SUSE-CU-2026:1219-1: Security update of suse/multi-linux-manager/5.1/x86_64/server
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Thu Feb 26 08:38:48 UTC 2026
SUSE Container Update Advisory: suse/multi-linux-manager/5.1/x86_64/server
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2026:1219-1
Container Tags : suse/multi-linux-manager/5.1/x86_64/server:5.1.2 , suse/multi-linux-manager/5.1/x86_64/server:5.1.2.8.13.2 , suse/multi-linux-manager/5.1/x86_64/server:latest
Container Release : 8.13.2
Severity : critical
Type : security
References : 1228081 1230348 1232351 1234210 1240532 1241284 1244003 1244011
1244449 1244937 1245667 1246011 1246025 1246130 1247644 1247687
1247721 1247850 1247858 1248356 1248586 1248848 1249155 1249400
1249657 1250224 1250553 1250940 1250976 1250981 1251044 1251138
1252020 1252318 1253278 1253282 1253347 1253703 1253738 1253773
1253966 1254157 1254158 1254159 1254160 1254202 1254255 1254293
1254297 1254316 1254325 1254400 1254400 1254400 1254401 1254401
1254425 1254439 1254441 1254478 1254480 1254511 1254512 1254514
1254515 1254563 1254586 1254662 1254666 1254670 1254866 1254866
1254867 1254867 1254878 1254903 1254904 1254905 1254926 1254997
1254997 1255048 1255244 1255427 1255446 1255491 1255715 1255731
1255732 1255733 1255734 1255764 1255781 1256070 1256070 1256105
1256243 1256244 1256246 1256297 1256331 1256331 1256341 1256389
1256390 1256427 1256437 1256457 1256458 1256498 1256499 1256500
1256525 1256526 1256766 1256804 1256805 1256807 1256808 1256809
1256810 1256811 1256812 1256822 1256830 1256834 1256834 1256835
1256835 1256836 1256836 1256837 1256837 1256838 1256838 1256839
1256839 1256840 1256840 1256902 1256902 1256991 1256997 1257005
1257034 1257036 1257037 1257038 1257049 1257147 1257173 1257255
1257353 1257354 1257355 1257364 1257365 1257396 1257538 1257593
1257594 1257595 1257661 1257992 1258020 1258082 1258164 CVE-2025-10158
CVE-2025-10911 CVE-2025-12084 CVE-2025-12084 CVE-2025-12748 CVE-2025-13151
CVE-2025-13193 CVE-2025-13601 CVE-2025-13836 CVE-2025-13836 CVE-2025-13836
CVE-2025-13837 CVE-2025-13837 CVE-2025-13878 CVE-2025-14017 CVE-2025-14087
CVE-2025-14104 CVE-2025-14512 CVE-2025-14524 CVE-2025-14819 CVE-2025-15079
CVE-2025-15224 CVE-2025-15281 CVE-2025-15444 CVE-2025-15444 CVE-2025-15467
CVE-2025-28162 CVE-2025-28164 CVE-2025-55753 CVE-2025-58098 CVE-2025-64505
CVE-2025-64506 CVE-2025-64720 CVE-2025-65018 CVE-2025-65082 CVE-2025-66200
CVE-2025-66293 CVE-2025-66418 CVE-2025-66418 CVE-2025-66471 CVE-2025-66471
CVE-2025-67724 CVE-2025-67725 CVE-2025-67726 CVE-2025-67735 CVE-2025-68146
CVE-2025-68160 CVE-2025-68160 CVE-2025-68161 CVE-2025-68276 CVE-2025-68468
CVE-2025-68471 CVE-2025-68615 CVE-2025-68973 CVE-2025-69277 CVE-2025-69418
CVE-2025-69418 CVE-2025-69419 CVE-2025-69419 CVE-2025-69420 CVE-2025-69420
CVE-2025-69421 CVE-2025-69421 CVE-2025-7709 CVE-2025-8732 CVE-2026-0861
CVE-2026-0915 CVE-2026-0988 CVE-2026-0989 CVE-2026-0990 CVE-2026-0992
CVE-2026-0994 CVE-2026-1484 CVE-2026-1485 CVE-2026-1489 CVE-2026-1757
CVE-2026-21441 CVE-2026-21441 CVE-2026-21925 CVE-2026-21932 CVE-2026-21933
CVE-2026-21945 CVE-2026-22185 CVE-2026-22695 CVE-2026-22701 CVE-2026-22702
CVE-2026-22795 CVE-2026-22795 CVE-2026-22796 CVE-2026-22796 CVE-2026-22801
CVE-2026-23490 CVE-2026-23490 CVE-2026-24882 CVE-2026-25646
-----------------------------------------------------------------
The container suse/multi-linux-manager/5.1/x86_64/server was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:4489-1
Released: Fri Dec 19 12:01:53 2025
Summary: Security update for netty
Type: security
Severity: moderate
References: 1255048,CVE-2025-67735
This update for netty fixes the following issues:
Update to upstream version 4.1.130.
Security issues fixed:
- CVE-2025-67735: lack of URI sanitization in `HttpRequestEncoder` allows for CRLF injection through a request URI and
can lead to request smuggling (bsc#1255048).
