SUSE-CU-2026:4709-1: Security update of rancher/seedimage-builder

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Thu May 7 07:17:35 UTC 2026


SUSE Container Update Advisory: rancher/seedimage-builder
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2026:4709-1
Container Tags        : rancher/seedimage-builder:1.7.4 , rancher/seedimage-builder:1.7.4-4.55
Container Release     : 4.55
Severity              : important
Type                  : security
References            : 1084929 1084929 1215720 1216355 1216378 1218459 1221126 1222465
                        1228081 1229122 1229376 1229950 1234634 1234736 1236621 1236877
                        1238686 1238849 1238929 1240150 1240385 1240626 1240698 1241830
                        1242114 1242174 1242844 1243105 1243226 1243268 1243274 1243297
                        1243419 1243581 1243802 1243833 1243867 1244035 1244485 1244561
                        1244564 1244565 1244566 1244567 1244568 1244570 1244571 1244572
                        1244574 1244575 1244596 1244933 1245169 1245292 1245985 1246038
                        1246118 1246466 1246556 1246602 1246623 1246790 1246965 1246995
                        1247054 1247326 1247594 1247690 1247719 1247720 1247735 1247816
                        1247816 1247884 1247885 1248373 1248410 1248438 1248502 1248516
                        1248678 1248687 1249013 1249385 1249590 1250373 1250692 1250748
                        1250952 1251135 1251194 1251966 1251971 1252008 1252148 1252266
                        1252337 1252376 1252543 1252729 1252911 1252924 1253126 1253129
                        1253132 1253334 1253691 1254094 1254132 1254293 1254817 1254928
                        1255129 1255144 1255148 1255285 1255311 1255490 1255572 1255721
                        1255868 1256427 1256459 1256525 1256526 1256624 1256640 1256644
                        1256675 1256679 1256708 1256732 1256766 1256780 1256784 1256802
                        1256805 1256822 1256830 1256834 1256835 1256836 1256837 1256838
                        1256839 1256840 1256865 1256867 1257005 1257007 1257144 1257153
                        1257154 1257174 1257209 1257222 1257228 1257231 1257238 1257244
                        1257246 1257332 1257364 1257365 1257466 1257472 1257473 1257496
                        1257551 1257552 1257553 1257554 1257556 1257557 1257559 1257560
                        1257561 1257562 1257565 1257570 1257572 1257573 1257576 1257579
                        1257580 1257581 1257586 1257600 1257631 1257635 1257679 1257682
                        1257686 1257687 1257688 1257704 1257705 1257706 1257707 1257709
                        1257714 1257715 1257716 1257718 1257722 1257723 1257726 1257729
                        1257730 1257732 1257734 1257735 1257737 1257739 1257740 1257741
                        1257742 1257743 1257745 1257749 1257750 1257755 1257757 1257758
                        1257759 1257761 1257762 1257763 1257765 1257768 1257770 1257772
                        1257775 1257776 1257788 1257789 1257790 1257805 1257808 1257809
                        1257811 1257813 1257814 1257815 1257816 1257817 1257818 1257830
                        1257877 1257904 1257918 1257927 1257942 1257952 1257960 1258002
                        1258020 1258022 1258051 1258083 1258153 1258181 1258183 1258184
                        1258222 1258229 1258232 1258234 1258236 1258237 1258245 1258249
                        1258252 1258256 1258258 1258259 1258272 1258273 1258276 1258277
                        1258279 1258286 1258289 1258290 1258297 1258298 1258299 1258303
                        1258304 1258308 1258309 1258313 1258317 1258321 1258323 1258324
