Tags : rancher/seedimage-builder:1.7.3 , rancher/seedimage-builder:1.7.3-3.4 , rancher/seedimage-builder:latest
Container Release : 3.4
Severity : critical
Type : security
References : 1010996 1012628 1027519 1159034 1174091 1189495 1193454 1194818
1194869 1199079 1200528 1205462 1207377 1208783 1211649 1211888
1213123 1214285 1214718 1215199 1215628 1216063 1217070 1217538
1218474 1218609 1218851 1219001 1219080 1219503 1219559 1219561
1219823 1219826 1219885 1220066 1220117 1220252 1220338 1220877
1221164 1221289 1221326 1221332 1221334 1221400 1221630 1221645
1221652 1221665 1221666 1221667 1221668 1221831 1221854 1221857
1221984 1222254 1222302 1222335 1222350 1222364 1222372 1222387
1222433 1222434 1222453 1222584 1222620 1222625 1222633 1222634
1222684 1222808 1222967 1222973 1223053 1223074 1223191 1223234
1223395 1223605 1223635 1223720 1223731 1223742 1223763 1223767
1223777 1223803 1223849 1224105 1224262 1224285 1224323 1224415
1224485 1224496 1224510 1224535 1224631 1224636 1224690 1224694
1224700 1224711 1225070 1225197 1225365 1225475 1225582 1225598
1225607 1225718 1225751 1225771 1225814 1225832 1225838 1225903
1225946 1225953 1226031 1226127 1226419 1226447 1226448 1226492
1226502 1226530 1226588 1226604 1226660 1226743 1226751 1226765
1226798 1226801 1226834 1226874 1226885 1226920 1227106 1227149
1227182 1227316 1227355 1227378 1227383 1227437 1227492 1227493
1227494 1227590 1227593 1227594 1227595 1227618 1227620 1227623
1227627 1227634 1227706 1227722 1227724 1227725 1227728 1227729
1227732 1227733 1227734 1227747 1227750 1227754 1227758 1227760
1227761 1227764 1227766 1227770 1227771 1227772 1227774 1227781
1227784 1227785 1227787 1227790 1227791 1227792 1227796 1227798
1227799 1227802 1227808 1227810 1227811 1227812 1227815 1227816
1227818 1227820 1227823 1227824 1227826 1227828 1227829 1227830
1227832 1227833 1227834 1227839 1227840 1227846 1227849 1227851
1227853 1227863 1227864 1227865 1227867 1227869 1227870 1227883
1227884 1227888 1227891 1227893 1227929 1227950 1227957 1227981
1228020 1228021 1228142 1228192 1228235 1228236 1228247 1228321
1228409 1228410 1228426 1228427 1228429 1228446 1228447 1228449
1228450 1228452 1228456 1228457 1228458 1228459 1228460 1228462
1228463 1228466 1228468 1228469 1228470 1228472 1228479 1228480
1228481 1228482 1228483 1228484 1228485 1228486 1228487 1228489
1228491 1228492 1228493 1228494 1228495 1228496 1228499 1228500
1228501 1228502 1228503 1228505 1228508 1228509 1228510 1228511
1228513 1228515 1228516 1228518 1228520 1228525 1228527 1228530
1228531 1228535 1228539 1228553 1228561 1228563 1228564 1228565
1228567 1228568 1228572 1228574 1228575 1228576 1228579 1228580
1228581 1228582 1228584 1228586 1228588 1228590 1228591 1228599
1228615 1228616 1228617 1228625 1228626 1228633 1228635 1228636
1228640 1228643 1228644 1228646 1228649 1228650 1228654 1228655
1228656 1228658 1228660 1228662 1228665 1228666 1228667 1228672
1228673 1228674 1228677 1228680 1228687 1228705 1228706 1228707
1228708 1228709 1228710 1228718 1228720 1228721 1228722 1228723
1228724 1228726 1228727 1228733 1228737 1228743 1228748 1228754
1228756 1228757 1228758 1228764 1228766 1228779 1228780 1228801
1228849 1228850 1228857 1228959 1228964 1228966 1228967 1228971
1228973 1228977 1228978 1228979 1228986 1228988 1228989 1228991
1228992 1229003 1229005 1229024 1229025 1229042 1229045 1229046
1229054 1229056 1229086 1229134 1229136 1229154 1229156 1229160
1229167 1229168 1229169 1229170 1229171 1229172 1229173 1229174
1229228 1229239 1229240 1229241 1229243 1229244 1229245 1229246
1229247 1229248 1229249 1229250 1229251 1229252 1229253 1229254
1229255 1229256 1229287 1229290 1229291 1229292 1229294 1229296
1229297 1229298 1229299 1229301 1229303 1229304 1229305 1229307
1229309 1229312 1229313 1229314 1229315 1229316 1229317 1229318
1229319 1229320 1229327 1229341 1229342 1229344 1229345 1229346
1229347 1229349 1229350 1229351 1229353 1229354 1229355 1229356
1229357 1229358 1229359 1229360 1229365 1229366 1229369 1229370
1229373 1229374 1229379 1229381 1229382 1229383 1229386 1229388
1229390 1229391 1229392 1229395 1229398 1229399 1229400 1229402
1229403 1229404 1229407 1229409 1229410 1229411 1229413 1229414
1229417 1229444 1229451 1229452 1229455 1229456 1229476 1229480
1229481 1229482 1229484 1229485 1229486 1229487 1229488 1229489
1229490 1229493 1229495 1229496 1229497 1229500 1229503 1229707
1229739 1229743 1229746 1229747 1229752 1229754 1229755 1229756
1229759 1229761 1229767 1229781 1229784 1229785 1229787 1229788
1229789 1229792 1229820 1229827 1229830 1229837 1229930 1229931
1229932 1229940 1229952 1230029 1230056 1230679 1230778 1231208
1231230 1231264 1231265 1231266 1231472 1231499 1231565 1231698
1231698 1232227 1232579 1232579 1232601 1232844 1233078 1233289
1233752 1234015 1234015 1234100 1234101 1234102 1234103 1234104
1234128 1234313 1234665 1234765 1234798 1234812 1234996 1235088
1235475 1236136 1236177 1236878 1236886 1237363 1237370 1237418
1237496 1238700 1238700 1239335 1239335 1239618 1239883 1240009
1240343 1240366 1241190 1241453 1241551 1242938 1242987 1243317
1244509 441356 831629 CVE-2013-0340 CVE-2019-15903 CVE-2019-20907
CVE-2019-9947 CVE-2020-15523 CVE-2020-15801 CVE-2022-1996 CVE-2022-25236
CVE-2022-45748 CVE-2023-28746 CVE-2023-32324 CVE-2023-32360 CVE-2023-34241
CVE-2023-4504 CVE-2023-45142 CVE-2023-45288 CVE-2023-46839 CVE-2023-46840
CVE-2023-46841 CVE-2023-46842 CVE-2023-47108 CVE-2023-50387 CVE-2023-50868
CVE-2023-52425 CVE-2023-52425 CVE-2023-52426 CVE-2023-52489 CVE-2023-52581
CVE-2023-52668 CVE-2023-52688 CVE-2023-52859 CVE-2023-52885 CVE-2023-52886
CVE-2023-52887 CVE-2023-52889 CVE-2024-0397 CVE-2024-0450 CVE-2024-10220
CVE-2024-10389 CVE-2024-10963 CVE-2024-10975 CVE-2024-12084 CVE-2024-12085
CVE-2024-12086 CVE-2024-12087 CVE-2024-12088 CVE-2024-12133 CVE-2024-12747
CVE-2024-13176 CVE-2024-1931 CVE-2024-2004 CVE-2024-2193 CVE-2024-2201
CVE-2024-2379 CVE-2024-2398 CVE-2024-2466 CVE-2024-26306 CVE-2024-26590
CVE-2024-26631 CVE-2024-26637 CVE-2024-26668 CVE-2024-26669 CVE-2024-26677
CVE-2024-26682 CVE-2024-26683 CVE-2024-26735 CVE-2024-26808 CVE-2024-26809
CVE-2024-26812 CVE-2024-26835 CVE-2024-26837 CVE-2024-26849 CVE-2024-26851
CVE-2024-26976 CVE-2024-27010 CVE-2024-27011 CVE-2024-27024 CVE-2024-27049
CVE-2024-27050 CVE-2024-27079 CVE-2024-27403 CVE-2024-27433 CVE-2024-27437
CVE-2024-28085 CVE-2024-28397 CVE-2024-28757 CVE-2024-31076 CVE-2024-31142
CVE-2024-31143 CVE-2024-31145 CVE-2024-31146 CVE-2024-31227 CVE-2024-31228
CVE-2024-31449 CVE-2024-32650 CVE-2024-33655 CVE-2024-35235 CVE-2024-35855
CVE-2024-35897 CVE-2024-35902 CVE-2024-35913 CVE-2024-35939 CVE-2024-35949
CVE-2024-36039 CVE-2024-36270 CVE-2024-36286 CVE-2024-36288 CVE-2024-36489
CVE-2024-36620 CVE-2024-36621 CVE-2024-36623 CVE-2024-36881 CVE-2024-36907
CVE-2024-36929 CVE-2024-36933 CVE-2024-36939 CVE-2024-36970 CVE-2024-36979