Other updates and bugfixes:
- Version 4.1.130:
* Update `lz4-java` version to 1.10.1
* Close `Channel` and fail bootstrap when setting a `ChannelOption` causes an error
* Discard the following `HttpContent` for preflight request
* Fix race condition in `NonStickyEventExecutorGroup` causing incorrect `inEventLoop()` results
* Fix Zstd compression for large data
* Fix `ZstdEncoder` not producing data when source is smaller than block
* Make big endian ASCII hashcode consistent with little endian
* Fix reentrancy bug in `ByteToMessageDecoder`
* Add 32k and 64k size classes to adaptive allocator
* Re-enable reflective field accesses in native images
* Correct HTTP/2 padding length check
* Fix HTTP startline validation
* Fix `MpscIntQueue` bug
- Build against the `org.jboss:jdk-misc` artifact that is implementing the `sun.misc` classes removed in Java 25
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:4494-1
Released: Fri Dec 19 14:14:12 2025
Summary: Security update for libpng16
Type: security
Severity: important
References: 1254157,1254158,1254159,1254160,1254480,CVE-2025-64505,CVE-2025-64506,CVE-2025-64720,CVE-2025-65018,CVE-2025-66293
This update for libpng16 fixes the following issues:
- CVE-2025-65018: Fixed heap buffer overflow in `png_combine_row` triggered via `png_image_finish_read` (bsc#1254160)
- CVE-2025-66293: Fixed LIBPNG out-of-bounds read in `png_image_read_composite` (bsc#1254480)
- CVE-2025-64506: Fixed heap buffer over-read in `png_write_image_8bit` with 8-bit input and `convert_to_8bit` enabled (bsc#1254158)
- CVE-2025-64720: Fixed buffer overflow in `png_image_read_composite` via incorrect palette premultiplication (bsc#1254159)
- CVE-2025-64505: Fixed heap buffer over-read in `png_do_quantize` via malformed palette index (bsc#1254157)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:4511-1
Released: Tue Dec 23 13:14:27 2025
Summary: Security update for rsync
Type: security
Severity: moderate
References: 1254441,CVE-2025-10158
This update for rsync fixes the following issues:
- CVE-2025-10158: Fixed out-of-bounds array access via negative index (bsc#1254441)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:4518-1
Released: Tue Dec 23 20:07:29 2025
Summary: Security update for apache2
Type: security
Severity: important
References: 1254511,1254512,1254514,1254515,CVE-2025-55753,CVE-2025-58098,CVE-2025-65082,CVE-2025-66200
This update for apache2 fixes the following issues:
- CVE-2025-55753: Fixed mod_md (ACME) unintended retry intervals (bsc#1254511)
- CVE-2025-65082: Fixed CGI environment variable override (bsc#1254514)
- CVE-2025-58098: Fixed Server Side Includes adding query string to #exec cmd=... (bsc#1254512)
- CVE-2025-66200: Fixed mod_userdir+suexec bypass via AllowOverride FileInfo (bsc#1254515)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:4535-1
Released: Tue Dec 30 16:34:28 2025
Summary: Recommended update for samba
Type: recommended
Severity: moderate
References:
This update for samba fixes the following issues:
- Update to 4.21.10
* Crash in ctdbd on failed updateip; (bso#15935).
* samba-4.21 fails to join AD when multiple DCs are returned;
(bso#15905).
* vfs_ceph_new should not use ceph_ll_nonblocking_readv_writev
for fsync_send; (bso#15919).
* CTDB_SOCKET can be used even when CTDB_TEST_MODE is not set;
(bso#15921).
- Update to 4.21.9
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:18-1
Released: Mon Jan 5 11:52:25 2026
Summary: Security update for glib2
Type: security
Severity: important
References: 1254297,1254662,1254878,CVE-2025-13601,CVE-2025-14087,CVE-2025-14512
This update for glib2 fixes the following issues:
- CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote
filesystem attribute values can lead to denial-of-service (bsc#1254878).
- CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()`functions when
processing attacker-influenced data may lead to crash or code execution (bsc#1254662).
- CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a
large number of unacceptable characters may lead to crash or code execution (bsc#1254297).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:27-1
Released: Mon Jan 5 13:45:08 2026
Summary: Security update for python3
Type: security
Severity: moderate
References: 1254400,1254401,1254997,CVE-2025-12084,CVE-2025-13836,CVE-2025-13837
This update for python3 fixes the following issues:
- CVE-2025-12084: cpython: Fixed quadratic algorithm in xml.dom.minidom leading to denial of service (bsc#1254997)
- CVE-2025-13836: Fixed default Content-Lenght read amount from HTTP response (bsc#1254400)
- CVE-2025-13837: Fixed plistlib module denial of service (bsc#1254401)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:52-1
Released: Wed Jan 7 10:28:34 2026
Summary: Security update for curl
Type: security
Severity: moderate
References: 1255731,1255732,1255733,1255734,CVE-2025-14524,CVE-2025-14819,CVE-2025-15079,CVE-2025-15224
This update for curl fixes the following issues:
- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).
- CVE-2025-14819: libssh global knownhost override (bsc#1255732).
- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).
- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:56-1
Released: Wed Jan 7 16:11:13 2026
Summary: Recommended update for sssd
Type: recommended
Severity: moderate
References: 1230348
This update for sssd fixes the following issues:
- Fix sssctl config-check exit code when the conf.d snippets directory does not exist (bsc#1230348)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:215-1
Released: Thu Jan 22 13:10:16 2026
Summary: Security update for gpg2
Type: security
Severity: important
References: 1255715,1256243,1256244,1256246,1256390,CVE-2025-68973
This update for gpg2 fixes the following issues:
- CVE-2025-68973: Fix possible memory corruption in the armor parser (gpg.fail/memcpy)(bsc#1255715).
- Avoid potential downgrade to SHA1 in 3rd party key signatures (gpg.fail/sha1) (bsc#1256246).
- Error out on unverified output for non-detached signatures (gpg.fail/detached) (bsc#1256244).
- Fix a memory leak in gpg2 agent (bsc#1256243).
- Fix Cleartext Signature Forgery in the NotDashEscaped header implementation in GnuPG (gpg.fail/notdash) (bsc#1256390).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:220-1
Released: Thu Jan 22 13:15:24 2026
Summary: Security update for python-filelock
Type: security
Severity: moderate
References: 1255244,1256457,CVE-2025-68146,CVE-2026-22701
This update for python-filelock fixes the following issues:
- CVE-2025-68146: TOCTOU race condition may allow local attackers to corrupt or truncate arbitrary user files (bsc#1255244).
- CVE-2026-22701: TOCTOU race condition in the SoftFileLock implementation (bsc#1256457).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:221-1
Released: Thu Jan 22 13:15:35 2026
Summary: Security update for curl
Type: security
Severity: moderate
References: 1256105,CVE-2025-14017
This update for curl fixes the following issues:
- CVE-2025-14017: Fixed broken TLS options for threaded LDAPS (bsc#1256105).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:223-1
Released: Thu Jan 22 13:17:49 2026
Summary: Security update for libsodium
Type: security
Severity: moderate
References: 1256070,CVE-2025-15444
This update for libsodium fixes the following issues:
- CVE-2025-15444: fixed cryptographic bypass via improper elliptic curve point validation (bsc#1256070).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:224-1
Released: Thu Jan 22 13:18:20 2026
Summary: Security update for libtasn1
Type: security
Severity: moderate
References: 1256341,CVE-2025-13151
This update for libtasn1 fixes the following issues:
- CVE-2025-13151: stack-based buffer overflow in `asn1_expend_octet_string` (bsc#1256341).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:228-1
Released: Thu Jan 22 13:21:51 2026
Summary: Security update for net-snmp
Type: security
Severity: important
References: 1255491,CVE-2025-68615
This update for net-snmp fixes the following issues:
- CVE-2025-68615: Fixed snmptrapd buffer overflow (bsc#1255491)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:230-1
Released: Thu Jan 22 13:22:31 2026
Summary: Security update for util-linux
Type: security
Severity: moderate
References: 1254666,CVE-2025-14104
This update for util-linux fixes the following issues:
- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).
- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:233-1
Released: Thu Jan 22 13:24:30 2026
Summary: Security update for python-virtualenv
Type: security
Severity: moderate
References: 1256458,CVE-2026-22702
This update for python-virtualenv fixes the following issues:
- CVE-2026-22702: Fixed local attacker can redirect file operations via TOCTOU race condition (bsc#1256458).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:234-1
Released: Thu Jan 22 13:24:43 2026
Summary: Security update for libpng16
Type: security
Severity: moderate
References: 1256525,1256526,CVE-2026-22695,CVE-2026-22801
This update for libpng16 fixes the following issues:
- CVE-2026-22695: Fixed heap buffer over-read in png_image_finish_read (bsc#1256525)
- CVE-2026-22801: Fixed integer truncation causing heap buffer over-read in png_image_write_* (bsc#1256526).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:252-1
Released: Thu Jan 22 17:06:26 2026
Summary: Security update for python-pyasn1
Type: security
Severity: important
References: 1256902,CVE-2026-23490
This update for python-pyasn1 fixes the following issues:
- CVE-2026-23490: Fixed Denial-of-Service issue that may lead to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets (bsc#1256902)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:254-1
Released: Thu Jan 22 17:08:23 2026
Summary: Security update for log4j
Type: security
Severity: moderate
References: 1255427,CVE-2025-68161
This update for log4j fixes the following issues:
Security fixes:
- CVE-2025-68161: Fixed absent TLS hostname verification
that may allow a man-in-the-middle attack (bsc#1255427)
Other fixes:
- Upgrade to 2.18.0
* Added
+ Add support for Jakarta Mail API in the SMTP appender.
+ Add support for custom Log4j 1.x levels.
+ Add support for adding and retrieving appenders in Log4j 1.x
bridge.
+ Add support for custom LMAX disruptor WaitStrategy
configuration.
+ Add support for Apache Extras' RollingFileAppender in Log4j
1.x bridge.
+ Add MutableThreadContextMapFilter.
+ Add support for 24 colors in highlighting
* Changed
+ Improves ServiceLoader support on servlet containers.
+ Make the default disruptor WaitStrategy used by Async Loggers
garbage-free.
+ Do not throw UnsupportedOperationException when JUL
ApiLogger::setLevel is called.
+ Support Spring 2.6.x.
+ Move perf tests to log4j-core-its
+ Upgrade the Flume Appender to Flume 1.10.0
* Fixed
+ Fix minor typo #792.
+ Improve validation and reporting of configuration errors.
+ Allow enterprise id to be an OID fragment.
+ Fix problem with non-uppercase custom levels.
+ Avoid ClassCastException in JeroMqManager with custom
LoggerContextFactory #791.
+ DirectWriteRolloverStrategy should use the current time when
creating files.
+ Fixes the syslog appender in Log4j 1.x bridge, when used with
a custom layout.
+ log4j-1.2-api 2.17.2 throws NullPointerException while
removing appender with name as null.
+ Improve JsonTemplateLayout performance.
+ Fix resolution of non-Log4j properties.
+ Fixes Spring Boot logging system registration in a
multi-application environment.
+ JAR file containing Log4j configuration isnât closed.
+ Properties defined in configuration using a value attribute
(as opposed to element) are read correctly.
+ Syslog appender lacks the SocketOptions setting.
+ Log4j 1.2 bridge should not wrap components unnecessarily.
+ Update 3rd party dependencies for 2.18.0.
+ SizeBasedTriggeringPolicy would fail to rename files properly
when integer pattern contained a leading zero.
+ Fixes default SslConfiguration, when a custom keystore is
used.
+ Fixes appender concurrency problems in Log4j 1.x bridge.
+ Fix and test for race condition in FileUtils.mkdir().
+ LocalizedMessage logs misleading errors on the console.
+ Add missing message parameterization in RegexFilter.
+ Add the missing context stack to JsonLayout template.
+ HttpWatcher did not pass credentials when polling.
+ UrlConnectionFactory.createConnection now accepts an
AuthorizationProvider as a parameter.
+ The DirectWriteRolloverStrategy was not detecting the correct
index to use during startup.
+ Async Loggers were including the location information by
default.
+ ClassArbiterâs newBuilder method referenced the wrong class.
+ Donât use Paths.get() to avoid circular file systems.
+ Fix parsing error, when XInclude is disabled.
+ Fix LevelRangeFilterBuilder to align with log4j1âs behavior.
+ Fixes problem with wrong ANSI escape code for bright colors
+ Log4j 1.2 bridge should generate Log4j 2.x messages based on
the parameter runtime type.
- Update to 2.19.0
* Added
+ Add implementation of SLF4J2 fluent API.
+ Add support for SLF4J2 stack-valued MDC.
* Changed
+ Add getExplicitLevel method to LoggerConfig.
+ Allow PropertySources to be added.
+ Allow Plugins to be injected with the LoggerContext reference.
* Fixed
+ Add correct manifest entries for OSGi to log4j-jcl
+ Improve support for passwordless keystores.
+ SystemPropertyArbiter was assigning the value as the name.
+ Make JsonTemplateLayout stack trace truncation operate for
each label block.
+ Fix recursion between Log4j 1.2 LogManager and Category.
+ Fix resolution of properties not starting with log4j2..
+ Logger$PrivateConfig.filter(Level, Marker, String) was
allocating empty varargs array.
+ Allows a space separated list of style specifiers in the
%style pattern for consistency with %highlight.
+ Fix NPE in log4j-to-jul in the case the root logger level is
null.
+ Fix RollingRandomAccessFileAppender with
DirectWriteRolloverStrategy canât create the first log file of
different directory.
+ Generate new SSL certs for testing.
+ Fix ServiceLoaderUtil behavior in the presence of a
SecurityManager.
+ Fix regression in Rfc5424Layout default values.
+ Harden InstantFormatter against delegate failures.
+ Add async support to Log4jServletFilter.
* Removed
+ Removed build page in favor of a single build instructions
file.
+ Remove SLF4J 1.8.x binding.
