SUSE-CU-2025:6850-1: Security update of rancher/seedimage-builder

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Tue Sep 16 14:55:16 UTC 2025


SUSE Container Update Advisory: rancher/seedimage-builder
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:6850-1
Container Tags        : rancher/seedimage-builder:1.7.3 , rancher/seedimage-builder:1.7.3-3.11 , rancher/seedimage-builder:latest
Container Release     : 3.11
Severity              : important
Type                  : security
References            : 1216091 1218459 1219458 1219724 1220262 1221107 1223880 1223947
                        1227052 1228216 1229069 1229272 1230007 1230262 1230596 1231284
                        1232526 1233785 1234027 1234820 1235147 1235849 1236217 1236270
                        1236507 1236801 1236839 1237442 1237641 1238491 1239566 1239938
                        1240414 1240788 1241052 1241083 1241549 1242827 1243226 1243397
                        1243706 1243767 1243933 1243935 1243991 1244050 1244079 1244554
                        1244555 1244557 1244580 1244700 1245309 1245310 1245311 1245312
                        1245314 1245317 1246197 1246296 1247074 CVE-2022-47930 CVE-2023-31315
                        CVE-2023-45288 CVE-2023-50782 CVE-2024-10846 CVE-2024-11218 CVE-2024-11218
                        CVE-2024-11498 CVE-2024-11741 CVE-2024-13484 CVE-2024-2236 CVE-2024-2410
                        CVE-2024-24806 CVE-2024-34062 CVE-2024-35177 CVE-2024-36402 CVE-2024-36403
                        CVE-2024-3727 CVE-2024-40896 CVE-2024-45336 CVE-2024-45337 CVE-2024-45339
                        CVE-2024-45340 CVE-2024-45341 CVE-2024-47770 CVE-2024-50354 CVE-2024-51491
                        CVE-2024-52281 CVE-2024-52594 CVE-2024-52602 CVE-2024-52791 CVE-2024-53263
                        CVE-2024-5594 CVE-2024-56138 CVE-2024-56323 CVE-2024-56406 CVE-2024-56515
                        CVE-2024-6104 CVE-2024-8508 CVE-2024-9312 CVE-2024-9313 CVE-2024-9407
                        CVE-2025-0377 CVE-2025-0750 CVE-2025-20033 CVE-2025-20086 CVE-2025-20088
                        CVE-2025-20621 CVE-2025-21088 CVE-2025-22149 CVE-2025-22445 CVE-2025-22449
                        CVE-2025-22865 CVE-2025-22866 CVE-2025-22866 CVE-2025-22867 CVE-2025-22867
                        CVE-2025-22868 CVE-2025-22869 CVE-2025-23028 CVE-2025-23047 CVE-2025-23208
                        CVE-2025-23216 CVE-2025-24030 CVE-2025-24337 CVE-2025-24354 CVE-2025-24355
                        CVE-2025-24366 CVE-2025-24369 CVE-2025-24371 CVE-2025-24376 CVE-2025-24784
                        CVE-2025-24786 CVE-2025-24787 CVE-2025-24883 CVE-2025-24884 CVE-2025-27144
                        CVE-2025-31115 CVE-2025-40909 CVE-2025-4598 CVE-2025-4877 CVE-2025-4878
                        CVE-2025-4947 CVE-2025-49794 CVE-2025-49795 CVE-2025-49796 CVE-2025-5025
                        CVE-2025-5278 CVE-2025-5318 CVE-2025-5351 CVE-2025-5372 CVE-2025-5399
                        CVE-2025-5987 CVE-2025-6018 CVE-2025-6021 CVE-2025-6170 CVE-2025-7425
-----------------------------------------------------------------

The container rancher/seedimage-builder was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: 187
Released:    Fri Jul 18 11:07:15 2025
Summary:     Recommended update for rpm
Type:        recommended
Severity:    important
References:  1216091,1218459,1235849,1241052
This update for rpm fixes the following issues:

- fix --runposttrans not working correctly with the --root
  option [bsc#1216091]
  * added 'rpm_fixed_runposttrans' provides for libzypp

- print scriptlet messages in --runposttrans
  * needed to fix leaking tmp files [bsc#1218459]

- fix memory leak in str2locale [bsc#1241052]


-----------------------------------------------------------------
Advisory ID: 191
Released:    Mon Jul 28 16:35:09 2025
Summary:     Security update for perl
Type:        security
Severity:    important
References:  1233785,1241083,1244079,CVE-2024-11498,CVE-2024-56406,CVE-2025-40909
This update for perl fixes the following issues:

- CVE-2024-56406: Fixed heap buffer overflow when transliterating 
  non-ASCII bytes (bsc#1241083)
- CVE-2025-40909: Fixed a working directory race condition causing
  file operations to target unintended paths (bsc#1244079)

-----------------------------------------------------------------
Advisory ID: 192
Released:    Mon Jul 28 16:36:18 2025
Summary:     Security update for pam-config
Type:        security
Severity:    important
References:  1223880,1243226,CVE-2024-34062,CVE-2025-6018
This update for pam-config fixes the following issues:

- CVE-2025-6018: Stop adding pam_env in AUTH stack, and be sure to put
  this module at the really end of the SESSION stack.  (bsc#1243226)

-----------------------------------------------------------------
Advisory ID: 197
Released:    Thu Jul 31 13:53:17 2025
Summary:     Recommended update for gcc14
Type:        recommended
Severity:    moderate
References:  1230262,1232526,1234820,1237442,1238491,1239566,1239938,1240788,1241549,1243991,1244050,CVE-2024-40896
This update for gcc14 fixes the following issues:

- Exclude shared objects present for link editing in the GCC specific
  subdirectory from provides processing via __provides_exclude_from.
  [bsc#1244050][bsc#1243991]
- Update to GCC 14.3 release, bb24b4c804f3d95b0ba95b7496, git11799
- Update to gcc-14 branch head, 3418d740b344e0ba38022f3be, git11702
- Fix build on s390x [bsc#1241549]
- Make sure link editing is done against our own shared library
  copy rather than the installed system runtime.  [bsc#1240788]
- cross-compiler builds with --enable-host-pie.
- Allow GCC executables to be built PIE.  [bsc#1239938]
- Backport -msplit-patch-nops required for user-space livepatching on powerpc.
- Also record -D_FORTIFY_SOURCE=2 in the DWARF debug info DW_AT_producer string.  [bsc#1239566]
- Disable profiling during build when %want_reproducible_builds is set
  [bsc#1238491]
- Update to gcc-14 branch head, 9ffecde121af883b60bbe60d0, git11321
  * fixes reported ICE in [bsc#1237442]
- Adjust cross compiler requirements to use %requires_ge
- Fix condition on whether to enable plugins or JIT support to
  not check sle_version which is not defined in SLFO but to check
  is_opensuse and suse_version instead.
- For cross compilers require the same or newer binutils, newlib
  or cross-glibc that was used at build time.  [bsc#1232526]
- Update to gcc-14 branch head, 4af44f2cf7d281f3e4f3957ef, git10750
  * includes libstdc++6 fix for parsing tzdata 2024b [gcc#116657]
- Fix ICE with LTO building openvino on aarch64 [bsc#1230262]

-----------------------------------------------------------------
Advisory ID: 196
Released:    Thu Jul 31 14:00:30 2025
Summary:     Security update for libgcrypt
Type:        security
Severity:    moderate
References:  1221107,1235147,CVE-2024-2236,CVE-2024-5594
This update for libgcrypt fixes the following issues:

- CVE-2024-2236: Fixed timing based side-channel in RSA implementation (bsc#1221107)

-----------------------------------------------------------------
Advisory ID: 206
Released:    Fri Aug  8 12:26:24 2025
Summary:     Security update for xz
Type:        security
Severity:    important
References:  1219724,1240414,CVE-2024-24806,CVE-2025-31115
This update for xz fixes the following issues:

- CVE-2025-31115: Fixed heap use after free and writing to an address based on the null pointer plus an offset (bsc#1240414)

-----------------------------------------------------------------
Advisory ID: 215
Released:    Thu Aug 14 12:12:18 2025
Summary:     Security update for openssl-3
Type:        security
Severity:    moderate
References:  1220262,1236217,1236801,1236839,CVE-2023-50782,CVE-2025-22866,CVE-2025-22867
This update for openssl-3 fixes the following issues:

- CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)

-----------------------------------------------------------------
Advisory ID: 213
Released:    Thu Aug 14 12:19:26 2025
Summary:     Security update for libssh
Type:        security
Severity:    important
References:  1231284,1245309,1245310,1245311,1245312,1245314,1245317,CVE-2024-8508,CVE-2025-4877,CVE-2025-4878,CVE-2025-5318,CVE-2025-5351,CVE-2025-5372,CVE-2025-5987
This update for libssh fixes the following issues:

- CVE-2025-5372: ssh_kdf() returns a success code on certain failures (bsc#1245314)
- CVE-2025-5987: Invalid return code for chacha20 poly1305 with OpenSSL backend (bsc#1245317)
- CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions (bsc#1245309)
- CVE-2025-4878: Use of uninitialized variable in privatekey_from_file() (bsc#1245310)
- CVE-2025-5318: Likely read beyond bounds in sftp server handle management (bsc#1245311)
- CVE-2025-5351: Double free in functions exporting keys (bsc#1245312)


-----------------------------------------------------------------
Advisory ID: 218
Released:    Sat Aug 16 13:46:56 2025
Summary:     Security update for systemd
Type:        security
Severity:    moderate
References:  1219458,1229069,1229272,1230007,1230596,1234027,1242827,1243935,1247074,CVE-2023-31315,CVE-2025-4598
This update for systemd fixes the following issues:

- Remove the script used to help migrating the language and locale settings
  located in /etc/sysconfig/language on old systems to the systemd default
  locations (bsc#1247074)

  The script was introduced more than 7 years ago and all systems running TW
  should have been migrated since then. Moreover the installer supports the
  systemd default locations since approximately SLE15. 

- triggers.systemd: skip update of hwdb, journal-catalog if executed during an
  offline update.

- logs-show: get timestamp and boot ID only when necessary (bsc#1242827)
- sd-journal: drop to use Hashmap to manage journal files per boot ID
- tree-wide: set SD_JOURNAL_ASSUME_IMMUTABLE where appropriate
- sd-journal: introduce SD_JOURNAL_ASSUME_IMMUTABLE flag
- sd-journal: make journal_file_read_tail_timestamp() notify to the caller that some new journal entries added
- sd-journal: cache last entry offset and journal file state
- sd-journal: fix typo in function name

- coredump: use %d in kernel core pattern (bsc#1243935 CVE-2025-4598)

-----------------------------------------------------------------
Advisory ID: 227
Released:    Fri Aug 22 14:33:27 2025
Summary:     Recommended update for elemental-toolkit
Type:        recommended
Severity:    moderate
References:  1228216
This update for elemental-toolkit fixes the following issues:

- Update to v2.2.4:
    * Avoid panic when MaxSnaps is set to 0

-----------------------------------------------------------------
Advisory ID: 236
Released:    Wed Aug 27 11:46:23 2025
Summary:     Security update for libxml2
Type:        security
Severity:    important
References:  1244554,1244555,1244557,1244580,1244700,1246296,CVE-2022-47930,CVE-2024-10846,CVE-2024-11218,CVE-2024-11741,CVE-2024-13484,CVE-2024-35177,CVE-2024-36402,CVE-2024-36403,CVE-2024-3727,CVE-2024-45336,CVE-2024-45337,CVE-2024-45339,CVE-2024-45340,CVE-2024-45341,CVE-2024-47770,CVE-2024-50354,CVE-2024-51491,CVE-2024-52281,CVE-2024-52594,CVE-2024-52602,CVE-2024-52791,CVE-2024-53263,CVE-2024-56138,CVE-2024-56323,CVE-2024-56515,CVE-2024-9312,CVE-2024-9313,CVE-2025-0377,CVE-2025-0750,CVE-2025-20033,CVE-2025-20086,CVE-2025-20088,CVE-2025-20621,CVE-2025-21088,CVE-2025-22149,CVE-2025-22445,CVE-2025-22449,CVE-2025-22865,CVE-2025-22866,CVE-2025-22867,CVE-2025-22868,CVE-2025-22869,CVE-2025-23028,CVE-2025-23047,CVE-2025-23208,CVE-2025-23216,CVE-2025-24030,CVE-2025-24337,CVE-2025-24354,CVE-2025-24355,CVE-2025-24366,CVE-2025-24369,CVE-2025-24371,CVE-2025-24376,CVE-2025-24784,CVE-2025-24786,CVE-2025-24787,CVE-2025-24883,CVE-2025-24884,CVE-2025-49794,CVE-2025-49795,CVE-2025-49796,CVE-2025-602
 1,CVE-2025-6170,CVE-2025-7425
This update for libxml2 fixes the following issues:

- CVE-2025-6021: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 [bsc#1244580]
- CVE-2025-6170: stack buffer overflow may lead to a crash [bsc#1244700]
- CVE-2025-7425: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr [bsc#1246296]
- CVE-2025-49794: heap use after free (UAF) can lead to Denial of service (DoS) [bsc#1244554]
- CVE-2025-49795: null pointer dereference may lead to Denial of service (DoS) [bsc#1244555]
- CVE-2025-49796: type confusion may lead to Denial of service (DoS) [bsc#1244557]

-----------------------------------------------------------------
Advisory ID: 238
Released:    Thu Aug 28 17:15:06 2025
Summary:     Security update for coreutils
Type:        security
Severity:    moderate
References:  1227052,1236270,1236507,1237641,1243767,CVE-2023-45288,CVE-2024-11218,CVE-2024-6104,CVE-2024-9407,CVE-2025-27144,CVE-2025-5278
This update for coreutils fixes the following issues:

- CVE-2025-5278: Sort with key character offsets of SIZE_MAX, could induce a read of 1 byte before an allocated heap buffer (bsc#1243767).

-----------------------------------------------------------------
Advisory ID: 254
Released:    Tue Sep  9 12:22:04 2025
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1223947,1243397,1243706,1243933,1246197,CVE-2024-2410,CVE-2025-4947,CVE-2025-5025,CVE-2025-5399
This update for curl fixes the following issues:

- CVE-2025-5399: libcurl can possibly get trapped in an endless busy-loop when processing specially crafted packets (bsc#1243933).
- CVE-2025-5025: No QUIC certificate pinning with wolfSSL (bsc#1243706).
- CVE-2025-4947: QUIC certificate check skip with wolfSSL (bsc#1243397).

Other bugfixes:

- Fix the --ftp-pasv option in curl v8.14.1 (bsc#1246197).


The following package changes have been done:

- boost-license1_84_0-1.84.0-slfo.1.1_1.4 updated
- btrfsprogs-udev-rules-6.8.1-slfo.1.1_1.2 updated
- compat-usrmerge-tools-84.87-slfo.1.1_1.5 updated
- crypto-policies-20230920.570ea89-slfo.1.1_1.2 updated
- elemental-httpfy-1.7.3-slfo.1.1_1.1 updated
- elemental-seedimage-hooks-1.7.3-slfo.1.1_1.1 updated
- libsemanage-conf-3.5-slfo.1.1_1.3 updated
- libssh-config-0.10.6-slfo.1.1_2.1 updated
- pkgconf-m4-1.8.0-slfo.1.1_1.5 updated
- system-user-root-20190513-slfo.1.1_1.2 updated
- filesystem-84.87-slfo.1.1_1.2 updated
- glibc-2.38-slfo.1.1_4.1 updated
- libzstd1-1.5.5-slfo.1.1_1.4 updated
- libz1-1.2.13-slfo.1.1_1.3 updated
- libxxhash0-0.8.1-slfo.1.1_2.1 updated
- libverto1-0.3.2-slfo.1.1_1.2 updated
- libuuid1-2.40.4-slfo.1.1_1.1 updated
- liburcu8-0.14.0-slfo.1.1_1.3 updated
- libunistring5-1.1-slfo.1.1_1.2 updated
- libtextstyle0-0.21.1-slfo.1.1_2.1 updated
- libtasn1-6-4.19.0-slfo.1.1_2.1 updated
- libsmartcols1-2.40.4-slfo.1.1_1.1 updated
- libsepol2-3.5-slfo.1.1_1.3 updated
- libseccomp2-2.5.4-slfo.1.1_1.4 updated
- libsasl2-3-2.1.28-slfo.1.1_1.2 updated
- libpopt0-1.19-slfo.1.1_1.3 updated
- libpkgconf3-1.8.0-slfo.1.1_1.5 updated
- libpcre2-8-0-10.42-slfo.1.1_1.4 updated
- libparted-fs-resize0-3.5-slfo.1.1_1.2 updated
- libnss_usrfiles2-2.27-slfo.1.1_1.3 updated
- libnghttp2-14-1.52.0-slfo.1.1_1.4 updated
- liblzo2-2-2.10-slfo.1.1_1.3 updated
- liblzma5-5.4.3-slfo.1.1_2.1 updated
- liblz4-1-1.9.4-slfo.1.1_1.2 updated
- liblua5_4-5-5.4.6-slfo.1.1_1.3 updated
- libkeyutils1-1.6.3-slfo.1.1_1.3 updated
- libjson-c5-0.16-slfo.1.1_1.2 updated
- libjitterentropy3-3.4.1-slfo.1.1_1.3 updated
- libip4tc2-1.8.9-slfo.1.1_2.1 updated
- libgpg-error0-1.47-slfo.1.1_1.3 updated
- libgmp10-6.3.0-slfo.1.1_1.5 updated
- libgcc_s1-14.3.0+git11799-slfo.1.1_1.1 updated
- libfuse2-2.9.9-slfo.1.1_1.2 updated
- libffi8-3.4.6-slfo.1.1_1.4 updated
- libexpat1-2.7.1-slfo.1.1_1.1 updated
- libeconf0-0.7.2-slfo.1.1_1.3 updated
- libcrypt1-4.4.36-slfo.1.1_1.4 updated
- libcom_err2-1.47.0-slfo.1.1_1.2 updated
- libcap2-2.69-slfo.1.1_1.3 updated
- libcap-ng0-0.8.3-slfo.1.1_1.4 updated
- libbz2-1-1.0.8-slfo.1.1_1.4 updated
- libburn4-1.5.4-slfo.1.1_1.2 updated
- libbtrfsutil1-6.8.1-slfo.1.1_1.2 updated
- libbtrfs0-6.8.1-slfo.1.1_1.2 updated
- libbrotlicommon1-1.1.0-slfo.1.1_1.3 updated
- libaudit1-3.1.1-slfo.1.1_1.3 updated
- libattr1-2.5.1-slfo.1.1_1.3 updated
- libargon2-1-20190702-slfo.1.1_1.2 updated
- libalternatives1-1.2+30.a5431e9-slfo.1.1_1.3 updated