CVE-2024-37820 CVE-2024-38428 CVE-2024-38563 CVE-2024-38609 CVE-2024-38662
CVE-2024-38875 CVE-2024-39329 CVE-2024-39330 CVE-2024-39476 CVE-2024-39483
CVE-2024-39484 CVE-2024-39486 CVE-2024-39488 CVE-2024-39489 CVE-2024-39491
CVE-2024-39493 CVE-2024-39497 CVE-2024-39499 CVE-2024-39500 CVE-2024-39501
CVE-2024-39505 CVE-2024-39506 CVE-2024-39508 CVE-2024-39509 CVE-2024-39510
CVE-2024-39614 CVE-2024-4032 CVE-2024-40724 CVE-2024-40896 CVE-2024-40899
CVE-2024-40900 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40905
CVE-2024-40909 CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913
CVE-2024-40916 CVE-2024-40920 CVE-2024-40921 CVE-2024-40922 CVE-2024-40924
CVE-2024-40926 CVE-2024-40927 CVE-2024-40929 CVE-2024-40930 CVE-2024-40932
CVE-2024-40934 CVE-2024-40936 CVE-2024-40938 CVE-2024-40939 CVE-2024-40941
CVE-2024-40942 CVE-2024-40943 CVE-2024-40944 CVE-2024-40945 CVE-2024-40954
CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959 CVE-2024-40962
CVE-2024-40964 CVE-2024-40967 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978
CVE-2024-40981 CVE-2024-40982 CVE-2024-40984 CVE-2024-40987 CVE-2024-40988
CVE-2024-40989 CVE-2024-40990 CVE-2024-40992 CVE-2024-40994 CVE-2024-40995
CVE-2024-40997 CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41004
CVE-2024-41007 CVE-2024-41009 CVE-2024-41010 CVE-2024-41012 CVE-2024-41015
CVE-2024-41016 CVE-2024-41020 CVE-2024-41022 CVE-2024-41024 CVE-2024-41025
CVE-2024-41028 CVE-2024-41032 CVE-2024-41035 CVE-2024-41036 CVE-2024-41037
CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044
CVE-2024-41045 CVE-2024-41048 CVE-2024-41049 CVE-2024-41050 CVE-2024-41051
CVE-2024-41056 CVE-2024-41057 CVE-2024-41058 CVE-2024-41059 CVE-2024-41060
CVE-2024-41061 CVE-2024-41062 CVE-2024-41063 CVE-2024-41064 CVE-2024-41065
CVE-2024-41066 CVE-2024-41068 CVE-2024-41069 CVE-2024-41070 CVE-2024-41071
CVE-2024-41072 CVE-2024-41073 CVE-2024-41074 CVE-2024-41075 CVE-2024-41076
CVE-2024-41078 CVE-2024-41079 CVE-2024-41080 CVE-2024-41081 CVE-2024-41084
CVE-2024-41087 CVE-2024-41088 CVE-2024-41089 CVE-2024-41092 CVE-2024-41093
CVE-2024-41094 CVE-2024-41095 CVE-2024-41096 CVE-2024-41097 CVE-2024-41098
CVE-2024-42064 CVE-2024-42069 CVE-2024-42070 CVE-2024-42073 CVE-2024-42074
CVE-2024-42076 CVE-2024-42077 CVE-2024-42079 CVE-2024-42080 CVE-2024-42082
CVE-2024-42085 CVE-2024-42086 CVE-2024-42087 CVE-2024-42089 CVE-2024-42090
CVE-2024-42092 CVE-2024-42093 CVE-2024-42095 CVE-2024-42096 CVE-2024-42097
CVE-2024-42098 CVE-2024-42101 CVE-2024-42104 CVE-2024-42105 CVE-2024-42106
CVE-2024-42107 CVE-2024-42109 CVE-2024-42110 CVE-2024-42113 CVE-2024-42114
CVE-2024-42115 CVE-2024-42117 CVE-2024-42119 CVE-2024-42120 CVE-2024-42121
CVE-2024-42122 CVE-2024-42124 CVE-2024-42125 CVE-2024-42126 CVE-2024-42127
CVE-2024-42130 CVE-2024-42131 CVE-2024-42132 CVE-2024-42133 CVE-2024-42136
CVE-2024-42137 CVE-2024-42138 CVE-2024-42139 CVE-2024-42141 CVE-2024-42142
CVE-2024-42143 CVE-2024-42144 CVE-2024-42145 CVE-2024-42147 CVE-2024-42148
CVE-2024-42152 CVE-2024-42153 CVE-2024-42155 CVE-2024-42156 CVE-2024-42157
CVE-2024-42158 CVE-2024-42159 CVE-2024-42161 CVE-2024-42162 CVE-2024-42223
CVE-2024-42224 CVE-2024-42225 CVE-2024-42226 CVE-2024-42227 CVE-2024-42228
CVE-2024-42229 CVE-2024-42230 CVE-2024-42232 CVE-2024-42236 CVE-2024-42237
CVE-2024-42238 CVE-2024-42239 CVE-2024-42240 CVE-2024-42241 CVE-2024-42244
CVE-2024-42245 CVE-2024-42246 CVE-2024-42247 CVE-2024-42250 CVE-2024-42253
CVE-2024-42259 CVE-2024-42268 CVE-2024-42269 CVE-2024-42270 CVE-2024-42271
CVE-2024-42274 CVE-2024-42276 CVE-2024-42277 CVE-2024-42278 CVE-2024-42279
CVE-2024-42280 CVE-2024-42281 CVE-2024-42283 CVE-2024-42284 CVE-2024-42285
CVE-2024-42286 CVE-2024-42287 CVE-2024-42288 CVE-2024-42289 CVE-2024-42290
CVE-2024-42291 CVE-2024-42292 CVE-2024-42295 CVE-2024-42298 CVE-2024-42301
CVE-2024-42302 CVE-2024-42303 CVE-2024-42308 CVE-2024-42309 CVE-2024-42310
CVE-2024-42311 CVE-2024-42312 CVE-2024-42313 CVE-2024-42314 CVE-2024-42315
CVE-2024-42316 CVE-2024-42318 CVE-2024-42319 CVE-2024-42320 CVE-2024-42322
CVE-2024-43784 CVE-2024-43806 CVE-2024-43816 CVE-2024-43817 CVE-2024-43818
CVE-2024-43819 CVE-2024-43821 CVE-2024-43823 CVE-2024-43824 CVE-2024-43825
CVE-2024-43826 CVE-2024-43829 CVE-2024-43830 CVE-2024-43831 CVE-2024-43833
CVE-2024-43834 CVE-2024-43837 CVE-2024-43839 CVE-2024-43840 CVE-2024-43841
CVE-2024-43842 CVE-2024-43846 CVE-2024-43847 CVE-2024-43849 CVE-2024-43850
CVE-2024-43851 CVE-2024-43853 CVE-2024-43854 CVE-2024-43855 CVE-2024-43856
CVE-2024-43858 CVE-2024-43860 CVE-2024-43861 CVE-2024-43863 CVE-2024-43864
CVE-2024-43866 CVE-2024-43867 CVE-2024-43871 CVE-2024-43872 CVE-2024-43873
CVE-2024-43874 CVE-2024-43875 CVE-2024-43876 CVE-2024-43877 CVE-2024-43879
CVE-2024-43880 CVE-2024-43881 CVE-2024-43882 CVE-2024-43883 CVE-2024-43884
CVE-2024-43885 CVE-2024-43889 CVE-2024-43892 CVE-2024-43893 CVE-2024-43894
CVE-2024-43895 CVE-2024-43897 CVE-2024-43899 CVE-2024-43900 CVE-2024-43902
CVE-2024-43903 CVE-2024-43905 CVE-2024-43906 CVE-2024-43907 CVE-2024-43908
CVE-2024-43909 CVE-2024-43911 CVE-2024-43912 CVE-2024-4418 CVE-2024-44931
CVE-2024-44938 CVE-2024-44939 CVE-2024-45490 CVE-2024-45491 CVE-2024-45492
CVE-2024-45679 CVE-2024-45719 CVE-2024-45794 CVE-2024-48057 CVE-2024-50602
CVE-2024-50602 CVE-2024-50948 CVE-2024-51735 CVE-2024-51746 CVE-2024-52003
CVE-2024-52280 CVE-2024-52282 CVE-2024-52309 CVE-2024-52529 CVE-2024-52801
CVE-2024-53259 CVE-2024-53264 CVE-2024-53858 CVE-2024-53862 CVE-2024-54131
CVE-2024-54132 CVE-2024-5564 CVE-2024-56171 CVE-2024-6104 CVE-2024-6156
CVE-2024-6197 CVE-2024-6219 CVE-2024-6538 CVE-2024-6923 CVE-2024-7254
CVE-2024-7264 CVE-2024-8176 CVE-2024-8676 CVE-2024-9341 CVE-2024-9407
CVE-2024-9632 CVE-2024-9675 CVE-2024-9676 CVE-2024-9676 CVE-2025-22869
CVE-2025-22869 CVE-2025-22870 CVE-2025-22870 CVE-2025-24928 CVE-2025-27113
CVE-2025-27587 CVE-2025-32414 CVE-2025-32415 CVE-2025-4598 CVE-2025-4802
CVE-2025-6020
-----------------------------------------------------------------
The container rancher/seedimage-builder was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: 11
Released: Mon Feb 3 10:02:51 2025
Summary: Recommended update for iptables
Type: recommended
Severity: moderate
References: 1226419,1234996,1235088,CVE-2024-38428
This update for iptables fixes the following issues:
* Fixes checking existence of rules. Fixes issues with rule creation
with podman/netavark. (bsc#1235088, bsc#1234996)
-----------------------------------------------------------------
Advisory ID: 15
Released: Fri Feb 7 10:57:24 2025
Summary: Security update for rsync
Type: security
Severity: critical
References: 1222620,1225946,1227106,1234100,1234101,1234102,1234103,1234104,1235475,CVE-2024-12084,CVE-2024-12085,CVE-2024-12086,CVE-2024-12087,CVE-2024-12088,CVE-2024-12747
This update for rsync fixes the following issues:
- Bump protocol version to 32 - make it easier to show server is patched.
