SUSE-CU-2026:546-1: Security update of suse/rmt-server

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Fri Jan 30 17:02:35 UTC 2026


SUSE Container Update Advisory: suse/rmt-server
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2026:546-1
Container Tags        : suse/rmt-server:2 , suse/rmt-server:2.24 , suse/rmt-server:2.24-78.8 , suse/rmt-server:latest
Container Release     : 78.8
Severity              : critical
Type                  : security
References            : 1254666 1255715 1256243 1256244 1256246 1256390 1256830 1256834
                        1256834 1256835 1256835 1256836 1256836 1256837 1256837 1256838
                        1256838 1256839 1256839 1256840 1256840 CVE-2025-14104 CVE-2025-15467
                        CVE-2025-68160 CVE-2025-68160 CVE-2025-68973 CVE-2025-69418 CVE-2025-69418
                        CVE-2025-69419 CVE-2025-69419 CVE-2025-69420 CVE-2025-69420 CVE-2025-69421
                        CVE-2025-69421 CVE-2026-22795 CVE-2026-22795 CVE-2026-22796 CVE-2026-22796
-----------------------------------------------------------------

The container suse/rmt-server was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:215-1
Released:    Thu Jan 22 13:10:16 2026
Summary:     Security update for gpg2
Type:        security
Severity:    important
References:  1255715,1256243,1256244,1256246,1256390,CVE-2025-68973
This update for gpg2 fixes the following issues:

- CVE-2025-68973: Fix possible memory corruption in the armor parser (gpg.fail/memcpy)(bsc#1255715).
- Avoid potential downgrade to SHA1 in 3rd party key signatures (gpg.fail/sha1) (bsc#1256246).
- Error out on unverified output for non-detached signatures (gpg.fail/detached) (bsc#1256244).
- Fix a memory leak in gpg2 agent (bsc#1256243).
- Fix Cleartext Signature Forgery in the NotDashEscaped header implementation in GnuPG (gpg.fail/notdash) (bsc#1256390).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:230-1
Released:    Thu Jan 22 13:22:31 2026
Summary:     Security update for util-linux
Type:        security
Severity:    moderate
References:  1254666,CVE-2025-14104
This update for util-linux fixes the following issues:

- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).
- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:309-1
Released:    Wed Jan 28 10:36:32 2026
Summary:     Security update for openssl-3
Type:        security
Severity:    critical
References:  1256830,1256834,1256835,1256836,1256837,1256838,1256839,1256840,CVE-2025-15467,CVE-2025-68160,CVE-2025-69418,CVE-2025-69419,CVE-2025-69420,CVE-2025-69421,CVE-2026-22795,CVE-2026-22796
This update for openssl-3 fixes the following issues:

 - CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing (bsc#1256830).
 - CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834).
 - CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (bsc#1256835).
 - CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (bsc#1256836).
 - CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
 - CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
 - CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing (bsc#1256839).
 - CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:331-1
Released:    Wed Jan 28 18:12:49 2026
Summary:     Security update for openssl-1_1
Type:        security
Severity:    moderate
References:  1256834,1256835,1256836,1256837,1256838,1256839,1256840,CVE-2025-68160,CVE-2025-69418,CVE-2025-69419,CVE-2025-69420,CVE-2025-69421,CVE-2026-22795,CVE-2026-22796
This update for openssl-1_1 fixes the following issues:

- CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing (bsc#1256839).
- CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
- CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
- CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).
- CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834).
- CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (bsc#1256835).
- CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (bsc#1256836).


The following package changes have been done:

- libuuid1-2.40.4-150700.4.3.1 updated
- libsmartcols1-2.40.4-150700.4.3.1 updated
- libblkid1-2.40.4-150700.4.3.1 updated
- libopenssl3-3.2.3-150700.5.24.1 updated
- libfdisk1-2.40.4-150700.4.3.1 updated
- libopenssl-3-fips-provider-3.2.3-150700.5.24.1 updated
- libmount1-2.40.4-150700.4.3.1 updated
- gpg2-2.4.4-150600.3.12.1 updated
- util-linux-2.40.4-150700.4.3.1 updated
- libopenssl1_1-1.1.1w-150700.11.11.1 updated
- container:registry.suse.com-bci-bci-base-15.7-9efe2e5a6c38d2f8c0921b1f30f01a84e5a8a968aaa4132bec532c8be84037c1-0 updated


More information about the sle-container-updates mailing list