                        1258326 1258331 1258338 1258349 1258354 1258355 1258358 1258374
                        1258376 1258377 1258379 1258389 1258392 1258394 1258395 1258397
                        1258411 1258415 1258419 1258421 1258422 1258424 1258429 1258430
                        1258442 1258455 1258461 1258464 1258465 1258468 1258469 1258483
                        1258484 1258489 1258517 1258518 1258519 1258520 1258524 1258544
                        1258637 1258660 1258664 1258672 1258784 1258786 1258824 1258859
                        1259051 1259118 1259329 1259362 1259362 1259363 1259364 1259365
                        1259377 1259418 1259456 1259467 1259543 1259548 1259650 1259697
                        1259711 1259726 1259729 1259845 1259845 1260078 1260082 1260754
                        1260755 1260871 1261809 1261957 1262144 1262631 1262632 1262635
                        1262636 1262638 142461 391434 544339 CVE-2021-21411 CVE-2023-45853
                        CVE-2024-12224 CVE-2024-25621 CVE-2024-38822 CVE-2024-38823 CVE-2024-38824
                        CVE-2024-38825 CVE-2024-43806 CVE-2024-44906 CVE-2025-11896 CVE-2025-14831
                        CVE-2025-15281 CVE-2025-15467 CVE-2025-20053 CVE-2025-20109 CVE-2025-22236
                        CVE-2025-22237 CVE-2025-22238 CVE-2025-22239 CVE-2025-22240 CVE-2025-22241
                        CVE-2025-22242 CVE-2025-22839 CVE-2025-22840 CVE-2025-22870 CVE-2025-22872
                        CVE-2025-22889 CVE-2025-26403 CVE-2025-28162 CVE-2025-28164 CVE-2025-31133
                        CVE-2025-32086 CVE-2025-39753 CVE-2025-39964 CVE-2025-40099 CVE-2025-40103
                        CVE-2025-40230 CVE-2025-40918 CVE-2025-41244 CVE-2025-4373 CVE-2025-44779
                        CVE-2025-4674 CVE-2025-46836 CVE-2025-47287 CVE-2025-47906 CVE-2025-47907
                        CVE-2025-47907 CVE-2025-50738 CVE-2025-52565 CVE-2025-52881 CVE-2025-53534
                        CVE-2025-53906 CVE-2025-53942 CVE-2025-54386 CVE-2025-54388 CVE-2025-54389
                        CVE-2025-54409 CVE-2025-54410 CVE-2025-54424 CVE-2025-54576 CVE-2025-54799
                        CVE-2025-54801 CVE-2025-54882 CVE-2025-54996 CVE-2025-54997 CVE-2025-54998
                        CVE-2025-54999 CVE-2025-55000 CVE-2025-55001 CVE-2025-55003 CVE-2025-58160
                        CVE-2025-5999 CVE-2025-6000 CVE-2025-6004 CVE-2025-6011 CVE-2025-6013
                        CVE-2025-6014 CVE-2025-6015 CVE-2025-6018 CVE-2025-6037 CVE-2025-6052
                        CVE-2025-61962 CVE-2025-64329 CVE-2025-68160 CVE-2025-68173 CVE-2025-68186
                        CVE-2025-68292 CVE-2025-68295 CVE-2025-68329 CVE-2025-68371 CVE-2025-68745
                        CVE-2025-68785 CVE-2025-68810 CVE-2025-68813 CVE-2025-68818 CVE-2025-69418
                        CVE-2025-69419 CVE-2025-69420 CVE-2025-69421 CVE-2025-71071 CVE-2025-71085
                        CVE-2025-71104 CVE-2025-71120 CVE-2025-71125 CVE-2025-71134 CVE-2025-71161
                        CVE-2025-71182 CVE-2025-71183 CVE-2025-71184 CVE-2025-71185 CVE-2025-71186
                        CVE-2025-71188 CVE-2025-71189 CVE-2025-71190 CVE-2025-71191 CVE-2025-71192
                        CVE-2025-71193 CVE-2025-71194 CVE-2025-71195 CVE-2025-71196 CVE-2025-71197
                        CVE-2025-71198 CVE-2025-71199 CVE-2025-71200 CVE-2025-71222 CVE-2025-71224
                        CVE-2025-71225 CVE-2025-71229 CVE-2025-71231 CVE-2025-71232 CVE-2025-71233
                        CVE-2025-71234 CVE-2025-71235 CVE-2025-71236 CVE-2025-7195 CVE-2025-7700
                        CVE-2025-8058 CVE-2025-8067 CVE-2025-8341 CVE-2025-9820 CVE-2026-0861
