SUSE-IU-2026:639-1: Recommended update of suse/sl-micro/6.2/kvm-os-container
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Tue Feb 3 08:25:14 UTC 2026
SUSE Image Update Advisory: suse/sl-micro/6.2/kvm-os-container
-----------------------------------------------------------------
Image Advisory ID : SUSE-IU-2026:639-1
Image Tags : suse/sl-micro/6.2/kvm-os-container:2.3.0 , suse/sl-micro/6.2/kvm-os-container:2.3.0-7.26 , suse/sl-micro/6.2/kvm-os-container:latest
Image Release : 7.26
Severity : moderate
Type : recommended
References : 1205462 1214285 1220338 1229228 1231048 1232227 1232844 1233752
1234015 1234313 1234765 1243112 1245193 1247500 1250388 1252046
1252861 1253155 1253238 1253262 1253365 1253400 1253413 1253414
1253442 1253458 1253623 1253674 1253739 1254126 1254128 1254195
1254244 1254363 1254378 1254408 1254477 1254510 1254518 1254519
1254520 1254615 1254616 1254618 1254621 1254624 1254791 1254793
1254794 1254795 1254796 1254797 1254798 1254808 1254809 1254813
1254815 1254821 1254824 1254825 1254827 1254828 1254829 1254830
1254832 1254835 1254840 1254843 1254846 1254847 1254849 1254850
1254851 1254852 1254854 1254856 1254858 1254860 1254861 1254864
1254868 1254869 1254871 1254894 1254957 1254959 1254961 1254964
1254996 1255026 1255030 1255034 1255035 1255039 1255040 1255041
1255042 1255057 1255058 1255064 1255065 1255068 1255071 1255072
1255075 1255077 1255081 1255082 1255083 1255087 1255092 1255094
1255095 1255097 1255099 1255103 1255116 1255120 1255121 1255122
1255124 1255131 1255134 1255135 1255136 1255138 1255140 1255142
1255145 1255146 1255149 1255150 1255152 1255154 1255155 1255156
1255161 1255167 1255169 1255171 1255175 1255179 1255181 1255182
1255186 1255187 1255190 1255193 1255196 1255197 1255199 1255202
1255203 1255206 1255209 1255218 1255220 1255221 1255223 1255226
1255227 1255228 1255230 1255231 1255233 1255234 1255242 1255243
1255246 1255247 1255251 1255252 1255253 1255255 1255256 1255259
1255260 1255261 1255262 1255272 1255273 1255274 1255276 1255279
1255297 1255312 1255316 1255318 1255325 1255329 1255346 1255349
1255351 1255354 1255357 1255377 1255379 1255380 1255395 1255401
1255415 1255428 1255433 1255434 1255480 1255483 1255488 1255489
1255493 1255495 1255505 1255507 1255508 1255509 1255533 1255541
1255550 1255552 1255553 1255567 1255580 1255601 1255603 1255611
1255614 1255672 1255688 1255698 1255706 1255707 1255709 1255722
1255723 1255724 1255812 1255813 1255814 1255816 1255931 1255932
1255934 1255943 1255944 1256238 1256495 1256606 1256794 CVE-2025-38704
CVE-2025-39880 CVE-2025-39977 CVE-2025-40042 CVE-2025-40123 CVE-2025-40130
CVE-2025-40160 CVE-2025-40167 CVE-2025-40170 CVE-2025-40179 CVE-2025-40190
CVE-2025-40209 CVE-2025-40211 CVE-2025-40212 CVE-2025-40213 CVE-2025-40214
CVE-2025-40215 CVE-2025-40218 CVE-2025-40219 CVE-2025-40220 CVE-2025-40221