- Update to 2.20.0
* Added
+ Add support for timezones in RollingFileAppender date pattern
+ Add LogEvent timestamp to ProducerRecord in KafkaAppender
+ Add PatternLayout support for abbreviating the name of all
logger components except the 2 rightmost
+ Removes internal field that leaked into public API.
+ Add a LogBuilder#logAndGet() method to emulate the
Logger#traceEntry method.
* Changed
+ Simplify site generation
+ Switch the issue tracker from JIRA to GitHub Issues
+ Remove liquibase-log4j2 maven module
+ Fix order of stacktrace elements, that causes cache misses in
ThrowableProxyHelper.
+ Switch from com.sun.mail to Eclipse Angus.
+ Add Log4j2 Core as default runtime dependency of the
SLF4J2-to-Log4j2 API bridge.
+ Replace maven-changes-plugin with a custom changelog
implementation
+ Moved log4j-api and log4j-core artifacts with classifier tests
to log4j-api-test and log4j-core-test respectively.
* Deprecated
+ Deprecate support for package scanning for plugins
* Fixed
+ Copy programmatically supplied location even if
includeLocation='false'.
+ Eliminate status logger warning, when disableAnsi or
noConsoleNoAnsi is used the style and highlight patterns.
+ Fix detection of location requirements in RewriteAppender.
+ Replace regex with manual code to escape characters in
Rfc5424Layout.
+ Fix java.sql.Time object formatting in MapMessage
+ Fix previous fire time computation in CronTriggeringPolicy
+ Correct default to not include location for AsyncRootLoggers
+ Make StatusConsoleListener use SimpleLogger internally.
+ Lazily evaluate the level of a SLF4J LogEventBuilder
+ Fixes priority of Legacy system properties, which are now back
to having higher priority than Environment variables.
+ Protects ServiceLoaderUtil from unchecked ServiceLoader
exceptions.
+ Fix Configurator#setLevel for internal classes
+ Fix level propagation in Log4jBridgeHandler
+ Disable OsgiServiceLocator if not running in OSGI container.
+ When using a Date Lookup in the file pattern the current time
should be used.
+ Fixed LogBuilder filtering in the presence of global filters.
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:255-1
Released: Thu Jan 22 17:08:38 2026
Summary: Security update for python-urllib3
Type: security
Severity: moderate
References: 1256331,CVE-2026-21441
This update for python-urllib3 fixes the following issues:
- CVE-2026-21441: Fixed excessive resource consumption during
decompression of data in HTTP redirect responses (bsc#1256331)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:256-1
Released: Thu Jan 22 17:08:54 2026
Summary: Security update for openldap2_5
Type: security
Severity: moderate
References: 1256297,CVE-2026-22185
This update for openldap2_5 fixes the following issues:
Security fixes:
- CVE-2026-22185: Fixed possible crash in malicious DB (bsc#1256297)
Other fixes:
- Update to version 2.5.20+11:
* ITS#10421 mdb_load: check for malicious input
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:259-1
Released: Thu Jan 22 17:10:44 2026
Summary: Security update for avahi
Type: security
Severity: moderate
References: 1256498,1256499,1256500,CVE-2025-68276,CVE-2025-68468,CVE-2025-68471
This update for avahi fixes the following issues:
- CVE-2025-68276: Fixed refuse to create wide-area record browsers when
wide-area is off (bsc#1256498)
- CVE-2025-68471: Fixed DoS bug by changing assert to return (bsc#1256500)
- CVE-2025-68468: Fixed DoS bug by removing incorrect assertion (bsc#1256499)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:261-1
Released: Thu Jan 22 17:13:51 2026
Summary: Recommended update for samba
Type: recommended
Severity: important
References: 1234210,1254439,1254586,1254926
This update for samba fixes the following issues:
- Fix testparm error handling the 'sync machine password to keytab' option (bsc#1254439)
- Fix Samba printers reporting invalid sid during print jobs (bsc#1234210, bsc#1254926)
- samba-bgqd can't find [printers] share (bsc#1254586)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:271-1
Released: Fri Jan 23 12:00:51 2026
Summary: Recommended update for python-setuptools
Type: recommended
Severity: important
References: 1254255
This update for python-setuptools fixes the following issues:
- Implement basic PEP 639 support, (jsc#PED-14457, bsc#1254255)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:279-1
Released: Fri Jan 23 16:08:55 2026
Summary: Security update for libvirt
Type: security
Severity: moderate
References: 1253278,1253703,CVE-2025-12748,CVE-2025-13193
This update for libvirt fixes the following issues:
- CVE-2025-13193: Fixed umask for 'qemu-img' when creating external inactive snapshots (bsc#1253703)
- CVE-2025-12748: Fixed check ACLs before parsing the whole domain XML (bsc#1253278)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:286-1
Released: Sat Jan 24 00:35:35 2026
Summary: Security update for glib2
Type: security
Severity: low
References: 1257049,CVE-2026-0988
This update for glib2 fixes the following issues:
- CVE-2026-0988: Fixed a potential integer overflow in g_buffered_input_stream_peek (bsc#1257049).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:309-1
Released: Wed Jan 28 10:36:32 2026
Summary: Security update for openssl-3
Type: security
Severity: critical
References: 1256830,1256834,1256835,1256836,1256837,1256838,1256839,1256840,CVE-2025-15467,CVE-2025-68160,CVE-2025-69418,CVE-2025-69419,CVE-2025-69420,CVE-2025-69421,CVE-2026-22795,CVE-2026-22796
This update for openssl-3 fixes the following issues:
- CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing (bsc#1256830).
- CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834).
- CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (bsc#1256835).
- CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (bsc#1256836).
- CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
- CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
- CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing (bsc#1256839).
- CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:314-1
Released: Wed Jan 28 14:28:46 2026
Summary: Security update for python311
Type: security
Severity: moderate
References: 1254400,1254401,1254997,CVE-2025-12084,CVE-2025-13836,CVE-2025-13837
This update for python311 fixes the following issues:
- CVE-2025-12084: prevent quadratic behavior in node ID cache clearing (bsc#1254997).
- CVE-2025-13836: prevent reading an HTTP response from a server, if no read amount is specified, with using Content-Length per default as the length (bsc#1254400).