                        CVE-2026-0915 CVE-2026-0989 CVE-2026-1965 CVE-2026-1965 CVE-2026-22693
                        CVE-2026-22695 CVE-2026-22795 CVE-2026-22796 CVE-2026-22801 CVE-2026-22979
                        CVE-2026-22980 CVE-2026-22998 CVE-2026-22999 CVE-2026-23003 CVE-2026-23004
                        CVE-2026-23010 CVE-2026-23017 CVE-2026-23018 CVE-2026-23021 CVE-2026-23022
                        CVE-2026-23023 CVE-2026-23024 CVE-2026-23026 CVE-2026-23030 CVE-2026-23031
                        CVE-2026-23033 CVE-2026-23035 CVE-2026-23037 CVE-2026-23038 CVE-2026-23042
                        CVE-2026-23047 CVE-2026-23049 CVE-2026-23050 CVE-2026-23053 CVE-2026-23054
                        CVE-2026-23055 CVE-2026-23056 CVE-2026-23057 CVE-2026-23058 CVE-2026-23059
                        CVE-2026-23060 CVE-2026-23061 CVE-2026-23062 CVE-2026-23063 CVE-2026-23064
                        CVE-2026-23065 CVE-2026-23066 CVE-2026-23068 CVE-2026-23069 CVE-2026-23070
                        CVE-2026-23071 CVE-2026-23073 CVE-2026-23074 CVE-2026-23074 CVE-2026-23076
                        CVE-2026-23078 CVE-2026-23080 CVE-2026-23082 CVE-2026-23083 CVE-2026-23084
                        CVE-2026-23085 CVE-2026-23086 CVE-2026-23088 CVE-2026-23089 CVE-2026-23090
                        CVE-2026-23091 CVE-2026-23094 CVE-2026-23095 CVE-2026-23096 CVE-2026-23097
                        CVE-2026-23099 CVE-2026-23100 CVE-2026-23101 CVE-2026-23102 CVE-2026-23104
                        CVE-2026-23105 CVE-2026-23107 CVE-2026-23108 CVE-2026-23110 CVE-2026-23111
                        CVE-2026-23111 CVE-2026-23112 CVE-2026-23116 CVE-2026-23119 CVE-2026-23121
                        CVE-2026-23123 CVE-2026-23128 CVE-2026-23129 CVE-2026-23131 CVE-2026-23133
                        CVE-2026-23135 CVE-2026-23136 CVE-2026-23137 CVE-2026-23139 CVE-2026-23141
                        CVE-2026-23142 CVE-2026-23144 CVE-2026-23145 CVE-2026-23146 CVE-2026-23148
                        CVE-2026-23150 CVE-2026-23151 CVE-2026-23152 CVE-2026-23154 CVE-2026-23155
                        CVE-2026-23156 CVE-2026-23157 CVE-2026-23158 CVE-2026-23161 CVE-2026-23163
                        CVE-2026-23166 CVE-2026-23167 CVE-2026-23169 CVE-2026-23170 CVE-2026-23171
                        CVE-2026-23172 CVE-2026-23173 CVE-2026-23176 CVE-2026-23177 CVE-2026-23178
                        CVE-2026-23179 CVE-2026-23182 CVE-2026-23188 CVE-2026-23189 CVE-2026-23190
                        CVE-2026-23191 CVE-2026-23198 CVE-2026-23202 CVE-2026-23207 CVE-2026-23208
                        CVE-2026-23209 CVE-2026-23209 CVE-2026-23210 CVE-2026-23213 CVE-2026-23214
                        CVE-2026-23221 CVE-2026-23222 CVE-2026-23223 CVE-2026-23224 CVE-2026-23229
                        CVE-2026-23230 CVE-2026-23865 CVE-2026-24515 CVE-2026-25210 CVE-2026-25646
                        CVE-2026-25727 CVE-2026-25727 CVE-2026-25727 CVE-2026-25799 CVE-2026-26269
                        CVE-2026-26996 CVE-2026-27135 CVE-2026-27135 CVE-2026-27171 CVE-2026-28417
                        CVE-2026-28690 CVE-2026-29111 CVE-2026-30883 CVE-2026-3184 CVE-2026-31979
                        CVE-2026-32776 CVE-2026-32777 CVE-2026-32778 CVE-2026-33416 CVE-2026-33636
                        CVE-2026-34352 CVE-2026-34757 CVE-2026-3731 CVE-2026-3783 CVE-2026-3784
                        CVE-2026-3805 CVE-2026-4105 CVE-2026-4437 CVE-2026-4438 CVE-2026-4873
                        CVE-2026-4878 CVE-2026-5545 CVE-2026-5958 CVE-2026-6253 CVE-2026-6276
                        CVE-2026-6429 
-----------------------------------------------------------------