CVE-2025-40223 CVE-2025-40225 CVE-2025-40226 CVE-2025-40231 CVE-2025-40233
CVE-2025-40235 CVE-2025-40237 CVE-2025-40238 CVE-2025-40239 CVE-2025-40240
CVE-2025-40242 CVE-2025-40246 CVE-2025-40248 CVE-2025-40250 CVE-2025-40251
CVE-2025-40252 CVE-2025-40254 CVE-2025-40255 CVE-2025-40256 CVE-2025-40258
CVE-2025-40262 CVE-2025-40263 CVE-2025-40264 CVE-2025-40266 CVE-2025-40268
CVE-2025-40269 CVE-2025-40271 CVE-2025-40272 CVE-2025-40273 CVE-2025-40274
CVE-2025-40275 CVE-2025-40276 CVE-2025-40277 CVE-2025-40278 CVE-2025-40279
CVE-2025-40280 CVE-2025-40282 CVE-2025-40283 CVE-2025-40284 CVE-2025-40287
CVE-2025-40288 CVE-2025-40289 CVE-2025-40292 CVE-2025-40293 CVE-2025-40294
CVE-2025-40297 CVE-2025-40301 CVE-2025-40302 CVE-2025-40303 CVE-2025-40304
CVE-2025-40307 CVE-2025-40308 CVE-2025-40309 CVE-2025-40310 CVE-2025-40311
CVE-2025-40314 CVE-2025-40315 CVE-2025-40316 CVE-2025-40317 CVE-2025-40318
CVE-2025-40319 CVE-2025-40320 CVE-2025-40321 CVE-2025-40322 CVE-2025-40323
CVE-2025-40324 CVE-2025-40328 CVE-2025-40329 CVE-2025-40330 CVE-2025-40331
CVE-2025-40332 CVE-2025-40337 CVE-2025-40338 CVE-2025-40339 CVE-2025-40340
CVE-2025-40342 CVE-2025-40343 CVE-2025-40344 CVE-2025-40345 CVE-2025-40346
CVE-2025-40347 CVE-2025-40350 CVE-2025-40353 CVE-2025-40354 CVE-2025-40355
CVE-2025-40357 CVE-2025-40359 CVE-2025-40360 CVE-2025-40362 CVE-2025-68167
CVE-2025-68170 CVE-2025-68171 CVE-2025-68172 CVE-2025-68176 CVE-2025-68180
CVE-2025-68181 CVE-2025-68183 CVE-2025-68184 CVE-2025-68185 CVE-2025-68190
CVE-2025-68192 CVE-2025-68194 CVE-2025-68195 CVE-2025-68197 CVE-2025-68198
CVE-2025-68201 CVE-2025-68202 CVE-2025-68206 CVE-2025-68207 CVE-2025-68208
CVE-2025-68209 CVE-2025-68210 CVE-2025-68213 CVE-2025-68215 CVE-2025-68217
CVE-2025-68222 CVE-2025-68223 CVE-2025-68230 CVE-2025-68233 CVE-2025-68235
CVE-2025-68237 CVE-2025-68238 CVE-2025-68239 CVE-2025-68242 CVE-2025-68244
CVE-2025-68249 CVE-2025-68252 CVE-2025-68254 CVE-2025-68255 CVE-2025-68256
CVE-2025-68257 CVE-2025-68258 CVE-2025-68259 CVE-2025-68264 CVE-2025-68283
CVE-2025-68284 CVE-2025-68285 CVE-2025-68286 CVE-2025-68287 CVE-2025-68289
CVE-2025-68290 CVE-2025-68293 CVE-2025-68298 CVE-2025-68301 CVE-2025-68302
CVE-2025-68303 CVE-2025-68305 CVE-2025-68306 CVE-2025-68307 CVE-2025-68308
CVE-2025-68311 CVE-2025-68312 CVE-2025-68313 CVE-2025-68317 CVE-2025-68327
CVE-2025-68328 CVE-2025-68330 CVE-2025-68331 CVE-2025-68332 CVE-2025-68335
CVE-2025-68339 CVE-2025-68340 CVE-2025-68342 CVE-2025-68343 CVE-2025-68344
CVE-2025-68345 CVE-2025-68346 CVE-2025-68347 CVE-2025-68351 CVE-2025-68352
CVE-2025-68353 CVE-2025-68354 CVE-2025-68362 CVE-2025-68363 CVE-2025-68378
CVE-2025-68380 CVE-2025-68724 CVE-2025-68732 CVE-2025-68736 CVE-2025-68740
CVE-2025-68742 CVE-2025-68744 CVE-2025-68746 CVE-2025-68747 CVE-2025-68748