- libaio1-0.3.113-slfo.1.1_1.2 updated
- libacl1-2.3.1-slfo.1.1_1.3 updated
- fillup-1.42-slfo.1.1_2.2 updated
- dosfstools-4.2-slfo.1.1_1.2 updated
- diffutils-3.10-slfo.1.1_1.3 updated
- libpng16-16-1.6.43-slfo.1.1_1.2 updated
- libidn2-0-2.3.4-slfo.1.1_1.2 updated
- pkgconf-1.8.0-slfo.1.1_1.5 updated
- libselinux1-3.5-slfo.1.1_1.3 updated
- netcfg-11.6-slfo.1.1_1.2 updated
- libxml2-2-2.11.6-slfo.1.1_6.1 updated
- squashfs-4.6.1-slfo.1.1_1.2 updated
- libgcrypt20-1.10.3-slfo.1.1_2.1 updated
- libstdc++6-14.3.0+git11799-slfo.1.1_1.1 updated
- libp11-kit0-0.25.3-slfo.1.1_1.2 updated
- libblkid1-2.40.4-slfo.1.1_1.1 updated
- perl-base-5.38.2-slfo.1.1_2.1 updated
- libext2fs2-1.47.0-slfo.1.1_1.2 updated
- libudev1-254.27-slfo.1.1_1.1 updated
- chkstat-1600_20240206-slfo.1.1_1.5 updated
- libzio1-1.08-slfo.1.1_1.3 updated
- libjte2-1.22-slfo.1.1_1.2 updated
- libbrotlidec1-1.1.0-slfo.1.1_1.3 updated
- alts-1.2+30.a5431e9-slfo.1.1_1.3 updated
- libpsl5-0.21.2-slfo.1.1_1.2 updated
- sed-4.9-slfo.1.1_1.2 updated
- libsubid4-4.15.1-slfo.1.1_1.3 updated
- libsemanage2-3.5-slfo.1.1_1.3 updated
- findutils-4.9.0-slfo.1.1_2.1 updated
- libsystemd0-254.27-slfo.1.1_1.1 updated
- libncurses6-6.4.20240224-slfo.1.1_1.5 updated
- terminfo-base-6.4.20240224-slfo.1.1_1.5 updated
- libinih0-56-slfo.1.1_1.3 updated
- libboost_thread1_84_0-1.84.0-slfo.1.1_1.4 updated
- p11-kit-0.25.3-slfo.1.1_1.2 updated
- p11-kit-tools-0.25.3-slfo.1.1_1.2 updated
- libmount1-2.40.4-slfo.1.1_1.1 updated
- libfdisk1-2.40.4-slfo.1.1_1.1 updated
- libisofs6-1.5.4-slfo.1.1_1.2 updated
- libfreetype6-2.13.3-slfo.1.1_1.1 updated
- ncurses-utils-6.4.20240224-slfo.1.1_1.5 updated
- libreadline8-8.2-slfo.1.1_1.4 updated
- libedit0-20210910.3.1-slfo.1.1_1.3 updated
- gptfdisk-1.0.9-slfo.1.1_2.1 updated
- libisoburn1-1.5.4-slfo.1.1_1.2 updated
- bash-5.2.15-slfo.1.1_1.6 updated
- bash-sh-5.2.15-slfo.1.1_1.6 updated
- xz-5.4.3-slfo.1.1_2.1 updated
- systemd-default-settings-branding-openSUSE-0.7-slfo.1.1_1.2 updated
- systemd-default-settings-0.7-slfo.1.1_1.2 updated
- pkgconf-pkg-config-1.8.0-slfo.1.1_1.5 updated
- login_defs-4.15.1-slfo.1.1_1.3 updated
- libdevmapper1_03-2.03.22_1.02.196-slfo.1.1_1.3 updated
- gzip-1.13-slfo.1.1_2.4 updated
- grep-3.11-slfo.1.1_1.2 updated
- gettext-runtime-0.21.1-slfo.1.1_2.1 updated
- coreutils-9.4-slfo.1.1_2.1 updated
- ALP-dummy-release-0.1-slfo.1.1_1.5 updated
- libparted2-3.5-slfo.1.1_1.2 updated
- libdevmapper-event1_03-2.03.22_1.02.196-slfo.1.1_1.3 updated