- Fix FLAG_GOT_DIR_FLIST collission with FLAG_HLINKED
- Security update,CVE-2024-12747, bsc#1235475 race condition in handling symbolic links
- Security update, fix multiple vulnerabilities:
* CVE-2024-12084, bsc#1234100 - Heap Buffer Overflow in Checksum Parsing
* CVE-2024-12085, bsc#1234101 - Info Leak via uninitialized Stack contents defeats ASLR
* CVE-2024-12086, bsc#1234102 - Server leaks arbitrary client files
* CVE-2024-12087, bsc#1234103 - Server can make client write files outside of destination directory using symbolic links
* CVE-2024-12088, bsc#1234104 - --safe-links Bypass
-----------------------------------------------------------------
Advisory ID: 30
Released: Wed Mar 5 15:53:42 2025
Summary: Security update for pam
Type: security
Severity: moderate
References: 1221665,1221666,1221667,1221668,1227888,1228535,1233078,CVE-2024-10963,CVE-2024-2004,CVE-2024-2379,CVE-2024-2398,CVE-2024-2466,CVE-2024-6197,CVE-2024-7264
This update for pam fixes the following issues:
- CVE-2024-10963: Fixed improper hostname interpretation inpam_access that could lead to access control bypass (bsc#1233078)
-----------------------------------------------------------------
Advisory ID: 31
Released: Fri Mar 7 17:28:37 2025
Summary: Security update for openssl-3
Type: security
Severity: moderate
References: 1215628,1219823,1219826,1221164,1236136,CVE-2023-50387,CVE-2023-50868,CVE-2024-13176,CVE-2024-1931,CVE-2024-33655
This update for openssl-3 fixes the following issues:
- CVE-2024-13176: Fixed timing side-channel in the ECDSA signature computation(bsc#1236136).
-----------------------------------------------------------------
Advisory ID: 39
Released: Tue Mar 11 15:13:05 2025
Summary: Recommended update for systemd
Type: recommended
Severity: moderate
References: 1211649,1211888,1216063,1219001,1220338,1222684,1229228,1232227,1232844,1233752,1234015,1234313,1234765
This update for systemd fixes the following issues:
- Fixed agetty fails to open credentials directory (bsc#1229228)
- hwdb: comment out the entry for Logitech MX Keys for Mac
- test: answer 2nd mdadm --create question for compat with new version
- core/unit-serialize: fix serialization of markers
- locale-setup: do not load locale from environemnt when /etc/locale.conf is unchanged
- core: fix assert when AddDependencyUnitFiles is called with invalid parameter
- Fix systemd-network recommending libidn2-devel (bsc#1234765)
- tpm2-util: Also retry unsealing after policy_pcr returns PCR_CHANGED (bsc#1233752 bsc#1234313)
- Add a allow/denylist for reading sysfs attributes (bsc#1234015)
- udev: add new builtin net_driver
- udev-builtin-net_id: split-out pci_get_onboard_index() from dev_pci_onboard()
- udev-builtin-net_id: split-out get_pci_slot_specifiers()
- udev-builtin-net_id: introduce get_port_specifier() helper function
- udev-builtin-net_id: split out get_dev_port() and make its failure critical
- udev-builtin-net_id: split-out pci_get_hotplug_slot() and pci_get_hotplug_slot_from_address()
- udev-builtin-net_id: return earlier when hotplug slot is not found
- udev-builtin-net_id: skip non-directory entry earlier
- udev-builtin-net_id: make names_xen() self-contained
- udev-builtin-net_id: use sd_device_get_sysnum() to get index of netdevsim
- udev-builtin-net_id: make names_netdevsim() self-contained
- udev-builtin-net_id: make names_platform() self-contained
- udev-builtin-net_id: make names_vio() self-contained
- udev-builtin-net_id: make names_ccw() self-contained
- udev-builtin-net_id: make dev_devicetree_onboard() self-contained
- udev-builtin-net_id: make names_mac() self-contained
- udev-builtin-net_id: split out get_ifname_prefix()
- udev-builtin-net_id: swap arguments for streq() and friends
- udev-builtin-net_id: drop unused value from NetNameType
- Drop suppor for efivar SystemdOptions (bsc#1220338)
Upstream deprecated it and plan to drop it in the future.
Let's get ahead and drop it now as this feature is unlikely to be used on SUSE
distros and it might be used to gain access to encrypted SLEM systems with
unattended disk unlock and with secure boot disabled.
- pid1: make clear that $WATCHDOG_USEC is set for the shutdown binary, noone else (bsc#1232227)
- udev: skipping empty udev rules file while collecting the stats (bsc#1232844)
-----------------------------------------------------------------
Advisory ID: 40
Released: Fri Mar 28 14:54:51 2025
Summary: Recommended update for elemental-toolkit
Type: recommended
Severity: moderate
References: 1222584,1223849,1226492,1233289,CVE-2024-4418
This update for elemental-toolkit fixes the following issues:
- Update to v2.2.2:
* 1fbc11ea Fixes squashfs images creation (#2230) [bsc#1233289]
-----------------------------------------------------------------
Advisory ID: 23
Released: Mon Mar 31 16:22:33 2025
Summary: Security update for expat
Type: security
Severity: moderate
References: 1174091,1189495,1221854,1226447,1226448,1227378,1228780,1232579,831629,CVE-2019-20907,CVE-2019-9947,CVE-2020-15523,CVE-2020-15801,CVE-2022-25236,CVE-2023-52425,CVE-2024-0397,CVE-2024-0450,CVE-2024-4032,CVE-2024-50602,CVE-2024-6923
This update for expat fixes the following issues:
-CVE-2024-50602: Fixed DoS via XML_ResumeParser (bsc#1232579).
-----------------------------------------------------------------
Advisory ID: 65
Released: Tue Apr 22 14:11:42 2025
Summary: Security update for libxml2
Type: security
Severity: important
References: 1223234,1229952,1230029,1237363,1237370,1237418,CVE-2024-32650,CVE-2024-43806,CVE-2024-56171,CVE-2025-24928,CVE-2025-27113
This update for libxml2 fixes the following issues:
- CVE-2024-56171: Fixed use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c [bsc#1237363]
- CVE-2025-24928: Fixed stack-based buffer overflow in xmlSnprintfElements in valid.c [bsc#1237370]
- CVE-2025-27113: Fixed NULL Pointer Dereference in libxml2 xmlPatMatch [bsc#1237418]
-----------------------------------------------------------------
Advisory ID: 63
Released: Tue Apr 22 15:27:45 2025
Summary: Security update for libtasn1
Type: security
Severity: important
References: 1012628,1193454,1194869,1205462,1208783,1213123,1214285,1215199,1220066,1220252,1220877,1221326,1221630,1221645,1221652,1221857,1222254,1222335,1222350,1222364,1222372,1222387,1222433,1222434,1222625,1222633,1222634,1222808,1222967,1222973,1223053,1223074,1223191,1223395,1223635,1223720,1223731,1223742,1223763,1223767,1223777,1223803,1224105,1224415,1224485,1224496,1224510,1224535,1224631,1224636,1224690,1224694,1224700,1224711,1225475,1225582,1225607,1225718,1225751,1225814,1225832,1225838,1225903,1226031,1226127,1226502,1226530,1226588,1226604,1226743,1226751,1226765,1226798,1226801,1226834,1226874,1226885,1226920,1227149,1227182,1227383,1227437,1227492,1227493,1227494,1227618,1227620,1227623,1227627,1227634,1227706,1227722,1227724,1227725,1227728,1227729,1227732,1227733,1227734,1227747,1227750,1227754,1227758,1227760,1227761,1227764,1227766,1227770,1227771,1227772,1227774,1227781,1227784,1227785,1227787,1227790,1227791,1227792,1227796,1227798,1227799,1227802,1227808,1
