SUSE-CU-2026:541-1: Security update of bci/python

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Fri Jan 30 17:01:38 UTC 2026


SUSE Container Update Advisory: bci/python
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2026:541-1
Container Tags        : bci/python:3 , bci/python:3.6 , bci/python:3.6.15 , bci/python:3.6.15-79.14
Container Release     : 79.14
Severity              : critical
Type                  : security
References            : 1251224 1256105 1256341 1256830 1256834 1256834 1256835 1256835
                        1256836 1256836 1256837 1256837 1256838 1256838 1256839 1256839
                        1256840 1256840 1257049 CVE-2025-13151 CVE-2025-14017 CVE-2025-15467
                        CVE-2025-68160 CVE-2025-68160 CVE-2025-69418 CVE-2025-69418 CVE-2025-69419
                        CVE-2025-69419 CVE-2025-69420 CVE-2025-69420 CVE-2025-69421 CVE-2025-69421
                        CVE-2026-0988 CVE-2026-22795 CVE-2026-22795 CVE-2026-22796 CVE-2026-22796
-----------------------------------------------------------------

The container bci/python was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:221-1
Released:    Thu Jan 22 13:15:35 2026
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1256105,CVE-2025-14017
This update for curl fixes the following issues:

- CVE-2025-14017: Fixed broken TLS options for threaded LDAPS (bsc#1256105).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:224-1
Released:    Thu Jan 22 13:18:20 2026
Summary:     Security update for libtasn1
Type:        security
Severity:    moderate
References:  1256341,CVE-2025-13151

This update for libtasn1 fixes the following issues:

- CVE-2025-13151: stack-based buffer overflow in `asn1_expend_octet_string` (bsc#1256341).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:242-1
Released:    Thu Jan 22 14:57:13 2026
Summary:     Recommended update for git
Type:        recommended
Severity:    moderate
References:  1251224

This update for git fixes the following issue:

- Revert incorrect AppArmor profile change, in SLE 15 the binaries remain
  in /usr/lib/git (bsc#1251224)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:286-1
Released:    Sat Jan 24 00:35:35 2026
Summary:     Security update for glib2
Type:        security
Severity:    low
References:  1257049,CVE-2026-0988
This update for glib2 fixes the following issues:

- CVE-2026-0988: Fixed a potential integer overflow in g_buffered_input_stream_peek (bsc#1257049).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:309-1
Released:    Wed Jan 28 10:36:32 2026
Summary:     Security update for openssl-3
Type:        security
Severity:    critical
References:  1256830,1256834,1256835,1256836,1256837,1256838,1256839,1256840,CVE-2025-15467,CVE-2025-68160,CVE-2025-69418,CVE-2025-69419,CVE-2025-69420,CVE-2025-69421,CVE-2026-22795,CVE-2026-22796
This update for openssl-3 fixes the following issues:

 - CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing (bsc#1256830).
 - CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834).
 - CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (bsc#1256835).
 - CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (bsc#1256836).
 - CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
 - CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
 - CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing (bsc#1256839).
 - CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:331-1
Released:    Wed Jan 28 18:12:49 2026
Summary:     Security update for openssl-1_1
Type:        security
Severity:    moderate
References:  1256834,1256835,1256836,1256837,1256838,1256839,1256840,CVE-2025-68160,CVE-2025-69418,CVE-2025-69419,CVE-2025-69420,CVE-2025-69421,CVE-2026-22795,CVE-2026-22796
This update for openssl-1_1 fixes the following issues:

- CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing (bsc#1256839).
- CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
- CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
- CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).
- CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834).
- CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (bsc#1256835).
- CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (bsc#1256836).


The following package changes have been done:

- libopenssl3-3.2.3-150700.5.24.1 updated
- libopenssl-3-fips-provider-3.2.3-150700.5.24.1 updated
- libglib-2_0-0-2.78.6-150600.4.28.1 updated
- libcurl4-8.14.1-150700.7.11.1 updated
- curl-8.14.1-150700.7.11.1 updated
- libtasn1-6-4.13-150000.4.14.1 updated
- libtasn1-4.13-150000.4.14.1 updated
- openssl-3-3.2.3-150700.5.24.1 updated
- libopenssl1_1-1.1.1w-150700.11.11.1 updated
- git-core-2.51.0-150600.3.15.1 updated
- container:registry.suse.com-bci-bci-base-15.7-f9184822761ad484aca07587791f6b9d7abdb9a0b5cb88d5017f8891d8d8b001-0 updated


More information about the sle-container-updates mailing list