SUSE-CU-2026:96-1: Security update of suse/sle15

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Tue Jan 6 08:26:32 UTC 2026


SUSE Container Update Advisory: suse/sle15
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2026:96-1
Container Tags        : bci/bci-base:15.7 , bci/bci-base:15.7-5.14.4 , bci/bci-base:latest , suse/sle15:15.7 , suse/sle15:15.7-5.14.4 , suse/sle15:latest
Container Release     : 5.14.4
Severity              : important
Type                  : security
References            : 1254297 1254662 1254878 CVE-2025-13601 CVE-2025-14087 CVE-2025-14512
-----------------------------------------------------------------

The container suse/sle15 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:18-1
Released:    Mon Jan  5 11:52:25 2026
Summary:     Security update for glib2
Type:        security
Severity:    important
References:  1254297,1254662,1254878,CVE-2025-13601,CVE-2025-14087,CVE-2025-14512
This update for glib2 fixes the following issues:

- CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote
  filesystem attribute values can lead to denial-of-service (bsc#1254878).
- CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()`functions when
  processing attacker-influenced data may lead to crash or code execution (bsc#1254662).
- CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a
  large number of unacceptable characters may lead to crash or code execution (bsc#1254297).

  

The following package changes have been done:

- libglib-2_0-0-2.78.6-150600.4.25.1 updated


More information about the sle-container-updates mailing list