227810,1227811,1227812,1227815,1227816,1227818,1227820,1227823,1227824,1227826,1227828,1227829,1227830,1227832,1227833,1227834,1227839,1227840,1227846,1227849,1227851,1227853,1227863,1227864,1227865,1227867,1227869,1227870,1227883,1227884,1227891,1227893,1227929,1227950,1227957,1227981,1228020,1228021,1228192,1228235,1228236,1228247,1228321,1228409,1228410,1228426,1228427,1228429,1228446,1228447,1228449,1228450,1228452,1228456,1228457,1228458,1228459,1228460,1228462,1228463,1228466,1228468,1228469,1228470,1228472,1228479,1228480,1228481,1228482,1228483,1228484,1228485,1228486,1228487,1228489,1228491,1228492,1228493,1228494,1228495,1228496,1228499,1228500,1228501,1228502,1228503,1228505,1228508,1228509,1228510,1228511,1228513,1228515,1228516,1228518,1228520,1228525,1228527,1228530,1228531,1228539,1228561,1228563,1228564,1228565,1228567,1228568,1228572,1228576,1228579,1228580,1228581,1228582,1228584,1228586,1228588,1228590,1228591,1228599,1228615,1228616,1228617,1228625,1228626,122863
3,1228635,1228636,1228640,1228643,1228644,1228646,1228649,1228650,1228654,1228655,1228656,1228658,1228660,1228662,1228665,1228666,1228667,1228672,1228673,1228674,1228677,1228680,1228687,1228705,1228706,1228707,1228708,1228709,1228710,1228718,1228720,1228721,1228722,1228723,1228724,1228726,1228727,1228733,1228737,1228743,1228748,1228754,1228756,1228757,1228758,1228764,1228766,1228779,1228801,1228849,1228850,1228857,1228959,1228964,1228966,1228967,1228971,1228973,1228977,1228978,1228979,1228986,1228988,1228989,1228991,1228992,1229005,1229024,1229025,1229042,1229045,1229046,1229054,1229056,1229086,1229134,1229136,1229154,1229156,1229160,1229167,1229168,1229169,1229170,1229171,1229172,1229173,1229174,1229239,1229240,1229241,1229243,1229244,1229245,1229246,1229247,1229248,1229249,1229250,1229251,1229252,1229253,1229254,1229255,1229256,1229287,1229290,1229291,1229292,1229294,1229296,1229297,1229298,1229299,1229301,1229303,1229304,1229305,1229307,1229309,1229312,1229313,1229314,1229315,122
9316,1229317,1229318,1229319,1229320,1229327,1229341,1229342,1229344,1229345,1229346,1229347,1229349,1229350,1229351,1229353,1229354,1229355,1229356,1229357,1229358,1229359,1229360,1229365,1229366,1229369,1229370,1229373,1229374,1229379,1229381,1229382,1229383,1229386,1229388,1229390,1229391,1229392,1229395,1229398,1229399,1229400,1229402,1229403,1229404,1229407,1229409,1229410,1229411,1229413,1229414,1229417,1229444,1229451,1229452,1229455,1229456,1229480,1229481,1229482,1229484,1229485,1229486,1229487,1229488,1229489,1229490,1229493,1229495,1229496,1229497,1229500,1229503,1229707,1229739,1229743,1229746,1229747,1229752,1229754,1229755,1229756,1229759,1229761,1229767,1229781,1229784,1229785,1229787,1229788,1229789,1229792,1229820,1229827,1229830,1229837,1229940,1230056,1236878,CVE-2023-52489,CVE-2023-52581,CVE-2023-52668,CVE-2023-52688,CVE-2023-52859,CVE-2023-52885,CVE-2023-52886,CVE-2023-52887,CVE-2023-52889,CVE-2024-12133,CVE-2024-26590,CVE-2024-26631,CVE-2024-26637,CVE-2024-2666
8,CVE-2024-26669,CVE-2024-26677,CVE-2024-26682,CVE-2024-26683,CVE-2024-26735,CVE-2024-26808,CVE-2024-26809,CVE-2024-26812,CVE-2024-26835,CVE-2024-26837,CVE-2024-26849,CVE-2024-26851,CVE-2024-26976,CVE-2024-27010,CVE-2024-27011,CVE-2024-27024,CVE-2024-27049,CVE-2024-27050,CVE-2024-27079,CVE-2024-27403,CVE-2024-27433,CVE-2024-27437,CVE-2024-31076,CVE-2024-35855,CVE-2024-35897,CVE-2024-35902,CVE-2024-35913,CVE-2024-35939,CVE-2024-35949,CVE-2024-36270,CVE-2024-36286,CVE-2024-36288,CVE-2024-36489,CVE-2024-36881,CVE-2024-36907,CVE-2024-36929,CVE-2024-36933,CVE-2024-36939,CVE-2024-36970,CVE-2024-36979,CVE-2024-38563,CVE-2024-38609,CVE-2024-38662,CVE-2024-39476,CVE-2024-39483,CVE-2024-39484,CVE-2024-39486,CVE-2024-39488,CVE-2024-39489,CVE-2024-39491,CVE-2024-39493,CVE-2024-39497,CVE-2024-39499,CVE-2024-39500,CVE-2024-39501,CVE-2024-39505,CVE-2024-39506,CVE-2024-39508,CVE-2024-39509,CVE-2024-39510,CVE-2024-40899,CVE-2024-40900,CVE-2024-40902,CVE-2024-40903,CVE-2024-40904,CVE-2024-40905,CVE-2
024-40909,CVE-2024-40910,CVE-2024-40911,CVE-2024-40912,CVE-2024-40913,CVE-2024-40916,CVE-2024-40920,CVE-2024-40921,CVE-2024-40922,CVE-2024-40924,CVE-2024-40926,CVE-2024-40927,CVE-2024-40929,CVE-2024-40930,CVE-2024-40932,CVE-2024-40934,CVE-2024-40936,CVE-2024-40938,CVE-2024-40939,CVE-2024-40941,CVE-2024-40942,CVE-2024-40943,CVE-2024-40944,CVE-2024-40945,CVE-2024-40954,CVE-2024-40956,CVE-2024-40957,CVE-2024-40958,CVE-2024-40959,CVE-2024-40962,CVE-2024-40964,CVE-2024-40967,CVE-2024-40976,CVE-2024-40977,CVE-2024-40978,CVE-2024-40981,CVE-2024-40982,CVE-2024-40984,CVE-2024-40987,CVE-2024-40988,CVE-2024-40989,CVE-2024-40990,CVE-2024-40992,CVE-2024-40994,CVE-2024-40995,CVE-2024-40997,CVE-2024-41000,CVE-2024-41001,CVE-2024-41002,CVE-2024-41004,CVE-2024-41007,CVE-2024-41009,CVE-2024-41010,CVE-2024-41012,CVE-2024-41015,CVE-2024-41016,CVE-2024-41020,CVE-2024-41022,CVE-2024-41024,CVE-2024-41025,CVE-2024-41028,CVE-2024-41032,CVE-2024-41035,CVE-2024-41036,CVE-2024-41037,CVE-2024-41038,CVE-2024-410
39,CVE-2024-41040,CVE-2024-41041,CVE-2024-41044,CVE-2024-41045,CVE-2024-41048,CVE-2024-41049,CVE-2024-41050,CVE-2024-41051,CVE-2024-41056,CVE-2024-41057,CVE-2024-41058,CVE-2024-41059,CVE-2024-41060,CVE-2024-41061,CVE-2024-41062,CVE-2024-41063,CVE-2024-41064,CVE-2024-41065,CVE-2024-41066,CVE-2024-41068,CVE-2024-41069,CVE-2024-41070,CVE-2024-41071,CVE-2024-41072,CVE-2024-41073,CVE-2024-41074,CVE-2024-41075,CVE-2024-41076,CVE-2024-41078,CVE-2024-41079,CVE-2024-41080,CVE-2024-41081,CVE-2024-41084,CVE-2024-41087,CVE-2024-41088,CVE-2024-41089,CVE-2024-41092,CVE-2024-41093,CVE-2024-41094,CVE-2024-41095,CVE-2024-41096,CVE-2024-41097,CVE-2024-41098,CVE-2024-42064,CVE-2024-42069,CVE-2024-42070,CVE-2024-42073,CVE-2024-42074,CVE-2024-42076,CVE-2024-42077,CVE-2024-42079,CVE-2024-42080,CVE-2024-42082,CVE-2024-42085,CVE-2024-42086,CVE-2024-42087,CVE-2024-42089,CVE-2024-42090,CVE-2024-42092,CVE-2024-42093,CVE-2024-42095,CVE-2024-42096,CVE-2024-42097,CVE-2024-42098,CVE-2024-42101,CVE-2024-42104,CVE-
2024-42105,CVE-2024-42106,CVE-2024-42107,CVE-2024-42109,CVE-2024-42110,CVE-2024-42113,CVE-2024-42114,CVE-2024-42115,CVE-2024-42117,CVE-2024-42119,CVE-2024-42120,CVE-2024-42121,CVE-2024-42122,CVE-2024-42124,CVE-2024-42125,CVE-2024-42126,CVE-2024-42127,CVE-2024-42130,CVE-2024-42131,CVE-2024-42132,CVE-2024-42133,CVE-2024-42136,CVE-2024-42137,CVE-2024-42138,CVE-2024-42139,CVE-2024-42141,CVE-2024-42142,CVE-2024-42143,CVE-2024-42144,CVE-2024-42145,CVE-2024-42147,CVE-2024-42148,CVE-2024-42152,CVE-2024-42153,CVE-2024-42155,CVE-2024-42156,CVE-2024-42157,CVE-2024-42158,CVE-2024-42159,CVE-2024-42161,CVE-2024-42162,CVE-2024-42223,CVE-2024-42224,CVE-2024-42225,CVE-2024-42226,CVE-2024-42227,CVE-2024-42228,CVE-2024-42229,CVE-2024-42230,CVE-2024-42232,CVE-2024-42236,CVE-2024-42237,CVE-2024-42238,CVE-2024-42239,CVE-2024-42240,CVE-2024-42241,CVE-2024-42244,CVE-2024-42245,CVE-2024-42246,CVE-2024-42247,CVE-2024-42250,CVE-2024-42253,CVE-2024-42259,CVE-2024-42268,CVE-2024-42269,CVE-2024-42270,CVE-2024-42
271,CVE-2024-42274,CVE-2024-42276,CVE-2024-42277,CVE-2024-42278,CVE-2024-42279,CVE-2024-42280,CVE-2024-42281,CVE-2024-42283,CVE-2024-42284,CVE-2024-42285,CVE-2024-42286,CVE-2024-42287,CVE-2024-42288,CVE-2024-42289,CVE-2024-42290,CVE-2024-42291,CVE-2024-42292,CVE-2024-42295,CVE-2024-42298,CVE-2024-42301,CVE-2024-42302,CVE-2024-42303,CVE-2024-42308,CVE-2024-42309,CVE-2024-42310,CVE-2024-42311,CVE-2024-42312,CVE-2024-42313,CVE-2024-42314,CVE-2024-42315,CVE-2024-42316,CVE-2024-42318,CVE-2024-42319,CVE-2024-42320,CVE-2024-42322,CVE-2024-43816,CVE-2024-43817,CVE-2024-43818,CVE-2024-43819,CVE-2024-43821,CVE-2024-43823,CVE-2024-43824,CVE-2024-43825,CVE-2024-43826,CVE-2024-43829,CVE-2024-43830,CVE-2024-43831,CVE-2024-43833,CVE-2024-43834,CVE-2024-43837,CVE-2024-43839,CVE-2024-43840,CVE-2024-43841,CVE-2024-43842,CVE-2024-43846,CVE-2024-43847,CVE-2024-43849,CVE-2024-43850,CVE-2024-43851,CVE-2024-43853,CVE-2024-43854,CVE-2024-43855,CVE-2024-43856,CVE-2024-43858,CVE-2024-43860,CVE-2024-43861,CVE