CVE-2025-68749 CVE-2025-68750 CVE-2025-68753 CVE-2025-68757 CVE-2025-68758
CVE-2025-68759 CVE-2025-68765 CVE-2025-68766 CVE-2025-71096
-----------------------------------------------------------------
The container suse/sl-micro/6.2/kvm-os-container was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: 230
Released: Tue Mar 11 11:01:13 2025
Summary: Recommended update for systemd
Type: recommended
Severity: moderate
References: 1205462,1214285,1220338,1229228,1231048,1232227,1232844,1233752,1234015,1234313,1234765,1243112,1245193,1247500,1250388,1252046,1252861,1253155,1253238,1253262,1253365,1253400,1253413,1253414,1253442,1253458,1253623,1253674,1253739,1254126,1254128,1254195,1254244,1254363,1254378,1254408,1254477,1254510,1254518,1254519,1254520,1254615,1254616,1254618,1254621,1254624,1254791,1254793,1254794,1254795,1254796,1254797,1254798,1254808,1254809,1254813,1254815,1254821,1254824,1254825,1254827,1254828,1254829,1254830,1254832,1254835,1254840,1254843,1254846,1254847,1254849,1254850,1254851,1254852,1254854,1254856,1254858,1254860,1254861,1254864,1254868,1254869,1254871,1254894,1254957,1254959,1254961,1254964,1254996,1255026,1255030,1255034,1255035,1255039,1255040,1255041,1255042,1255057,1255058,1255064,1255065,1255068,1255071,1255072,1255075,1255077,1255081,1255082,1255083,1255087,1255092,1255094,1255095,1255097,1255099,1255103,1255116,1255120,1255121,1255122,1255124,1255131,1255134,1
255135,1255136,1255138,1255140,1255142,1255145,1255146,1255149,1255150,1255152,1255154,1255155,1255156,1255161,1255167,1255169,1255171,1255175,1255179,1255181,1255182,1255186,1255187,1255190,1255193,1255196,1255197,1255199,1255202,1255203,1255206,1255209,1255218,1255220,1255221,1255223,1255226,1255227,1255228,1255230,1255231,1255233,1255234,1255242,1255243,1255246,1255247,1255251,1255252,1255253,1255255,1255256,1255259,1255260,1255261,1255262,1255272,1255273,1255274,1255276,1255279,1255297,1255312,1255316,1255318,1255325,1255329,1255346,1255349,1255351,1255354,1255357,1255377,1255379,1255380,1255395,1255401,1255415,1255428,1255433,1255434,1255480,1255483,1255488,1255489,1255493,1255495,1255505,1255507,1255508,1255509,1255533,1255541,1255550,1255552,1255553,1255567,1255580,1255601,1255603,1255611,1255614,1255672,1255688,1255698,1255706,1255707,1255709,1255722,1255723,1255724,1255812,1255813,1255814,1255816,1255931,1255932,1255934,1255943,1255944,1256238,1256495,1256606,1256794,CVE-20
