SUSE-CU-2026:437-1: Security update of suse/sle15

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Wed Jan 28 13:55:08 UTC 2026


SUSE Container Update Advisory: suse/sle15
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2026:437-1
Container Tags        : bci/bci-base:15.7 , bci/bci-base:15.7-5.14.7 , bci/bci-base:latest , suse/sle15:15.7 , suse/sle15:15.7-5.14.7 , suse/sle15:latest
Container Release     : 5.14.7
Severity              : important
Type                  : security
References            : 1254666 1255715 1256105 1256243 1256244 1256246 1256341 1256390
                        1257049 CVE-2025-13151 CVE-2025-14017 CVE-2025-14104 CVE-2025-68973
                        CVE-2026-0988 
-----------------------------------------------------------------

The container suse/sle15 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:215-1
Released:    Thu Jan 22 13:10:16 2026
Summary:     Security update for gpg2
Type:        security
Severity:    important
References:  1255715,1256243,1256244,1256246,1256390,CVE-2025-68973
This update for gpg2 fixes the following issues:

- CVE-2025-68973: Fix possible memory corruption in the armor parser (gpg.fail/memcpy)(bsc#1255715).
- Avoid potential downgrade to SHA1 in 3rd party key signatures (gpg.fail/sha1) (bsc#1256246).
- Error out on unverified output for non-detached signatures (gpg.fail/detached) (bsc#1256244).
- Fix a memory leak in gpg2 agent (bsc#1256243).
- Fix Cleartext Signature Forgery in the NotDashEscaped header implementation in GnuPG (gpg.fail/notdash) (bsc#1256390).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:221-1
Released:    Thu Jan 22 13:15:35 2026
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1256105,CVE-2025-14017
This update for curl fixes the following issues:

- CVE-2025-14017: Fixed broken TLS options for threaded LDAPS (bsc#1256105).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:224-1
Released:    Thu Jan 22 13:18:20 2026
Summary:     Security update for libtasn1
Type:        security
Severity:    moderate
References:  1256341,CVE-2025-13151

This update for libtasn1 fixes the following issues:

- CVE-2025-13151: stack-based buffer overflow in `asn1_expend_octet_string` (bsc#1256341).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:230-1
Released:    Thu Jan 22 13:22:31 2026
Summary:     Security update for util-linux
Type:        security
Severity:    moderate
References:  1254666,CVE-2025-14104
This update for util-linux fixes the following issues:

- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).
- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:286-1
Released:    Sat Jan 24 00:35:35 2026
Summary:     Security update for glib2
Type:        security
Severity:    low
References:  1257049,CVE-2026-0988
This update for glib2 fixes the following issues:

- CVE-2026-0988: Fixed a potential integer overflow in g_buffered_input_stream_peek (bsc#1257049).


The following package changes have been done:

- curl-8.14.1-150700.7.11.1 updated
- gpg2-2.4.4-150600.3.12.1 updated
- libblkid1-2.40.4-150700.4.3.1 updated
- libcurl4-8.14.1-150700.7.11.1 updated
- libfdisk1-2.40.4-150700.4.3.1 updated
- libglib-2_0-0-2.78.6-150600.4.28.1 updated
- libmount1-2.40.4-150700.4.3.1 updated
- libsmartcols1-2.40.4-150700.4.3.1 updated
- libtasn1-6-4.13-150000.4.14.1 updated
- libtasn1-4.13-150000.4.14.1 updated
- libuuid1-2.40.4-150700.4.3.1 updated
- util-linux-2.40.4-150700.4.3.1 updated


More information about the sle-container-updates mailing list