- CVE-2025-13837: protect against OOM when loading malicious content (bsc#1254401).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:324-1
Released: Wed Jan 28 15:53:56 2026
Summary: Recommended update for supportutils
Type: recommended
Severity: important
References: 1232351,1241284,1244003,1244011,1244937,1245667,1246011,1246025,1249657,1250224,1252318,1254425
This update for supportutils fixes the following issues:
- Changes to version 3.2.12
* Optimized lsof usage and honors OPTION_OFILES (bsc#1232351)
* Run in containers without errors (bsc#1245667)
* Removed pmap PID from memory.txt (bsc#1246011)
* Added missing /proc/pagetypeinfo to memory.txt (bsc#1246025)
* Improved database perforce with kGraft patching (bsc#1249657)
* Using last boot for journalctl for optimization (bsc#1250224)
* Fixed extraction failures (bsc#1252318)
* Update supportconfig.conf path in docs (bsc#1254425)
* drm_sub_info: Catch error when dir doesn't exist
* Replace remaining `egrep` with `grep -E`
* Add process affinity to slert logs
* Reintroduce cgroup statistics (and v2)
* Minor changes to basic-health-check: improve information level
* Collect important machine health counters
* powerpc: collect hot-pluggable PCI and PHB slots
* podman: collect podman disk usage
* Exclude binary files in crondir
* kexec/kdump: collect everything under /sys/kernel/kexec dir
* Use short-iso for journalctl
- Changes to version 3.2.11
* Collect rsyslog frule files (bsc#1244003)
* Remove proxy passwords (bsc#1244011)
* Missing NetworkManager information (bsc#1241284)
* Include agama logs bsc#1244937)
* Additional NFS conf files
* New fadump sysfs files
* Fixed change log dates
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:331-1
Released: Wed Jan 28 18:12:49 2026
Summary: Security update for openssl-1_1
Type: security
Severity: moderate
References: 1256834,1256835,1256836,1256837,1256838,1256839,1256840,CVE-2025-68160,CVE-2025-69418,CVE-2025-69419,CVE-2025-69420,CVE-2025-69421,CVE-2026-22795,CVE-2026-22796
This update for openssl-1_1 fixes the following issues:
- CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing (bsc#1256839).
- CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
- CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
- CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).
- CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834).
- CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (bsc#1256835).
- CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (bsc#1256836).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:348-1
Released: Fri Jan 30 12:17:00 2026
Summary: Security update for bind
Type: security
Severity: important
References: 1256997,CVE-2025-13878
This update for bind fixes the following issues:
Upgrade to release 9.20.18:
- CVE-2025-13878: Fixed incorrect length checks for BRID and HHIT records (bsc#1256997)
Feature Changes:
* Add more information to the rndc recursing output about
fetches.
* Reduce the number of outgoing queries.
* Provide more information when memory allocation fails.
Bug Fixes:
* Make DNSSEC key rollovers more robust.
* Fix a catalog zone issue, where member zones could fail to
load.
* Allow glue in delegations with QTYPE=ANY.
* Fix slow speed when signing a large delegation zone with NSEC3
opt-out.
* Reconfiguring an NSEC3 opt-out zone to NSEC caused the zone to
be invalid.
* Fix a possible catalog zone issue during reconfiguration.
* Fix the charts in the statistics channel.
* Adding NSEC3 opt-out records could leave invalid records in
chain.
* Fix spurious timeouts while resolving names.
* Fix bug where zone switches from NSEC3 to NSEC after
retransfer.
* AMTRELAY type 0 presentation format handling was wrong.
* Fix parsing bug in remote-servers with key or TLS.
* Fix DoT reconfigure/reload bug in the resolver.
* Skip unsupported algorithms when looking for a signing key.
* Fix dnssec-keygen key collision checking for KEY RRtype keys.
* dnssec-verify now uses exit code 1 when failing due to illegal
options.
* Prevent assertion failures of dig when a server is specified
before the -b option.
* Skip buffer allocations if not logging.
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:364-1
Released: Tue Feb 3 10:50:53 2026
Summary: Security update for libpng16
Type: security
Severity: moderate
References: 1257364,1257365,CVE-2025-28162,CVE-2025-28164
This update for libpng16 fixes the following issues:
- CVE-2025-28162: memory leaks when running `pngimage` (bsc#1257364).
- CVE-2025-28164: memory leaks when running `pngimage` (bsc#1257365).
- CVE-2026-22695: Fixed heap buffer over-read in png_image_finish_read (bsc#1256525).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:367-1
Released: Tue Feb 3 14:09:40 2026
Summary: Security update for python-urllib3
Type: security
Severity: moderate
References: 1254866,1254867,CVE-2025-66418,CVE-2025-66471
This update for python-urllib3 fixes the following issues:
- CVE-2025-66471: excessive resource consumption via decompression of highly compressed data in Streaming API (bsc#1254867).
- CVE-2025-66418: resource exhaustion via unbounded number of links in the decompression chain (bsc#1254866).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:368-1
Released: Tue Feb 3 14:40:37 2026
Summary: Security update for libsodium
Type: security
Severity: moderate
References: 1255764,1256070,CVE-2025-15444,CVE-2025-69277
This update for libsodium fixes the following issues:
- CVE-2025-15444: Fixed cryptographic bypass via improper elliptic curve point validation (bsc#1256070).
- CVE-2025-69277: Fixed incorrect validation of elliptic curve points in crypto_core_ed25519_is_valid_point function (bsc#1255764).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:371-1
Released: Tue Feb 3 19:08:49 2026
Summary: Security update for glibc
Type: security
Severity: important
References: 1256437,1256766,1256822,1257005,CVE-2025-15281,CVE-2026-0861,CVE-2026-0915
This update for glibc fixes the following issues:
Security fixes:
- CVE-2026-0861: Fixed inadequate size check in the memalign suite may result in an integer overflow (bsc#1256766).
- CVE-2026-0915: Fixed uninitialized stack buffer used as DNS query name when net==0 in _nss_dns_getnetbyaddr_r (bsc#1256822).
- CVE-2025-15281: Fixed uninitialized memory may cause the process abort (bsc#1257005).
Other fixes:
- NPTL: Optimize trylock for high cache contention workloads (bsc#1256437).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:373-1
Released: Wed Feb 4 03:50:41 2026
Summary: Security update for glib2
Type: security
Severity: important
References: 1257353,1257354,1257355,CVE-2026-1484,CVE-2026-1485,CVE-2026-1489
This update for glib2 fixes the following issues:
- CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to integer wraparound in content type parsing (bsc#1257354).
- CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to miscalculated buffer boundaries in the Base64 encoding routine (bsc#1257355).
- CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds access due to integer overflow in Unicode case conversion (bsc#1257353).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:374-1
Released: Wed Feb 4 08:03:34 2026
Summary: Security update for protobuf
Type: security
Severity: moderate
References: 1257173,CVE-2026-0994
This update for protobuf fixes the following issues:
- CVE-2026-0994: Fixed google.protobuf.Any recursion depth bypass in Python json_format.ParseDict (bsc#1257173).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:407-1
Released: Mon Feb 9 07:43:45 2026
Summary: Recommended update for systemd
Type: recommended
Severity: important
References: 1228081,1244449,1248356,1254202,1254293,1254563,1256427
This update for systemd fixes the following issues:
- Name libsystemd-{shared,core} based on the major version of systemd and
the package release number (bsc#1228081, bsc#1256427)
This way, both the old and new versions of the shared libraries will be
present during the update. This should prevent issues during package updates
when incompatible changes are introduced in the new versions of the shared libraries.
- detect-virt: bare-metal GCE only for x86 and i386 (bsc#1254293)
- timer: rebase last_trigger timestamp if needed
- timer: rebase the next elapse timestamp only if timer didn't already run
- timer: don't run service immediately after restart of a timer (bsc#1254563)
- test: check the next elapse timer timestamp after deserialization
- test: restarting elapsed timer shouldn't trigger the corresponding service
- Reintroduce systemd-network as a transitional dummy package containing no files (bsc#1254202)
The contents of this package were split into two independent packages:
systemd-networkd and systemd-resolved. However, the initial replacement caused
both network services to be disabled. Consequently, the original package has
been restored as an empty transitional package to prevent the disabling of the services.
It can be safely removed once the update is complete.
- units: don't force the loading of the loop and dm_mod modules in systemd-repart.service (bsc#1248356)
- units: add dep on systemd-logind.service by user at .service
- detect-virt: add bare-metal support for GCE (bsc#1244449)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:415-1
Released: Tue Feb 10 09:35:19 2026
Summary: Security update for java-17-openjdk
Type: security
Severity: important
References: 1255446,1257034,1257036,1257037,1257038,CVE-2026-21925,CVE-2026-21932,CVE-2026-21933,CVE-2026-21945
This update for java-17-openjdk fixes the following issues:
Upgrade to upstream tag jdk-17.0.18+8 (January 2026 CPU)
Security fixes:
- CVE-2026-21925: Fixed Oracle Java SE component RMI (bsc#1257034).
- CVE-2026-21932: Fixed Oracle Java SE component AWT and JavaFX (bsc#1257036).
- CVE-2026-21933: Fixed Oracle Java SE component Networking (bsc#1257037).
- CVE-2026-21945: Fixed Oracle Java SE component Security (bsc#1257038).
Other fixes:
- OpenJDK rendering blue borders when it should not, due to missing the fix for JDK-6304250 from upstream (bsc#1255446).
- Do not depend on update-desktop-files (jsc#PED-14507, jsc#PED-15216).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:430-1
Released: Wed Feb 11 09:43:42 2026
Summary: Security update for python-pyasn1
Type: security
Severity: important
References: 1256902,CVE-2026-23490
This update for python-pyasn1 fixes the following issues:
- CVE-2026-23490: Fixed malformed RELATIVE-OID with excessive continuation
octets leading to Denial of Service (bsc#1256902)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:432-1
Released: Wed Feb 11 10:11:56 2026
Summary: Security update for sqlite3
Type: security
Severity: moderate
References: 1248586,1254670,CVE-2025-7709
This update for sqlite3 fixes the following issues:
- Update to v3.51.2:
- CVE-2025-7709: Fixed an integer overflow in the FTS5 extension. (bsc#1254670)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:434-1
Released: Wed Feb 11 10:23:18 2026
Summary: Security update for gpg2
Type: security
Severity: important
References: 1256389,1257396,CVE-2026-24882
This update for gpg2 fixes the following issues:
Security fixes:
- CVE-2026-24882: Fixed stack-based buffer overflow in TPM2
PKDECRYPT for TPM-backed RSA and ECC keys (bsc#1257396)
- Fixed GnuPG accepting Path Separators and Path Traversals in Literal
Data 'Filename' Field (bsc#1256389)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:443-1
Released: Wed Feb 11 10:46:43 2026
Summary: Security update for python-urllib3
Type: security
Severity: moderate
References: 1254866,1254867,1256331,CVE-2025-66418,CVE-2025-66471,CVE-2026-21441
This update for python-urllib3_1 fixes the following issues:
- CVE-2025-66471: excessive resource consumption via decompression of highly compressed data in Streaming API (bsc#1254867).
- CVE-2025-66418: resource exhaustion via unbounded number of links in the decompression chain (bsc#1254866).