-2024-43863,CVE-2024-43864,CVE-2024-43866,CVE-2024-43867,CVE-2024-43871,CVE-2024-43872,CVE-2024-43873,CVE-2024-43874,CVE-2024-43875,CVE-2024-43876,CVE-2024-43877,CVE-2024-43879,CVE-2024-43880,CVE-2024-43881,CVE-2024-43882,CVE-2024-43883,CVE-2024-43884,CVE-2024-43885,CVE-2024-43889,CVE-2024-43892,CVE-2024-43893,CVE-2024-43894,CVE-2024-43895,CVE-2024-43897,CVE-2024-43899,CVE-2024-43900,CVE-2024-43902,CVE-2024-43903,CVE-2024-43905,CVE-2024-43906,CVE-2024-43907,CVE-2024-43908,CVE-2024-43909,CVE-2024-43911,CVE-2024-43912,CVE-2024-44931,CVE-2024-44938,CVE-2024-44939
This update for libtasn1 fixes the following issues:
- CVE-2024-12133: Fixed potential DoS in handling of numerous SEQUENCE OF or SET OF elements (bsc#1236878)
-----------------------------------------------------------------
Advisory ID: 91
Released: Wed May 7 09:09:03 2025
Summary: Recommended update for gettext-runtime
Type: recommended
Severity: moderate
References: 1227316,1230778,CVE-2024-7254
This update for gettext-runtime fixes the following issues:
- Fixed handling of po files with malformed header (bsc#1227316)
-----------------------------------------------------------------
Advisory ID: 92
Released: Thu May 8 08:35:42 2025
Summary: Recommended update for findutils
Type: recommended
Severity: moderate
References: 1224262,1231472,CVE-2024-26306
This update for findutils fixes the following issues:
- do not crash when file system loop was encountered (bsc#1231472)
- added patches
fix https://git.savannah.gnu.org/cgit/findutils.git/commit/?id=e5d6eb919b9
- modified patches
-----------------------------------------------------------------
Advisory ID: 95
Released: Thu May 8 14:25:53 2025
Summary: Security update for util-linux
Type: security
Severity: important
References: 1159034,1194818,1218609,1220117,1221831,1223605,1224285,1225197,1225598,1229476,1231208,1231230,1231499,1231698,CVE-2024-28085,CVE-2024-6104,CVE-2024-9341,CVE-2024-9407,CVE-2024-9675,CVE-2024-9676
This update for util-linux fixes the following issues:
- Updated to version 2.40.4:
* agetty: Prevent cursor escape (bsc#1194818)
* chcpu(8): Document CPU deconfiguring behavior
* fdisk: SGI fixes
* hardlink: fix memory corruption
* hardlink.1 directory|file is mandatory
* lib/env: fix env_list_setenv() for strings without '='
* libblkid:
(exfat) validate fields used by prober
(gpt) use blkid_probe_verify_csum() for partition array
checksum
add FSLASTBLOCK for swaparea
bitlocker fix version on big-endian systems
* libfdisk: make sure libblkid uses the same sector size
* libmount:
extract common error handling function
propagate first error of multiple filesystem types
* logger: correctly format tv_usec
* lscpu: Skip aarch64 decode path for rest of the architectures
(bsc#1229476)
* lsns: ignore ESRCH errors reported when accessing files under
/proc
* mkswap: set selinux label also when creating file
* more: make sure we have data on stderr
* nsenter: support empty environ
* umount, losetup: Document loop destroy behavior
(bsc#1159034).
* uuidd: fix /var/lib/libuuid mode uuidd-tmpfiles.conf
fix /var/lib/libuuid mode uuidd-tmpfiles.conf
- Refresh util-linux.keyring. Key validity was extended.
- Update to version 2.40.2:
* cfdisk: fix possible integer overflow
* libmount: improving robustness in reading kernel messages,
add pidfs to pseudo fs list
* lscpu: New Arm Cortex part numbers
fix hang of lscpu -e (bsc#1225598)
* lsfd: Refactor the pidfd logic, support pidfs
* mkswap.8.adoc: update note regarding swapfile creation
* setpgid: make -f work
- Enable kernel mountfd API, as it should be already stable
(PED-9752).
- Move autoreconf back to %build.
- Add devel dependencies.
- Remove util-linux-rpmlintrc. It is no more needed with multibuild.
- uncomment 'autoreconf --install' to use the new version of automake
- disable libmagic in more(1) for binary detection (bsc#1225197)
- add support for pidfs in kernel 6.9 (bsc#1224285)
- Update to version 2.40.1:
* more: clean processes not cleaned up after failed SSH session
using up 100% CPU (bsc#1220117)
* CVE-2024-28085: Fixed improper neutralization of escape sequences in wall (bsc#1221831)
* chcpu: document limitations of -g (bsc#1218609)
* lscpu: even more Arm part numbers (bsc#1223605)
-----------------------------------------------------------------
Advisory ID: 97
Released: Fri May 9 08:41:53 2025
Summary: Recommended update for systemd
Type: recommended
Severity: important
References: 1225070,1226660,1227590,1227593,1227594,1227595,1234015,1236886,CVE-2024-28397,CVE-2024-36039,CVE-2024-38875,CVE-2024-39329,CVE-2024-39330,CVE-2024-39614
This update for systemd fixes the following issues:
- Maintain the network device naming scheme used on SLE15 (jsc#PED-12317)
This shouldn't cause problems as predictable naming schemes are disabled on
SLMicro-6.1 (net.ifnames=0 is set on the kernel command line by default).
Add patch for the description of these schemes in the relevant man page.
- udev: allow/denylist for reading sysfs attributes when composing a NIC name (bsc#1234015)
- For a complete list of changes, visit:
https://github.com/openSUSE/systemd/compare/b4693652f317dbae80e31b978f51e695a23fa3d0...0d0f2dbfc4c901dca09fdd3d5b744b5339e0e991
- journald:
* close runtime journals before their parent directory removed
* reset runtime seqnum data when flushing to system journal (bsc#1236886)
-----------------------------------------------------------------
Advisory ID: 99
Released: Mon May 12 11:14:56 2025
Summary: Security update for ca-certificates-mozilla
Type: security
Severity: moderate
References: 1010996,1199079,1229003,1234798,1240009,1240343,441356,CVE-2024-10389,CVE-2024-10975,CVE-2024-45794,CVE-2024-48057,CVE-2024-51735,CVE-2024-51746
This update for ca-certificates-mozilla fixes the following issues:
Update to 2.74 state of Mozilla SSL root CAs:
Removed:
* SwissSign Silver CA - G2
Added:
* D-TRUST BR Root CA 2 2023
* D-TRUST EV Root CA 2 2023
Updated to 2.72 state of Mozilla SSL root CAs (bsc#1234798):
Removed:
* SecureSign RootCA11
* Security Communication RootCA3
Added:
* TWCA CYBER Root CA
* TWCA Global Root CA G2
* SecureSign Root CA12
* SecureSign Root CA14
* SecureSign Root CA15
-----------------------------------------------------------------
Advisory ID: 107
Released: Tue May 13 15:32:59 2025
Summary: Security update for freetype2
Type: security
Severity: important
References: 1225771,CVE-2024-5564
This update for freetype2 fixes the following issues:
Update to 2.13.2:
* Some fields in the `FT_Outline` structure have been changed
from signed to unsigned type, which better reflects the actual
usage. It is also an additional means to protect against
malformed input.
* Rare double-free crashes in the cache subsystem have been fixed.
* Excessive stack allocation in the autohinter has been fixed.
* The B/W rasterizer has received a major upkeep that results in
large performance improvements. The rendering speed has
increased and even doubled for very complex glyphs.