The container rancher/seedimage-builder was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: 386
Released:    Fri Feb 13 15:09:31 2026
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  1228081,1243226,1254094,1254293,1255285,1256427,1257007,1257153,1257244,CVE-2025-6018
This update for systemd fixes the following issues:

- Name libsystemd-{shared,core} based on the major version of systemd and
  the package release number (bsc#1228081, bsc#1256427)
  This way, both the old and new versions of the shared libraries will be
  present during the update. This should prevent issues during package updates
  when incompatible changes are introduced in the new versions of the shared libraries.
- detect-virt: bare-metal GCE only for x86 and i386 (bsc#1254293)

-----------------------------------------------------------------
Advisory ID: 392
Released:    Mon Feb 16 09:18:45 2026
Summary:     Security update for libxml2
Type:        security
Severity:    moderate
References:  1236621,1236877,1238686,1238849,1238929,1240626,1240698,1242174,1243105,1243268,1243274,1243297,1243802,1244561,1244564,1244565,1244566,1244567,1244568,1244570,1244571,1244572,1244574,1244575,1252729,1256805,CVE-2024-38822,CVE-2024-38823,CVE-2024-38824,CVE-2024-38825,CVE-2025-22236,CVE-2025-22237,CVE-2025-22238,CVE-2025-22239,CVE-2025-22240,CVE-2025-22241,CVE-2025-22242,CVE-2025-22870,CVE-2025-47287,CVE-2026-0989
This update for libxml2 fixes the following issues:
  
- CVE-2026-0989: Fixed call stack exhaustion leading to application crash 
  due to RelaxNG parser not limiting the recursion depth when 
  resolving `<include>` directives (bsc#1256805).

-----------------------------------------------------------------
Advisory ID: 395
Released:    Mon Feb 16 09:54:43 2026
Summary:     Security update for openssl-3
Type:        security
Severity:    moderate
References:  1242844,1244596,1256830,1256834,1256835,1256836,1256837,1256838,1256839,1256840,1257918,CVE-2025-15467,CVE-2025-4373,CVE-2025-6052,CVE-2025-68160,CVE-2025-69418,CVE-2025-69419,CVE-2025-69420,CVE-2025-69421,CVE-2026-22795,CVE-2026-22796,CVE-2026-25727
This update for openssl-3 fixes the following issues:

 - CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing (bsc#1256830).
 - CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834).
 - CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (bsc#1256835).
 - CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (bsc#1256836).
 - CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
 - CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
 - CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing (bsc#1256839).
 - CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).

-----------------------------------------------------------------
Advisory ID: 410
Released:    Tue Feb 17 10:33:51 2026
Summary:     Security update for expat
Type:        security
Severity:    important
References:  1229376,1229950,1243867,1245169,1257144,1257496,391434,CVE-2024-12224,CVE-2024-43806,CVE-2026-24515,CVE-2026-25210
This update for expat fixes the following issues:

- CVE-2026-24515: failure to copy the encoding handler data passed to XML_SetUnknownEncodingHandler may cause a NULL
  dereference (bsc#1257144).
- CVE-2026-25210: lack of buffer size check can lead to an integer overflow (bsc#1257496).

-----------------------------------------------------------------
Advisory ID: 398
Released:    Tue Feb 17 10:40:29 2026
Summary:     Recommended update for grub2
Type:        recommended
Severity:    important
References:  1240150,1241830,1242114,1243833,1244035,1246556,1248516,1257877,1257927,CVE-2025-22872,CVE-2026-25727
This update for grub2 fixes the following issues:

- Optimize PBKDF2 to reduce the decryption time (bsc#1248516)
    * lib/crypto: Introduce new HMAC functions to reuse buffers
    * lib/pbkdf2: Optimize PBKDF2 by reusing HMAC handle
    * kern/misc: Implement faster grub_memcpy() for aligned buffers

-----------------------------------------------------------------
Advisory ID: 411
Released:    Thu Feb 26 12:25:49 2026
Summary:     Security update for libpng16
Type:        security
Severity:    important
References:  1218459,1245985,1246038,1246466,1247054,1247690,1252337,1256525,1256526,1257364,1257365,1258020,CVE-2025-11896,CVE-2025-28162,CVE-2025-28164,CVE-2026-22695,CVE-2026-22801,CVE-2026-25646
This update for libpng16 fixes the following issues:

- CVE-2026-25646: Fixed a heap buffer overflow vulnerability in png_set_dither/png_set_quantize (bsc#1258020).
- CVE-2025-28162: memory leaks when running `pngimage` (bsc#1257364).
- CVE-2025-28164: memory leaks when running `pngimage` (bsc#1257365).
- CVE-2026-22695: Fixed heap buffer over-read in png_image_finish_read (bsc#1256525).
- CVE-2026-22801: Fixed integer truncation causing heap buffer over-read in png_image_write_* (bsc#1256526).