- CVE-2026-21441: excessive resource consumption during decompression of data in HTTP redirect responses (bsc#1256331).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:597-1
Released: Mon Feb 23 16:58:08 2026
Summary: Security update for libpng16
Type: security
Severity: important
References: 1258020,CVE-2026-25646
This update for libpng16 fixes the following issues:
- CVE-2026-25646: heap buffer overflow vulnerability in png_set_dither/png_set_quantize (bsc#1258020).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:605-1
Released: Tue Feb 24 12:19:11 2026
Summary: Security update for libxml2
Type: security
Severity: moderate
References: 1247850,1247858,1250553,1256804,1256805,1256807,1256808,1256809,1256810,1256811,1256812,1257593,1257594,1257595,CVE-2025-10911,CVE-2025-8732,CVE-2026-0989,CVE-2026-0990,CVE-2026-0992,CVE-2026-1757
This update for libxml2 fixes the following issues:
- CVE-2026-0990: Fixed a call stack overflow leading to application crash due to infinite recursion in `xmlCatalogXMLResolveURI`. (bsc#1256807, bsc#1256811)
- CVE-2026-0992: Fixed an excessive resource consumption when processing XML catalogs due to exponential behavior. (bsc#1256809, bsc#1256812)
- CVE-2026-1757: Fixed a memory leak in the `xmllint` interactive shell. (bsc#1257594, bsc#1257595)
- CVE-2025-10911: Fixed a use-after-free with key data stored cross-RVT. (bsc#1250553)
- CVE-2025-8732: Fixed an infinite recursion in catalog parsing functions when processing malformed SGML catalog files. (bsc#1247858)
- CVE-2026-0989: Fixe a call stack exhaustion leading to application crash due to RelaxNG parser not limiting the recursion depth. (bsc#1256805, bsc#1256810)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:608-1
Released: Tue Feb 24 13:49:19 2026
Summary: Recommended update for lvm2
Type: recommended
Severity: important
References: 1257661
This update for lvm2 fixes the following issues:
- L3: LVM_SUPPRESS_FD_WARNINGS is no longer effective (bsc#1257661)
* libdaemon: fix suppressing stray fd warnings
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:624-1
Released: Wed Feb 25 10:40:30 2026
Summary: Maintenance update for Multi-Linux Manager 5.1: Server, Proxy and Retail Branch Server
Type: recommended
Severity: important
References: 1240532,1246130,1247644,1247687,1247721,1248848,1249155,1249400,1250940,1250976,1250981,1251044,1251138,1252020,1253282,1253347,1253738,1253773,1253966,1254316,1254325,1254400,1254478,1254903,1254904,1254905,1255781,1256991,1257147,1257255,1257538,1257992,1258082,1258164,CVE-2025-13836,CVE-2025-67724,CVE-2025-67725,CVE-2025-67726
Maintenance update for Multi-Linux Manager 5.1: Server, Proxy and Retail Branch Server
This is a codestream only update
The following package changes have been done:
- glibc-2.38-150600.14.40.1 updated
- libuuid1-2.40.4-150700.4.3.1 updated
- libsqlite3-0-3.51.2-150000.3.36.1 updated
- libsmartcols1-2.40.4-150700.4.3.1 updated
- libglib-2_0-0-2.78.6-150600.4.35.1 updated
- libxml2-2-2.12.10-150700.4.11.1 updated
- libopenssl3-3.2.3-150700.5.24.1 updated
- libblkid1-2.40.4-150700.4.3.1 updated
- libudev1-254.27-150600.4.55.1 updated
- libopenssl-3-fips-provider-3.2.3-150700.5.24.1 updated
- libmount1-2.40.4-150700.4.3.1 updated
- libfdisk1-2.40.4-150700.4.3.1 updated
- libcurl4-8.14.1-150700.7.11.1 updated
- gpg2-2.4.4-150600.3.15.1 updated
- util-linux-2.40.4-150700.4.3.1 updated
- curl-8.14.1-150700.7.11.1 updated
- libtasn1-6-4.13-150000.4.14.1 updated
- libtasn1-4.13-150000.4.14.1 updated
- openssl-3-3.2.3-150700.5.24.1 updated
- libsystemd0-254.27-150600.4.55.1 updated
- systemd-254.27-150600.4.55.1 updated
- bind-formula-1.1.0-150700.3.3.5 updated
- branch-network-formula-1.1.0-150700.3.5.1 updated
- dhcpd-formula-1.1.2-150700.3.7.1 updated
- glibc-locale-base-2.38-150600.14.40.1 updated
- inter-server-sync-0.3.10-150700.3.6.8 updated
- jose4j-0.9.5-150700.3.3.6 updated
- libavahi-common3-0.8-150600.15.12.1 updated
- libdevmapper1_03-2.03.24_1.02.198-150700.7.6.1 updated
- liberate-formula-0.1.2-150700.3.6.5 updated
- libgmodule-2_0-0-2.78.6-150600.4.35.1 updated
- libgobject-2_0-0-2.78.6-150600.4.35.1 updated
- libipa_hbac0-2.9.3-150700.9.12.1 updated
- libopenssl1_1-1.1.1w-150700.11.11.1 updated
- libpng16-16-1.6.40-150600.3.12.1 updated
- libsodium23-1.0.18-150000.4.14.1 updated
- libsss_idmap0-2.9.3-150700.9.12.1 updated
- libsss_nss_idmap0-2.9.3-150700.9.12.1 updated
- libxml2-tools-2.12.10-150700.4.11.1 updated
- python311-base-3.11.14-150600.3.41.2 updated
- libpython3_11-1_0-3.11.14-150600.3.41.2 updated
- release-notes-multi-linux-manager-5.1.2-150700.5.15.1 updated
- snmp-mibs-5.9.4-150600.24.10.1 updated
- susemanager-schema-utility-5.1.14-150700.3.9.10 updated
- uyuni-config-modules-5.1.23-150700.3.23.1 updated
- supportutils-3.2.12.2-150600.3.9.1 updated
- glibc-locale-2.38-150600.14.40.1 updated
- libavahi-client3-0.8-150600.15.12.1 updated
- libpython3_6m1_0-3.6.15-150300.10.103.1 updated
- python3-base-3.6.15-150300.10.103.1 updated
- python3-3.6.15-150300.10.103.1 updated
- python3-curses-3.6.15-150300.10.103.1 updated
- libldap-2_5-0-2.5.20+11-150500.11.38.1 updated
- libsss_certmap0-2.9.3-150700.9.12.1 updated
- bind-utils-9.20.18-150700.3.15.1 updated
- glibc-devel-2.38-150600.14.40.1 updated
- python311-3.11.14-150600.3.41.2 updated
- susemanager-docs_en-5.1-150700.10.6.5 updated
- libgio-2_0-0-2.78.6-150600.4.35.1 updated