-----------------------------------------------------------------
Advisory ID: 108
Released: Tue May 13 15:37:50 2025
Summary: Security update for expat
Type: security
Severity: important
References: 1027519,1214718,1218851,1219080,1219559,1219561,1219885,1221289,1221332,1221334,1221984,1222302,1222453,1225953,1227355,1228574,1228575,1229930,1229931,1229932,1232579,1232601,1239618,CVE-2013-0340,CVE-2019-15903,CVE-2023-28746,CVE-2023-46839,CVE-2023-46840,CVE-2023-46841,CVE-2023-46842,CVE-2023-52425,CVE-2023-52426,CVE-2024-2193,CVE-2024-2201,CVE-2024-28757,CVE-2024-31142,CVE-2024-31143,CVE-2024-31145,CVE-2024-31146,CVE-2024-45490,CVE-2024-45491,CVE-2024-45492,CVE-2024-50602,CVE-2024-8176
This update for expat fixes the following issues:
Version update to 2.7.1:
Bug fixes:
#980 #989 Restore event pointer behavior from Expat 2.6.4
(that the fix to CVE-2024-8176 changed in 2.7.0);
affected API functions are:
- XML_GetCurrentByteCount
- XML_GetCurrentByteIndex
- XML_GetCurrentColumnNumber
- XML_GetCurrentLineNumber
- XML_GetInputContext
Other changes:
#976 #977 Autotools: Integrate files 'fuzz/xml_lpm_fuzzer.{cpp,proto}'
with Automake that were missing from 2.7.0 release tarballs
#983 #984 Fix printf format specifiers for 32bit Emscripten
#992 docs: Promote OpenSSF Best Practices self-certification
#978 tests/benchmark: Resolve mistaken double close
#986 Address compiler warnings
#990 #993 Version info bumped from 11:1:10 (libexpat*.so.1.10.1)
to 11:2:10 (libexpat*.so.1.10.2); see https://verbump.de/
for what these numbers do
Infrastructure:
#982 CI: Start running Perl XML::Parser integration tests
#987 CI: Enforce Clang Static Analyzer clean code
#991 CI: Re-enable warning clang-analyzer-valist.Uninitialized
for clang-tidy
#981 CI: Cover compilation with musl
#983 #984 CI: Cover compilation with 32bit Emscripten
#976 #977 CI: Protect against fuzzer files missing from future
release archives
version update to 2.7.0 (CVE-2024-8176 [bsc#1239618]):
* Security fixes:
#893 #973 CVE-2024-8176 -- Fix crash from chaining a large number
of entities caused by stack overflow by resolving use of
recursion, for all three uses of entities:
- general entities in character data ('<e>&g1;</e>')
- general entities in attribute values ('<e k1='&g1;'/>')
- parameter entities ('%p1;')
Known impact is (reliable and easy) denial of service:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
(Base Score: 7.5, Temporal Score: 7.2)
Please note that a layer of compression around XML can
significantly reduce the minimum attack payload size.
* Other changes:
#935 #937 Autotools: Make generated CMake files look for
libexpat. at SO_MAJOR@.dylib on macOS
#925 Autotools: Sync CMake templates with CMake 3.29
#945 #962 #966 CMake: Drop support for CMake <3.13
#942 CMake: Small fuzzing related improvements
#921 docs: Add missing documentation of error code
XML_ERROR_NOT_STARTED that was introduced with 2.6.4
#941 docs: Document need for C++11 compiler for use from C++
#959 tests/benchmark: Fix a (harmless) TOCTTOU
#944 Windows: Fix installer target location of file xmlwf.xml
for CMake
#953 Windows: Address warning -Wunknown-warning-option
about -Wno-pedantic-ms-format from LLVM MinGW
#971 Address Cppcheck warnings
#969 #970 Mass-migrate links from http:// to https://
#947 #958 ..
#974 #975 Document changes since the previous release
#974 #975 Version info bumped from 11:0:10 (libexpat*.so.1.10.0)
to 11:1:10 (libexpat*.so.1.10.1); see https://verbump.de/
for what these numbers do
- no source changes, just adding jira reference: jsc#SLE-21253
Version update to 2.6.4
* Security fixes: [bsc#1232601][bsc#1232579]
#915 CVE-2024-50602 -- Fix crash within function XML_ResumeParser
from a NULL pointer dereference by disallowing function
XML_StopParser to (stop or) suspend an unstarted parser.
A new error code XML_ERROR_NOT_STARTED was introduced to
properly communicate this situation. // CWE-476 CWE-754
* Other changes:
#903 CMake: Add alias target 'expat::expat'
#905 docs: Document use via CMake >=3.18 with FetchContent
and SOURCE_SUBDIR and its consequences
#902 tests: Reduce use of global parser instance
#904 tests: Resolve duplicate handler
#317 #918 tests: Improve tests on doctype closing (ex CVE-2019-15903)
#914 Fix signedness of format strings
#919 #920 Version info bumped from 10:3:9 (libexpat*.so.1.9.3)
to 11:0:10 (libexpat*.so.1.10.0); see https://verbump.de/
for what these numbers do
Update to 2.6.3:
* Security fixes:
- CVE-2024-45490, bsc#1229930 -- Calling function XML_ParseBuffer with
len < 0 without noticing and then calling XML_GetBuffer
will have XML_ParseBuffer fail to recognize the problem
and XML_GetBuffer corrupt memory.
With the fix, XML_ParseBuffer now complains with error
XML_ERROR_INVALID_ARGUMENT just like sibling XML_Parse
has been doing since Expat 2.2.1, and now documented.
Impact is denial of service to potentially artitrary code
execution.
- CVE-2024-45491, bsc#1229931 -- Internal function dtdCopy can have an
integer overflow for nDefaultAtts on 32-bit platforms
(where UINT_MAX equals SIZE_MAX).
Impact is denial of service to potentially artitrary code
execution.
- CVE-2024-45492, bsc#1229932 -- Internal function nextScaffoldPart can
have an integer overflow for m_groupSize on 32-bit
platforms (where UINT_MAX equals SIZE_MAX).
Impact is denial of service to potentially artitrary code
execution.
Update to 2.6.2:
* CVE-2024-28757 -- Prevent billion laughs attacks with isolated
use of external parsers (bsc#1221289)
* Reject direct parameter entity recursion and avoid the related
undefined behavior
Update to 2.6.1:
* Expose billion laughs API with XML_DTD defined and XML_GE
undefined, regression from 2.6.0
* Make tests independent of CPU speed, and thus more robust
Update to 2.6.0:
* Security fixes:
- CVE-2023-52425 (bsc#1219559)
-- Fix quadratic runtime issues with big tokens
that can cause denial of service, in partial where
dealing with compressed XML input. Applications
that parsed a document in one go -- a single call to
functions XML_Parse or XML_ParseBuffer -- were not affected.
The smaller the chunks/buffers you use for parsing
previously, the bigger the problem prior to the fix.
Backporters should be careful to no omit parts of
pull request #789 and to include earlier pull request #771,
in order to not break the fix.
- CVE-2023-52426 (bsc#1219561)
-- Fix billion laughs attacks for users
compiling *without* XML_DTD defined (which is not common).
Users with XML_DTD defined have been protected since
Expat >=2.4.0 (and that was CVE-2013-0340 back then).
* Bug fixes:
- Fix parse-size-dependent 'invalid token' error for
external entities that start with a byte order mark
- Fix NULL pointer dereference in setContext via
XML_ExternalEntityParserCreate for compilation with
XML_DTD undefined
- Protect against closing entities out of order
* Other changes:
- Improve support for arc4random/arc4random_buf
- Improve buffer growth in XML_GetBuffer and XML_Parse
- xmlwf: Support --help and --version
- xmlwf: Support custom buffer size for XML_GetBuffer and read
- xmlwf: Improve language and URL clickability in help output
- examples: Add new example 'element_declarations.c'
- Be stricter about macro XML_CONTEXT_BYTES at build time
- Make inclusion to expat_config.h consistent
- Autotools: configure.ac: Support --disable-maintainer-mode
- Autotools: Sync CMake templates with CMake 3.26
- Autotools: Make installation of shipped man page doc/xmlwf.1
independent of docbook2man availability
- Autotools|CMake: Add missing -DXML_STATIC to pkg-config file
section 'Cflags.private' in order to fix compilation
against static libexpat using pkg-config on Windows
- Autotools|CMake: Require a C99 compiler
(a de-facto requirement already since Expat 2.2.2 of 2017)
- Autotools|CMake: Fix PACKAGE_BUGREPORT variable
- Autotools|CMake: Make test suite require a C++11 compiler
- CMake: Require CMake >=3.5.0
- CMake: Lowercase off_t and size_t to help a bug in Meson
- CMake: Sort xmlwf sources alphabetically
- CMake|Windows: Fix generation of DLL file version info
- CMake: Build tests/benchmark/benchmark.c as well for
a build with -DEXPAT_BUILD_TESTS=ON
- docs: Document the importance of isFinal + adjust tests
accordingly
- docs: Improve use of 'NULL' and 'null'
- docs: Be specific about version of XML (XML 1.0r4)
and version of C (C99); (XML 1.0r5 will need a sponsor.)