-----------------------------------------------------------------
Advisory ID: 417
Released:    Mon Mar  2 15:52:11 2026
Summary:     Security update for glibc
Type:        security
Severity:    important
References:  1240385,1244933,1246602,1246965,1256766,1256822,1257005,1258229,1259051,CVE-2025-15281,CVE-2025-53906,CVE-2025-8058,CVE-2026-0861,CVE-2026-0915,CVE-2026-26269,CVE-2026-28417
This update for glibc fixes the following issues:

- CVE-2026-0861: inadequate size check in the memalign suite may result in an integer overflow (bsc#1256766).
- CVE-2026-0915: uninitialized stack buffer used as DNS query name when net==0 in _nss_dns_getnetbyaddr_r (bsc#1256822).
- CVE-2025-15281: uninitialized memory may cause the process abort (bsc#1257005).
- CVE-2025-8058: a malloc failure in regcomp function can lead to a double free (bsc#1246965).

-----------------------------------------------------------------
Advisory ID: 423
Released:    Wed Mar  4 10:35:51 2026
Summary:     Security update for ca-certificates-mozilla
Type:        security
Severity:    moderate
References:  1256459,1258002,CVE-2021-21411,CVE-2024-44906,CVE-2025-44779,CVE-2025-47907,CVE-2025-50738,CVE-2025-53534,CVE-2025-53942,CVE-2025-54386,CVE-2025-54388,CVE-2025-54410,CVE-2025-54424,CVE-2025-54576,CVE-2025-54799,CVE-2025-54801,CVE-2025-54996,CVE-2025-54997,CVE-2025-54998,CVE-2025-54999,CVE-2025-55000,CVE-2025-55001,CVE-2025-55003,CVE-2025-5999,CVE-2025-6000,CVE-2025-6004,CVE-2025-6011,CVE-2025-6013,CVE-2025-6014,CVE-2025-6015,CVE-2025-6037,CVE-2025-7195,CVE-2025-8341,CVE-2026-22693
This update for ca-certificates-mozilla fixes the following issues:

- Updated to 2.84 state of Mozilla SSL root CAs (bsc#1258002)

  - Removed:
    - Baltimore CyberTrust Root
    - CommScope Public Trust ECC Root-01
    - CommScope Public Trust ECC Root-02
    - CommScope Public Trust RSA Root-01
    - CommScope Public Trust RSA Root-02
    - DigiNotar Root CA

  - Added: 
    - e-Szigno TLS Root CA 2023
    - OISTE Client Root ECC G1
    - OISTE Client Root RSA G1
    - OISTE Server Root ECC G1
    - OISTE Server Root RSA G1
    - SwissSign RSA SMIME Root CA 2022 - 1
    - SwissSign RSA TLS Root CA 2022 - 1
    - TrustAsia SMIME ECC Root CA
    - TrustAsia SMIME RSA Root CA
    - TrustAsia TLS ECC Root CA
    - TrustAsia TLS RSA Root CA

-----------------------------------------------------------------
Advisory ID: 432
Released:    Mon Mar  9 11:25:10 2026
Summary:     Security update for zlib
Type:        security
Severity:    moderate
References:  1216378,1245292,1247326,1247816,1258392,1259845,CVE-2023-45853,CVE-2026-27135,CVE-2026-27171
This update for zlib fixes the following issues:

- CVE-2026-27171: Fixed an infinite loop via the crc32_combine64 and crc32_combine_gen64 functions due to missing checks for negative lengths. (bsc#1258392)
- CVE-2023-45853: Fixed an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6. (bsc#1216378)