25-38704,CVE-2025-39880,CVE-2025-39977,CVE-2025-40042,CVE-2025-40123,CVE-2025-40130,CVE-2025-40160,CVE-2025-40167,CVE-2025-40170,CVE-2025-40179,CVE-2025-40190,CVE-2025-40209,CVE-2025-40211,CVE-2025-40212,CVE-2025-40213,CVE-2025-40214,CVE-2025-40215,CVE-2025-40218,CVE-2025-40219,CVE-2025-40220,CVE-2025-40221,CVE-2025-40223,CVE-2025-40225,CVE-2025-40226,CVE-2025-40231,CVE-2025-40233,CVE-2025-40235,CVE-2025-40237,CVE-2025-40238,CVE-2025-40239,CVE-2025-40240,CVE-2025-40242,CVE-2025-40246,CVE-2025-40248,CVE-2025-40250,CVE-2025-40251,CVE-2025-40252,CVE-2025-40254,CVE-2025-40255,CVE-2025-40256,CVE-2025-40258,CVE-2025-40262,CVE-2025-40263,CVE-2025-40264,CVE-2025-40266,CVE-2025-40268,CVE-2025-40269,CVE-2025-40271,CVE-2025-40272,CVE-2025-40273,CVE-2025-40274,CVE-2025-40275,CVE-2025-40276,CVE-2025-40277,CVE-2025-40278,CVE-2025-40279,CVE-2025-40280,CVE-2025-40282,CVE-2025-40283,CVE-2025-40284,CVE-2025-40287,CVE-2025-40288,CVE-2025-40289,CVE-2025-40292,CVE-2025-40293,CVE-2025-40294,CVE-2025-4029
7,CVE-2025-40301,CVE-2025-40302,CVE-2025-40303,CVE-2025-40304,CVE-2025-40307,CVE-2025-40308,CVE-2025-40309,CVE-2025-40310,CVE-2025-40311,CVE-2025-40314,CVE-2025-40315,CVE-2025-40316,CVE-2025-40317,CVE-2025-40318,CVE-2025-40319,CVE-2025-40320,CVE-2025-40321,CVE-2025-40322,CVE-2025-40323,CVE-2025-40324,CVE-2025-40328,CVE-2025-40329,CVE-2025-40330,CVE-2025-40331,CVE-2025-40332,CVE-2025-40337,CVE-2025-40338,CVE-2025-40339,CVE-2025-40340,CVE-2025-40342,CVE-2025-40343,CVE-2025-40344,CVE-2025-40345,CVE-2025-40346,CVE-2025-40347,CVE-2025-40350,CVE-2025-40353,CVE-2025-40354,CVE-2025-40355,CVE-2025-40357,CVE-2025-40359,CVE-2025-40360,CVE-2025-40362,CVE-2025-68167,CVE-2025-68170,CVE-2025-68171,CVE-2025-68172,CVE-2025-68176,CVE-2025-68180,CVE-2025-68181,CVE-2025-68183,CVE-2025-68184,CVE-2025-68185,CVE-2025-68190,CVE-2025-68192,CVE-2025-68194,CVE-2025-68195,CVE-2025-68197,CVE-2025-68198,CVE-2025-68201,CVE-2025-68202,CVE-2025-68206,CVE-2025-68207,CVE-2025-68208,CVE-2025-68209,CVE-2025-68210,CVE-2
025-68213,CVE-2025-68215,CVE-2025-68217,CVE-2025-68222,CVE-2025-68223,CVE-2025-68230,CVE-2025-68233,CVE-2025-68235,CVE-2025-68237,CVE-2025-68238,CVE-2025-68239,CVE-2025-68242,CVE-2025-68244,CVE-2025-68249,CVE-2025-68252,CVE-2025-68254,CVE-2025-68255,CVE-2025-68256,CVE-2025-68257,CVE-2025-68258,CVE-2025-68259,CVE-2025-68264,CVE-2025-68283,CVE-2025-68284,CVE-2025-68285,CVE-2025-68286,CVE-2025-68287,CVE-2025-68289,CVE-2025-68290,CVE-2025-68293,CVE-2025-68298,CVE-2025-68301,CVE-2025-68302,CVE-2025-68303,CVE-2025-68305,CVE-2025-68306,CVE-2025-68307,CVE-2025-68308,CVE-2025-68311,CVE-2025-68312,CVE-2025-68313,CVE-2025-68317,CVE-2025-68327,CVE-2025-68328,CVE-2025-68330,CVE-2025-68331,CVE-2025-68332,CVE-2025-68335,CVE-2025-68339,CVE-2025-68340,CVE-2025-68342,CVE-2025-68343,CVE-2025-68344,CVE-2025-68345,CVE-2025-68346,CVE-2025-68347,CVE-2025-68351,CVE-2025-68352,CVE-2025-68353,CVE-2025-68354,CVE-2025-68362,CVE-2025-68363,CVE-2025-68378,CVE-2025-68380,CVE-2025-68724,CVE-2025-68732,CVE-2025-687
36,CVE-2025-68740,CVE-2025-68742,CVE-2025-68744,CVE-2025-68746,CVE-2025-68747,CVE-2025-68748,CVE-2025-68749,CVE-2025-68750,CVE-2025-68753,CVE-2025-68757,CVE-2025-68758,CVE-2025-68759,CVE-2025-68765,CVE-2025-68766,CVE-2025-71096