- docs: reference.html: Promote function XML_ParseBuffer more
- docs: reference.html: Add HTML anchors to XML_* macros
- docs: reference.html: Upgrade to OK.css 1.2.0
- docs: Fix typos
- docs|CI: Use HTTPS URLs instead of HTTP at various places
- Address compiler warnings
- Address clang-tidy warnings
- Version info bumped from 9:10:8 (libexpat*.so.1.8.10)
to 10:0:9 (libexpat*.so.1.9.0); see https://verbump.de/
for what these numbers do
-----------------------------------------------------------------
Advisory ID: 111
Released: Thu May 15 19:45:43 2025
Summary: Security update for elemental-operator
Type: security
Severity: important
References: 1231264,1231265,1231266,1238700,1239335,CVE-2024-31227,CVE-2024-31228,CVE-2024-31449,CVE-2025-22869,CVE-2025-22870
This update for elemental-operator fixes the following issues:
- Updated to v1.7.2:
* Updated header year
* CVE-2025-22870: golang.org/x/net/proxy: Fixed proxy bypass using IPv6 zone IDs (bsc#1238700)
* CVE-2025-22869: golang.org/x/crypto/ssh: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239335)
* Label Templates: add IP addresses to the Network variables (#885, #894)
* Fixed generation of already present resources (#892, #893)
-----------------------------------------------------------------
Advisory ID: 122
Released: Tue May 27 11:28:57 2025
Summary: Security update for glibc
Type: security
Severity: critical
References: 1219503,1225365,1234128,1234665,1239883,1243317,CVE-2023-32324,CVE-2023-32360,CVE-2023-34241,CVE-2023-4504,CVE-2024-35235,CVE-2025-4802
This update for glibc fixes the following issues:
- CVE-2025-4802: elf: Ignore LD_LIBRARY_PATH and debug env var for setuid for static (bsc#1243317)
- pthreads NPTL: lost wakeup fix 2 (bsc#1234128, BZ #25847)
- Mark functions in libc_nonshared.a as hidden (bsc#1239883)
- Linux: Switch back to assembly syscall wrapper for prctl (bsc#1234665, BZ #29770)
-----------------------------------------------------------------
Advisory ID: 126
Released: Wed May 28 11:00:31 2025
Summary: Security update for libxml2
Type: security
Severity: moderate
References: 1207377,1218474,1228142,1230679,1241453,1241551,CVE-2022-45748,CVE-2024-40724,CVE-2024-45679,CVE-2025-32414,CVE-2025-32415
This update for libxml2 fixes the following issues:
- CVE-2025-32414: Fixed out-of-bounds read when parsing text via the Python API (bsc#1241551).
- CVE-2025-32415: Fixed heap-based buffer under-read via crafted XML documents (bsc#1241453).
-----------------------------------------------------------------
Advisory ID: 130
Released: Tue Jun 3 11:03:45 2025
Summary: Security update for elemental-toolkit
Type: security
Severity: important
References: 1231565,1238700,1239335,CVE-2024-9632,CVE-2025-22869,CVE-2025-22870
This update for elemental-toolkit fixes the following issues:
- Updated to v2.2.3:
* Adapted .golangci.yml format to a new version
* Simplified podman calls in CI steup
* Switched GHA runners to Ubuntu 24.04
* Updated year in headers
* Vendored go.mod libraries
* CVE-2025-22870: golang.org/x/net/proxy: Fixed proxy bypass using IPv6 zone IDs (bsc#1238700)
* CVE-2025-22869: golang.org/x/crypto/ssh: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239335)
-----------------------------------------------------------------
Advisory ID: 145
Released: Thu Jun 12 09:37:25 2025
Summary: Security update for systemd
Type: security
Severity: moderate
References: 1217538,1236177,1237496,1241190,1242938,CVE-2025-4598
This update for systemd fixes the following issues:
- coredump: use %d in kernel core pattern (CVE-2025-4598)
- Revert 'macro: terminate the temporary VA_ARGS_FOREACH() array with a sentinel' (SUSE specific)
- umount: do not move busy network mounts (bsc#1236177)
- man/pstore.conf: pstore.conf template is not always installed in /etc
- man: coredump.conf template is not always installed in /etc (bsc#1237496)
- Don't write messages sent from users with UID falling into the container UID
range to the system journal. Daemons in the container don't talk to the
outside journald as they talk to the inner one directly, which does its
journal splitting based on shifted uids. (bsc#1242938)
- This re-adds back the support for the persistent net name rules as well as
their generator since predictable naming scheme is still disabled by default
on Micro (via the `net.ifnames=0` boot option). (bsc#1241190)
-----------------------------------------------------------------
Advisory ID: 146
Released: Fri Jun 13 12:48:33 2025
Summary: Security update for openssl-3
Type: security
Severity: moderate
References: 1231698,1240366,CVE-2024-9676,CVE-2025-27587
This update for openssl-3 fixes the following issues:
- CVE-2025-27587: Fixed Minerva side channel vulnerability in P-384 (bsc#1240366)
-----------------------------------------------------------------
Advisory ID: 147
Released: Fri Jun 13 12:50:10 2025
Summary: Security update for libxml2
Type: security
Severity: important
References: 1200528,1217070,1221400,1224323,1228553,1234812,CVE-2022-1996,CVE-2023-45142,CVE-2023-45288,CVE-2023-47108,CVE-2024-40896
This update for libxml2 fixes the following issues:
- CVE-2024-40896: Fixed XXE vulnerability (bsc#1234812)
-----------------------------------------------------------------
Advisory ID: 151
Released: Thu Jun 19 10:45:49 2025
Summary: Security update for pam
Type: security
Severity: important
References: 1244509,CVE-2024-10220,CVE-2024-36620,CVE-2024-36621,CVE-2024-36623,CVE-2024-37820,CVE-2024-43784,CVE-2024-45719,CVE-2024-50948,CVE-2024-52003,CVE-2024-52280,CVE-2024-52282,CVE-2024-52309,CVE-2024-52529,CVE-2024-52801,CVE-2024-53259,CVE-2024-53264,CVE-2024-53858,CVE-2024-53862,CVE-2024-54131,CVE-2024-54132,CVE-2024-6156,CVE-2024-6219,CVE-2024-6538,CVE-2024-8676,CVE-2025-6020
This update for pam fixes the following issues:
- CVE-2025-6020: pam_namespace: convert functions that may operate on a user-controlled path
to operate on file descriptors instead of absolute path. And keep the
bind-mount protection from protect_mount() as a defense in depthmeasure.
(bsc#1244509)
-----------------------------------------------------------------
Advisory ID: 168
Released: Fri Jul 4 10:41:41 2025
Summary: Recommended update for elemental-operator
Type: recommended
Severity: moderate
References:
This update for elemental-operator fixes the following issues:
- [v1.7.x] Label Templates: improve Random family processing
- Dockerfile: bump golang container to 1.24
- operator: update RBAC for upgrade plans
-----------------------------------------------------------------
Advisory ID: 170
Released: Fri Jul 4 16:31:25 2025
Summary: Recommended update for gptfdisk
Type: recommended
Severity: important
References: 1242987
This update for gptfdisk fixes the following issues:
- Fix boot failure with qcow and vmdk images (bsc#1242987)
The following package changes have been done:
- boost-license1_84_0-1.84.0-slfo.1.1_1.4 updated
- btrfsprogs-udev-rules-6.8.1-slfo.1.1_1.2 updated
- compat-usrmerge-tools-84.87-slfo.1.1_1.5 updated
- crypto-policies-20230920.570ea89-slfo.1.1_1.2 updated
- elemental-httpfy-1.7.3-slfo.1.1_1.1 updated
- elemental-seedimage-hooks-1.7.3-slfo.1.1_1.1 updated