-----------------------------------------------------------------
Advisory ID: 435
Released:    Tue Mar 10 19:43:23 2026
Summary:     Security update for util-linux
Type:        security
Severity:    moderate
References:  1229122,1234634,1246118,1247719,1247720,1247816,1249590,1250748,1251135,1251966,1251971,1252008,1252266,1252911,1252924,1253129,1253691,1254817,1254928,1255129,1255144,1255148,1255311,1255490,1255572,1255721,1255868,1256640,1256675,1256679,1256708,1256732,1256784,1256802,1256865,1256867,1257154,1257174,1257209,1257222,1257228,1257231,1257246,1257332,1257466,1257472,1257473,1257551,1257552,1257553,1257554,1257556,1257557,1257559,1257560,1257561,1257562,1257565,1257570,1257572,1257573,1257576,1257579,1257580,1257581,1257586,1257600,1257631,1257635,1257679,1257682,1257686,1257687,1257688,1257704,1257705,1257706,1257707,1257709,1257714,1257715,1257716,1257718,1257722,1257723,1257726,1257729,1257730,1257732,1257734,1257735,1257737,1257739,1257740,1257741,1257742,1257743,1257745,1257749,1257750,1257755,1257757,1257758,1257759,1257761,1257762,1257763,1257765,1257768,1257770,1257772,1257775,1257776,1257788,1257789,1257790,1257805,1257808,1257809,1257811,1257813,1257814,1257815,1
 257816,1257817,1257818,1257830,1257942,1257952,1258153,1258181,1258184,1258222,1258232,1258234,1258237,1258245,1258249,1258252,1258256,1258258,1258259,1258272,1258273,1258276,1258277,1258279,1258286,1258289,1258290,1258297,1258298,1258299,1258303,1258304,1258308,1258309,1258313,1258317,1258321,1258323,1258324,1258326,1258331,1258338,1258349,1258354,1258355,1258358,1258374,1258376,1258377,1258379,1258389,1258394,1258395,1258397,1258411,1258415,1258419,1258421,1258422,1258424,1258429,1258430,1258442,1258455,1258461,1258464,1258465,1258468,1258469,1258483,1258484,1258489,1258517,1258518,1258519,1258520,1258524,1258544,1258660,1258672,1258824,1258859,1259329,CVE-2025-39753,CVE-2025-39964,CVE-2025-40099,CVE-2025-40103,CVE-2025-40230,CVE-2025-4674,CVE-2025-47906,CVE-2025-47907,CVE-2025-68173,CVE-2025-68186,CVE-2025-68292,CVE-2025-68295,CVE-2025-68329,CVE-2025-68371,CVE-2025-68745,CVE-2025-68785,CVE-2025-68810,CVE-2025-68818,CVE-2025-71071,CVE-2025-71104,CVE-2025-71125,CVE-2025-71134,CVE-2
 025-71161,CVE-2025-71182,CVE-2025-71183,CVE-2025-71184,CVE-2025-71185,CVE-2025-71186,CVE-2025-71188,CVE-2025-71189,CVE-2025-71190,CVE-2025-71191,CVE-2025-71192,CVE-2025-71193,CVE-2025-71194,CVE-2025-71195,CVE-2025-71196,CVE-2025-71197,CVE-2025-71198,CVE-2025-71199,CVE-2025-71200,CVE-2025-71222,CVE-2025-71224,CVE-2025-71225,CVE-2025-71229,CVE-2025-71231,CVE-2025-71232,CVE-2025-71233,CVE-2025-71234,CVE-2025-71235,CVE-2025-71236,CVE-2026-22979,CVE-2026-22980,CVE-2026-22998,CVE-2026-23003,CVE-2026-23004,CVE-2026-23010,CVE-2026-23017,CVE-2026-23018,CVE-2026-23021,CVE-2026-23022,CVE-2026-23023,CVE-2026-23024,CVE-2026-23026,CVE-2026-23030,CVE-2026-23031,CVE-2026-23033,CVE-2026-23035,CVE-2026-23037,CVE-2026-23038,CVE-2026-23042,CVE-2026-23047,CVE-2026-23049,CVE-2026-23050,CVE-2026-23053,CVE-2026-23054,CVE-2026-23055,CVE-2026-23056,CVE-2026-23057,CVE-2026-23058,CVE-2026-23059,CVE-2026-23060,CVE-2026-23061,CVE-2026-23062,CVE-2026-23063,CVE-2026-23064,CVE-2026-23065,CVE-2026-23066,CVE-2026-230
 68,CVE-2026-23069,CVE-2026-23070,CVE-2026-23071,CVE-2026-23073,CVE-2026-23074,CVE-2026-23076,CVE-2026-23078,CVE-2026-23080,CVE-2026-23082,CVE-2026-23083,CVE-2026-23084,CVE-2026-23085,CVE-2026-23086,CVE-2026-23088,CVE-2026-23089,CVE-2026-23090,CVE-2026-23091,CVE-2026-23094,CVE-2026-23095,CVE-2026-23096,CVE-2026-23097,CVE-2026-23099,CVE-2026-23100,CVE-2026-23101,CVE-2026-23102,CVE-2026-23104,CVE-2026-23105,CVE-2026-23107,CVE-2026-23108,CVE-2026-23110,CVE-2026-23111,CVE-2026-23112,CVE-2026-23116,CVE-2026-23119,CVE-2026-23121,CVE-2026-23123,CVE-2026-23128,CVE-2026-23129,CVE-2026-23131,CVE-2026-23133,CVE-2026-23135,CVE-2026-23136,CVE-2026-23137,CVE-2026-23139,CVE-2026-23141,CVE-2026-23142,CVE-2026-23144,CVE-2026-23145,CVE-2026-23146,CVE-2026-23148,CVE-2026-23150,CVE-2026-23151,CVE-2026-23152,CVE-2026-23154,CVE-2026-23155,CVE-2026-23156,CVE-2026-23157,CVE-2026-23158,CVE-2026-23161,CVE-2026-23163,CVE-2026-23166,CVE-2026-23167,CVE-2026-23169,CVE-2026-23170,CVE-2026-23171,CVE-2026-23172,CVE-
 2026-23173,CVE-2026-23176,CVE-2026-23177,CVE-2026-23178,CVE-2026-23179,CVE-2026-23182,CVE-2026-23188,CVE-2026-23189,CVE-2026-23190,CVE-2026-23191,CVE-2026-23198,CVE-2026-23202,CVE-2026-23207,CVE-2026-23208,CVE-2026-23209,CVE-2026-23210,CVE-2026-23213,CVE-2026-23214,CVE-2026-23221,CVE-2026-23222,CVE-2026-23223,CVE-2026-23224,CVE-2026-23229,CVE-2026-23230,CVE-2026-3184
This update for util-linux fixes the following issue:

- CVE-2026-3184: access control bypass due to improper hostname canonicalization in `login` (bsc#1258859).

-----------------------------------------------------------------
Advisory ID: 440
Released:    Thu Mar 12 11:27:47 2026
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1243419,1246995,1256624,1256644,1259362,1259363,1259364,1259365,CVE-2025-68813,CVE-2025-71085,CVE-2026-1965,CVE-2026-3783,CVE-2026-3784,CVE-2026-3805
This update for curl fixes the following issues:

- CVE-2026-1965: bad reuse of HTTP Negotiate connection (bsc#1259362).
- CVE-2026-3783: token leak with redirect and netrc (bsc#1259363).
- CVE-2026-3784: wrong proxy connection reuse with credentials (bsc#1259364).
- CVE-2026-3805: use after free in SMB connection reuse (bsc#1259365).

-----------------------------------------------------------------
Advisory ID: 442
Released:    Mon Mar 16 10:25:28 2026
Summary:     Security update for freetype2
Type:        security
Severity:    moderate
References:  1084929,1246790,1252148,1259118,CVE-2025-7700,CVE-2026-23865
This update for freetype2 fixes the following issue:

Update to freetype2 2.14.2:

- CVE-2026-23865: Integer overflow in the tt_var_load_item_variation_store function (bsc#1259118).

Changelog:
  
 * Several changes related to LCD filtering are implemented to
 achieve better performance and encourage sound practices.
 * Instead of blanket LCD filtering over the entire bitmap, it
 is now applied only to non-zero spans using direct rendering.
 This speeds up the ClearType-like rendering by more than 40%
 at sizes above 32 ppem.
 * Setting the filter weights with FT_Face_Properties is no
 longer supported. The default and light filters are optimized
 to work with any face.
 * The legacy libXft LCD filter algorithm is no longer provided.
 * A bunch of potential security problems have been found
 (bsc#1259118, CVE-2026-23865). All users should update.
 * The italic angle in `PS_FontInfo` is now stored as a fixed-point
 value in degrees for all Type 1 fonts and their derivatives,
 consistent with CFF fonts and common practices. The broken
 underline position and thickness values are fixed for CFF fonts.
 * The `x` field in the `FT_Span` structure is now unsigned.
 * Demo program `ftgrid` got an option `-m` to select a start
 character to display.
 * Similarly, demo program `ftmulti` got an option `-m` to select a
 text string for rendering.
 * Option `-d` in the demo program `ttdebug` is now called `-a`,
 expecting a comma-separated list of axis values. The user
 interface is also slightly improved.
 * The `ftinspect` demo program can now be compiled with Qt6, too.
 * The auto-hinter got new abilities. It can now better separate
 diacritic glyphs from base glyphs at small sizes by
 artificially moving diacritics up (or down) if necessary
 * Tilde accent glyphs get vertically stretched at small sizes so
 that they don't degenerate to horizontal lines.
 * Diacritics directly attached to a base glyph (like the ogonek in
 character 'Ä™') no longer distort the shape of the base glyph
 * The TrueType instruction interpreter was optimized to
 produce a 15% gain in the glyph loading speed.
 * Handling of Variation Fonts is now considerably faster
 * TrueType and CFF glyph loading speed has been improved by 5-10%
 on modern 64-bit platforms as a result of better handling of
 fixed-point multiplication.
 * The BDF driver now loads fonts 75% faster.