- info-7.0.3-slfo.1.1_1.3 updated
- xfsprogs-6.5.0-slfo.1.1_1.2 updated
- thin-provisioning-tools-0.9.0-slfo.1.1_1.4 updated
- systemd-rpm-macros-24-slfo.1.1_1.2 updated
- systemd-presets-common-SUSE-15-slfo.1.1_1.2 updated
- rpm-config-SUSE-20240214-slfo.1.1_1.2 updated
- rpm-4.18.0-slfo.1.1_2.1 updated
- permissions-config-1600_20240206-slfo.1.1_1.5 updated
- glibc-locale-base-2.38-slfo.1.1_4.1 updated
- e2fsprogs-1.47.0-slfo.1.1_1.2 updated
- ca-certificates-2+git20240805.fd24d50-slfo.1.1_1.2 updated
- ca-certificates-mozilla-2.74-slfo.1.1_1.1 updated
- btrfsprogs-6.8.1-slfo.1.1_1.2 updated
- parted-3.5-slfo.1.1_1.2 updated
- liblvm2cmd2_03-2.03.22-slfo.1.1_1.3 updated
- xorriso-1.5.4-slfo.1.1_1.2 updated
- device-mapper-2.03.22_1.02.196-slfo.1.1_1.3 updated
- systemd-presets-branding-ALP-transactional-20230214-slfo.1.1_1.2 updated
- permissions-1600_20240206-slfo.1.1_1.5 updated
- mtools-4.0.43-slfo.1.1_1.2 updated
- libopenssl3-3.1.4-slfo.1.1_6.1 updated
- pam-1.6.1-slfo.1.1_3.1 updated
- grub2-2.12-slfo.1.1_1.17 updated
- grub2-i386-pc-2.12-slfo.1.1_1.17 updated
- suse-module-tools-16.0.43-slfo.1.1_1.2 updated
- kmod-32-slfo.1.1_1.2 updated
- rsync-3.3.0-slfo.1.1_3.1 updated
- libldap2-2.6.4-slfo.1.1_1.2 updated
- libkmod2-32-slfo.1.1_1.2 updated
- libcryptsetup12-2.6.1-slfo.1.1_1.2 updated
- krb5-1.21.3-slfo.1.1_2.1 updated
- util-linux-2.40.4-slfo.1.1_1.1 updated
- shadow-4.15.1-slfo.1.1_1.3 updated
- pam-config-2.11+git.20240906-slfo.1.1_2.1 updated
- kbd-2.6.4-slfo.1.1_1.3 updated
- libssh4-0.10.6-slfo.1.1_2.1 updated
- libsnapper7-0.11.2-slfo.1.1_1.2 updated
- aaa_base-84.87+git20240906.742565b-slfo.1.1_1.2 updated
- libcurl4-8.14.1-slfo.1.1_1.1 updated
- dbus-1-daemon-1.14.10-slfo.1.1_1.2 updated
- curl-8.14.1-slfo.1.1_1.1 updated
- dbus-1-tools-1.14.10-slfo.1.1_1.2 updated
- systemd-254.27-slfo.1.1_1.1 updated
- sysuser-shadow-3.1-slfo.1.1_1.2 updated
- dbus-1-common-1.14.10-slfo.1.1_1.2 updated
- libdbus-1-3-1.14.10-slfo.1.1_1.2 updated
- dbus-1-1.14.10-slfo.1.1_1.2 updated
- system-group-kvm-20170617-slfo.1.1_1.2 updated
- system-group-hardware-20170617-slfo.1.1_1.2 updated
- udev-254.27-slfo.1.1_1.1 updated
- snapper-0.11.2-slfo.1.1_1.2 updated
- lvm2-2.03.22-slfo.1.1_1.3 updated
- elemental-toolkit-2.2.4-slfo.1.1_1.1 updated
- container:suse-toolbox-image-1.0.0-4.70 updated
- file-magic-5.44-4.151 removed
- kbd-legacy-2.6.4-1.3 removed
- libmagic1-5.44-4.151 removed


More information about the sle-container-updates mailing list