This update for systemd fixes the following issues:
- Fixed agetty fails to open credentials directory (bsc#1229228)
- hwdb: comment out the entry for Logitech MX Keys for Mac
- test: answer 2nd mdadm --create question for compat with new version
- core/unit-serialize: fix serialization of markers
- locale-setup: do not load locale from environemnt when /etc/locale.conf is unchanged
- core: fix assert when AddDependencyUnitFiles is called with invalid parameter
- Fix systemd-network recommending libidn2-devel (bsc#1234765)
- tpm2-util: Also retry unsealing after policy_pcr returns PCR_CHANGED (bsc#1233752 bsc#1234313)
- add a allow/denylist for reading sysfs attributes (bsc#1234015)
- udev: add new builtin net_driver
- udev-builtin-net_id: split-out pci_get_onboard_index() from dev_pci_onboard()
- udev-builtin-net_id: split-out get_pci_slot_specifiers()
- udev-builtin-net_id: introduce get_port_specifier() helper function
- udev-builtin-net_id: split out get_dev_port() and make its failure critical
- udev-builtin-net_id: split-out pci_get_hotplug_slot() and pci_get_hotplug_slot_from_address()
- udev-builtin-net_id: return earlier when hotplug slot is not found
- udev-builtin-net_id: skip non-directory entry earlier
- udev-builtin-net_id: make names_xen() self-contained
- udev-builtin-net_id: use sd_device_get_sysnum() to get index of netdevsim
- udev-builtin-net_id: make names_netdevsim() self-contained
- udev-builtin-net_id: make names_platform() self-contained
- udev-builtin-net_id: make names_vio() self-contained
- udev-builtin-net_id: make names_ccw() self-contained
- udev-builtin-net_id: make dev_devicetree_onboard() self-contained
- udev-builtin-net_id: make names_mac() self-contained
- udev-builtin-net_id: split out get_ifname_prefix()
- udev-builtin-net_id: swap arguments for streq() and friends
- udev-builtin-net_id: drop unused value from NetNameType
- drop efifar SystemdOptions (bsc#1220338)
Upstream deprecated it and plan to drop it in the future.
- pid1: make clear that $WATCHDOG_USEC is set for the shutdown binary, noone else (bsc#1232227)
- udev: skipping empty udev rules file while collecting the stats (bsc#1232844)
- Clean up some remnants from when homed was in the experimental sub-package (bsc#1231048)
- restore some legacy symlinks
Given that SLE16 will be based on SLFO, we have no choice but to continue
supporting these compat symlinks. This compatibility code is no longer
maintained in the Git repository though, as we primarily backport upstream
commits these days. Additionally, the compat code rarely changes and often
causes conflicts when merged into recent versions of systemd.
The following package changes have been done:
- kernel-default-base-6.12.0-160000.9.1.160000.2.6 updated
More information about the sle-container-updates
mailing list