- glib2-tools-2.78.6-150600.4.35.1 updated
- susemanager-branding-oss-5.1.3-150700.3.3.5 updated
- spacewalk-java-lib-5.1.23-150700.3.13.2 updated
- uyuni-reportdb-schema-5.1.6-150700.3.6.11 updated
- uyuni-base-common-5.1.5-150700.3.6.5 updated
- libsnmp40-5.9.4-150600.24.10.1 updated
- apache2-prefork-2.4.62-150700.4.9.1 updated
- zchunk-1.5.1-150700.1.2 added
- python3-susemanager-retail-1.2.0-150700.3.3.5 updated
- python3-pyasn1-0.4.2-150000.3.13.1 updated
- libldb2-4.21.10+git.449.dcced69e1b5-150700.3.19.1 updated
- python311-setuptools-67.7.2-150400.3.22.1 updated
- python311-pyasn1-0.5.0-150400.12.10.1 updated
- python311-filelock-3.12.2-150400.10.8.1 updated
- susemanager-docs_en-pdf-5.1-150700.10.6.5 updated
- susemanager-schema-5.1.14-150700.3.9.10 updated
- perl-Satcon-5.1.4-150700.3.6.5 updated
- susemanager-sync-data-5.1.7-150700.3.6.5 updated
- uyuni-setup-reportdb-5.1.4-150700.3.3.5 updated
- rsync-3.2.7-150600.3.14.1 updated
- perl-SNMP-5.9.4-150600.24.10.1 updated
- net-snmp-5.9.4-150600.24.10.1 updated
- apache2-2.4.62-150700.4.9.1 updated
- libvirt-libs-11.0.0-150700.4.13.1 updated
- python3-uyuni-common-libs-5.1.5-150700.3.3.5 updated
- susemanager-retail-tools-1.2.0-150700.3.3.5 updated
- spacewalk-backend-sql-postgresql-5.1.15-150700.3.6.12 updated
- supportutils-plugin-susemanager-5.1.6-150700.3.6.5 updated
- sssd-ldap-2.9.3-150700.9.12.1 updated
- sssd-2.9.3-150700.9.12.1 updated
- sssd-krb5-common-2.9.3-150700.9.12.1 updated
- samba-client-libs-4.21.10+git.449.dcced69e1b5-150700.3.19.1 updated
- java-17-openjdk-headless-17.0.18.0-150400.3.63.1 updated
- python311-virtualenv-20.22.0-150400.9.9.1 updated
- susemanager-build-keys-15.5.3-150700.5.8.2 updated
- spacecmd-5.1.12-150700.3.6.5 updated
- sssd-krb5-2.9.3-150700.9.12.1 updated
- sssd-dbus-2.9.3-150700.9.12.1 updated
- python3-sssd-config-2.9.3-150700.9.12.1 updated
- sssd-ad-2.9.3-150700.9.12.1 updated
- java-17-openjdk-17.0.18.0-150400.3.63.1 updated
- spacewalk-base-minimal-5.1.18-150700.3.11.1 updated
- susemanager-build-keys-web-15.5.3-150700.5.8.2 updated
- spacewalk-config-5.1.9-150700.3.6.5 updated
- sssd-tools-2.9.3-150700.9.12.1 updated
- sssd-ipa-2.9.3-150700.9.12.1 updated
- netty-4.1.130-150200.4.40.1 updated
- mgr-libmod-5.1.2-150700.3.3.5 updated
- spacewalk-base-minimal-config-5.1.18-150700.3.11.1 updated
- log4j-2.20.0-150200.4.30.1 updated
- protobuf-java-25.1-150600.16.16.1 updated
- python311-urllib3-2.0.7-150400.7.27.1 updated
- python3-urllib3-1.25.10-150300.4.21.1 updated
- python3-rhnlib-5.1.4-150700.6.6.5 updated
- spacewalk-base-5.1.18-150700.3.11.1 updated
- log4j-jcl-2.20.0-150200.4.30.1 updated
- log4j-slf4j-2.20.0-150200.4.30.1 updated
- spacewalk-backend-5.1.15-150700.3.6.12 updated
- python3-spacewalk-client-tools-5.1.8-150700.3.6.11 updated
- spacewalk-client-tools-5.1.8-150700.3.6.11 updated
- salt-3006.0-150700.14.12.14 updated
- python311-salt-3006.0-150700.14.12.14 updated
- spacewalk-search-5.1.7-150700.3.8.6 updated
- spacewalk-backend-sql-5.1.15-150700.3.6.12 updated
- python3-spacewalk-certs-tools-5.1.10-150700.3.10.1 updated
- spacewalk-certs-tools-5.1.10-150700.3.10.1 updated
- mgr-push-5.1.5-150700.2.6.5 updated
- python3-mgr-push-5.1.5-150700.2.6.5 updated
- salt-master-3006.0-150700.14.12.14 updated
- cobbler-3.3.3-150700.5.6.12 updated
- spacewalk-backend-server-5.1.15-150700.3.6.12 updated
- salt-api-3006.0-150700.14.12.14 updated
- uyuni-base-server-5.1.5-150700.3.6.5 updated
- spacewalk-java-postgresql-5.1.23-150700.3.13.2 updated
- spacewalk-java-config-5.1.23-150700.3.13.2 updated
- spacewalk-branding-5.1.3-150700.3.6.6 updated
- susemanager-tftpsync-5.1.3-150700.3.6.5 updated
- spacewalk-backend-xmlrpc-5.1.15-150700.3.6.12 updated
- spacewalk-backend-xml-export-libs-5.1.15-150700.3.6.12 updated
- spacewalk-backend-package-push-server-5.1.15-150700.3.6.12 updated
- spacewalk-backend-app-5.1.15-150700.3.6.12 updated
- spacewalk-taskomatic-5.1.23-150700.3.13.2 updated
- spacewalk-reports-5.1.4-150700.3.6.5 updated
- spacewalk-java-5.1.23-150700.3.13.2 updated
- spacewalk-html-5.1.18-150700.3.11.1 updated
- billing-data-service-5.1.3-150700.3.3.5 updated
- susemanager-tools-5.1.14-150700.3.6.5 updated
- spacewalk-backend-tools-5.1.15-150700.3.6.12 updated
- spacewalk-admin-5.1.7-150700.3.6.5 updated
- susemanager-sls-5.1.23-150700.3.23.1 updated
- spacewalk-common-5.1.5-150700.3.6.5 updated
- susemanager-5.1.14-150700.3.6.5 updated
- spacewalk-utils-5.1.8-150700.3.6.5 updated
- spacewalk-setup-5.1.7-150700.3.6.5 updated
- container:bci-bci-init-15.7-4d6ef2bda680af4ff2f6540476b200ea2170af4839a2f6b1ee867ec0601066b3-0 added
- container:suse-multi-linux-manager-5.1-init-5.1.1.1-5.1.1.1-8.10.1 removed
- libestr0-0.1.10-1.25 removed
- libfastjson4-0.99.9-150400.3.3.1 removed
- liblogging0-1.0.6-3.21 removed
- liblognorm5-2.0.6-150000.3.3.1 removed
- libpcre1-8.45-150000.20.13.1 removed
- librdkafka1-0.11.6-150600.16.3.1 removed
- python3-looseversion-1.0.2-150100.3.3.1 removed
- rsyslog-8.2406.0-150700.1.6 removed
- susemanager-frontend-libs-5.0.0-150700.1.1 removed
- sysconfig-0.85.10-150200.15.1 removed
- sysconfig-netconfig-0.85.10-150200.15.1 removed
- syslog-service-2.0-11.2 removed
- util-linux-systemd-2.40.4-150700.2.4 removed
- wicked-0.6.78-150700.1.4 removed
- wicked-service-0.6.78-150700.1.4 removed
More information about the sle-container-updates
mailing list