- libsemanage-conf-3.5-slfo.1.1_1.3 updated
- libssh-config-0.10.6-slfo.1.1_1.3 updated
- pkgconf-m4-1.8.0-slfo.1.1_1.5 updated
- system-user-root-20190513-slfo.1.1_1.2 updated
- filesystem-84.87-slfo.1.1_1.2 updated
- glibc-2.38-slfo.1.1_4.1 updated
- libzstd1-1.5.5-slfo.1.1_1.4 updated
- libz1-1.2.13-slfo.1.1_1.3 updated
- libxxhash0-0.8.1-slfo.1.1_2.1 updated
- libverto1-0.3.2-slfo.1.1_1.2 updated
- libuuid1-2.40.4-slfo.1.1_1.1 updated
- liburcu8-0.14.0-slfo.1.1_1.3 updated
- libunistring5-1.1-slfo.1.1_1.2 updated
- libtextstyle0-0.21.1-slfo.1.1_2.1 updated
- libtasn1-6-4.19.0-slfo.1.1_2.1 updated
- libsmartcols1-2.40.4-slfo.1.1_1.1 updated
- libsepol2-3.5-slfo.1.1_1.3 updated
- libseccomp2-2.5.4-slfo.1.1_1.4 updated
- libsasl2-3-2.1.28-slfo.1.1_1.2 updated
- libpopt0-1.19-slfo.1.1_1.3 updated
- libpkgconf3-1.8.0-slfo.1.1_1.5 updated
- libpcre2-8-0-10.42-slfo.1.1_1.4 updated
- libparted-fs-resize0-3.5-slfo.1.1_1.2 updated
- libnss_usrfiles2-2.27-slfo.1.1_1.3 updated
- libnghttp2-14-1.52.0-slfo.1.1_1.4 updated
- liblzo2-2-2.10-slfo.1.1_1.3 updated
- liblzma5-5.4.3-slfo.1.1_1.4 updated
- liblz4-1-1.9.4-slfo.1.1_1.2 updated
- liblua5_4-5-5.4.6-slfo.1.1_1.3 updated
- libkeyutils1-1.6.3-slfo.1.1_1.3 updated
- libjson-c5-0.16-slfo.1.1_1.2 updated
- libjitterentropy3-3.4.1-slfo.1.1_1.3 updated
- libip4tc2-1.8.9-slfo.1.1_2.1 updated
- libgpg-error0-1.47-slfo.1.1_1.3 updated
- libgmp10-6.3.0-slfo.1.1_1.5 updated
- libgcc_s1-14.2.0+git10526-slfo.1.1_2.1 updated
- libfuse2-2.9.9-slfo.1.1_1.2 updated
- libffi8-3.4.6-slfo.1.1_1.4 updated
- libexpat1-2.7.1-slfo.1.1_1.1 updated
- libeconf0-0.7.2-slfo.1.1_1.3 updated
- libcrypt1-4.4.36-slfo.1.1_1.4 updated
- libcom_err2-1.47.0-slfo.1.1_1.2 updated
- libcap2-2.69-slfo.1.1_1.3 updated
- libcap-ng0-0.8.3-slfo.1.1_1.4 updated
- libbz2-1-1.0.8-slfo.1.1_1.4 updated
- libburn4-1.5.4-slfo.1.1_1.2 updated
- libbtrfsutil1-6.8.1-slfo.1.1_1.2 updated
- libbtrfs0-6.8.1-slfo.1.1_1.2 updated
- libbrotlicommon1-1.1.0-slfo.1.1_1.3 updated
- libaudit1-3.1.1-slfo.1.1_1.3 updated
- libattr1-2.5.1-slfo.1.1_1.3 updated
- libargon2-1-20190702-slfo.1.1_1.2 updated
- libalternatives1-1.2+30.a5431e9-slfo.1.1_1.3 updated
- libaio1-0.3.113-slfo.1.1_1.2 updated
- libacl1-2.3.1-slfo.1.1_1.3 updated
- fillup-1.42-slfo.1.1_2.2 updated
- dosfstools-4.2-slfo.1.1_1.2 updated
- diffutils-3.10-slfo.1.1_1.3 updated
- libpng16-16-1.6.43-slfo.1.1_1.2 updated
- libidn2-0-2.3.4-slfo.1.1_1.2 updated
- pkgconf-1.8.0-slfo.1.1_1.5 updated
- libselinux1-3.5-slfo.1.1_1.3 updated
- netcfg-11.6-slfo.1.1_1.2 updated
- libxml2-2-2.11.6-slfo.1.1_5.1 updated
- squashfs-4.6.1-slfo.1.1_1.2 updated
- libgcrypt20-1.10.3-slfo.1.1_1.10 updated
- libstdc++6-14.2.0+git10526-slfo.1.1_2.1 updated
- libp11-kit0-0.25.3-slfo.1.1_1.2 updated
- libblkid1-2.40.4-slfo.1.1_1.1 updated
- perl-base-5.38.2-slfo.1.1_1.4 updated
- libext2fs2-1.47.0-slfo.1.1_1.2 updated
- libudev1-254.25-slfo.1.1_1.1 updated
- chkstat-1600_20240206-slfo.1.1_1.5 updated
- libzio1-1.08-slfo.1.1_1.3 updated
- libjte2-1.22-slfo.1.1_1.2 updated
- libbrotlidec1-1.1.0-slfo.1.1_1.3 updated
- alts-1.2+30.a5431e9-slfo.1.1_1.3 updated
- libpsl5-0.21.2-slfo.1.1_1.2 updated
- sed-4.9-slfo.1.1_1.2 updated
- libsubid4-4.15.1-slfo.1.1_1.3 updated
- libsemanage2-3.5-slfo.1.1_1.3 updated
- findutils-4.9.0-slfo.1.1_2.1 updated
- libsystemd0-254.25-slfo.1.1_1.1 updated
- libncurses6-6.4.20240224-slfo.1.1_1.5 updated
- terminfo-base-6.4.20240224-slfo.1.1_1.5 updated
- libinih0-56-slfo.1.1_1.3 updated
- libboost_thread1_84_0-1.84.0-slfo.1.1_1.4 updated
- p11-kit-0.25.3-slfo.1.1_1.2 updated
- p11-kit-tools-0.25.3-slfo.1.1_1.2 updated
- libmount1-2.40.4-slfo.1.1_1.1 updated
- libfdisk1-2.40.4-slfo.1.1_1.1 updated
- libisofs6-1.5.4-slfo.1.1_1.2 updated
- libfreetype6-2.13.3-slfo.1.1_1.1 updated
- ncurses-utils-6.4.20240224-slfo.1.1_1.5 updated
- libreadline8-8.2-slfo.1.1_1.4 updated
- libedit0-20210910.3.1-slfo.1.1_1.3 updated
- gptfdisk-1.0.9-slfo.1.1_2.1 updated
- libisoburn1-1.5.4-slfo.1.1_1.2 updated
- bash-5.2.15-slfo.1.1_1.6 updated
- bash-sh-5.2.15-slfo.1.1_1.6 updated
- xz-5.4.3-slfo.1.1_1.4 updated
- systemd-default-settings-branding-openSUSE-0.7-slfo.1.1_1.2 updated
- systemd-default-settings-0.7-slfo.1.1_1.2 updated
- pkgconf-pkg-config-1.8.0-slfo.1.1_1.5 updated
- login_defs-4.15.1-slfo.1.1_1.3 updated
- libdevmapper1_03-2.03.22_1.02.196-slfo.1.1_1.3 updated
- gzip-1.13-slfo.1.1_2.4 updated
- grep-3.11-slfo.1.1_1.2 updated
- gettext-runtime-0.21.1-slfo.1.1_2.1 updated
- coreutils-9.4-slfo.1.1_1.4 updated
- ALP-dummy-release-0.1-slfo.1.1_1.5 updated
- libparted2-3.5-slfo.1.1_1.2 updated
- libdevmapper-event1_03-2.03.22_1.02.196-slfo.1.1_1.3 updated
- info-7.0.3-slfo.1.1_1.3 updated
- xfsprogs-6.5.0-slfo.1.1_1.2 updated
- thin-provisioning-tools-0.9.0-slfo.1.1_1.4 updated
- systemd-rpm-macros-24-slfo.1.1_1.2 updated
- systemd-presets-common-SUSE-15-slfo.1.1_1.2 updated
- rpm-config-SUSE-20240214-slfo.1.1_1.2 updated
- rpm-4.18.0-slfo.1.1_1.5 updated
- permissions-config-1600_20240206-slfo.1.1_1.5 updated
- glibc-locale-base-2.38-slfo.1.1_4.1 updated
- e2fsprogs-1.47.0-slfo.1.1_1.2 updated
- ca-certificates-2+git20240805.fd24d50-slfo.1.1_1.2 updated
- ca-certificates-mozilla-2.74-slfo.1.1_1.1 updated
- btrfsprogs-6.8.1-slfo.1.1_1.2 updated
- parted-3.5-slfo.1.1_1.2 updated
- liblvm2cmd2_03-2.03.22-slfo.1.1_1.3 updated
- xorriso-1.5.4-slfo.1.1_1.2 updated
- device-mapper-2.03.22_1.02.196-slfo.1.1_1.3 updated
- systemd-presets-branding-ALP-transactional-20230214-slfo.1.1_1.2 updated
- permissions-1600_20240206-slfo.1.1_1.5 updated
- mtools-4.0.43-slfo.1.1_1.2 updated
- libopenssl3-3.1.4-slfo.1.1_5.1 updated
- pam-1.6.1-slfo.1.1_3.1 updated
- grub2-2.12-slfo.1.1_1.17 updated
- grub2-i386-pc-2.12-slfo.1.1_1.17 updated
- suse-module-tools-16.0.43-slfo.1.1_1.2 updated
- kmod-32-slfo.1.1_1.2 updated
- rsync-3.3.0-slfo.1.1_3.1 updated
- libldap2-2.6.4-slfo.1.1_1.2 updated
- libkmod2-32-slfo.1.1_1.2 updated
- libcryptsetup12-2.6.1-slfo.1.1_1.2 updated
- krb5-1.21.3-slfo.1.1_2.1 updated
- util-linux-2.40.4-slfo.1.1_1.1 updated
- shadow-4.15.1-slfo.1.1_1.3 updated
- pam-config-2.11+git.20240906-slfo.1.1_1.2 updated
- kbd-2.6.4-slfo.1.1_1.3 updated
- libssh4-0.10.6-slfo.1.1_1.3 updated
- libsnapper7-0.11.2-slfo.1.1_1.2 updated
- aaa_base-84.87+git20240906.742565b-slfo.1.1_1.2 updated
- libcurl4-8.12.1-slfo.1.1_1.1 updated
- dbus-1-daemon-1.14.10-slfo.1.1_1.2 updated
- curl-8.12.1-slfo.1.1_1.1 updated
- dbus-1-tools-1.14.10-slfo.1.1_1.2 updated
- systemd-254.25-slfo.1.1_1.1 updated
- sysuser-shadow-3.1-slfo.1.1_1.2 updated
- dbus-1-common-1.14.10-slfo.1.1_1.2 updated
- libdbus-1-3-1.14.10-slfo.1.1_1.2 updated
- dbus-1-1.14.10-slfo.1.1_1.2 updated
- system-group-kvm-20170617-slfo.1.1_1.2 updated
- system-group-hardware-20170617-slfo.1.1_1.2 updated
- udev-254.25-slfo.1.1_1.1 updated
- snapper-0.11.2-slfo.1.1_1.2 updated
- lvm2-2.03.22-slfo.1.1_1.3 updated
- elemental-toolkit-2.2.3-slfo.1.1_1.1 updated
- container:suse-toolbox-image-1.0.0-4.50 updated
- file-magic-5.44-4.151 removed
- kbd-legacy-2.6.4-1.3 removed
- libmagic1-5.44-4.151 removed
More information about the sle-container-updates
mailing list