-----------------------------------------------------------------
Advisory ID: 449
Released:    Thu Mar 19 12:24:33 2026
Summary:     Security update for libssh
Type:        security
Severity:    moderate
References:  1247884,1247885,1251194,1259377,CVE-2025-54389,CVE-2025-54409,CVE-2025-61962,CVE-2026-3731
This update for libssh fixes the following issue:

- CVE-2026-3731: Denial of Service via out-of-bounds read in SFTP extension name handler (bsc#1259377).

-----------------------------------------------------------------
Advisory ID: 458
Released:    Tue Mar 24 10:38:06 2026
Summary:     Security update for systemd
Type:        security
Severity:    important
References:  1248438,1258786,1259418,1259456,1259467,1259650,1259697,CVE-2025-20053,CVE-2025-20109,CVE-2025-22839,CVE-2025-22840,CVE-2025-22889,CVE-2025-26403,CVE-2025-32086,CVE-2026-25799,CVE-2026-28690,CVE-2026-29111,CVE-2026-30883,CVE-2026-4105
This update for systemd fixes the following issues:

- CVE-2026-4105: privilege escalation due to improper access control in RegisterMachine D-Bus method (bsc#1259650).
- CVE-2026-29111: local unprivileged user can trigger an assert in systemd (bsc#1259418).
- udev: check for invalid chars in various fields received from the kernel (bsc#1259697).  

Changelog:

- a943e3ce2f machined: reject invalid class types when registering machines 
- 71593f77db udev: fix review mixup
- 73a89810b4 udev-builtin-net-id: print cescaped bad attributes
- 0f360bfdc0 udev-builtin-net_id: do not assume the current interface name is ethX
- 40905232e2 udev: ensure tag parsing stays within bounds
- 7bce9026e3 udev: ensure there is space for trailing NUL before calling sprintf
- d018ac1ea3 udev: check for invalid chars in various fields received from the kernel
- aef6e11921 core/cgroup: avoid one unnecessary strjoina()
- cc7426f38a sd-json: fix off-by-one issue when updating parent for array elements
- 26a748f727 core: validate input cgroup path more prudently 
- 99d8308fde core/dbus-manager: propagate meaningful dbus errors from EnqueueMarkedJobs

-----------------------------------------------------------------
Advisory ID: 464
Released:    Fri Mar 27 10:41:48 2026
Summary:     Security update for nghttp2
Type:        security
Severity:    important
References:  1248502,1254132,1257960,1258083,1259845,CVE-2025-14831,CVE-2025-8067,CVE-2025-9820,CVE-2026-27135
This update for nghttp2 fixes the following issue:

- CVE-2026-27135: assertion failure due to missing state validation can lead to DoS (bsc#1259845).

-----------------------------------------------------------------
Advisory ID: 471
Released:    Tue Apr  7 13:08:58 2026
Summary:     Security update for expat
Type:        security
Severity:    important
References:  1247594,1247735,1248373,1249013,1257904,1258236,1259548,1259711,1259726,1259729,CVE-2025-54882,CVE-2025-58160,CVE-2026-25727,CVE-2026-31979,CVE-2026-32776,CVE-2026-32777,CVE-2026-32778
This update for expat fixes the following issues:

- CVE-2026-32776: NULL pointer dereference when processing empty external parameter entities inside an entity
  declaration value (bsc#1259726).
- CVE-2026-32777: denial of service due to infinite loop in DTD content parsing (bsc#1259711).
- CVE-2026-32778: NULL pointer dereference in `setContext` on retry after an out-of-memory condition (bsc#1259729).

-----------------------------------------------------------------
Advisory ID: 479
Released:    Thu Apr  9 12:48:50 2026
Summary:     Security update for libpng16
Type:        security
Severity:    important
References:  1248678,1260754,1260755,1260871,CVE-2026-33416,CVE-2026-33636,CVE-2026-34352
This update for libpng16 fixes the following issues:

- CVE-2026-33416: use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE` can lead to arbitrary code
  execution (bsc#1260754).
- CVE-2026-33636: out-of-bounds read/write in the palette expansion on ARM Neon can lead to information leak and
  crashes (bsc#1260755).

-----------------------------------------------------------------
Advisory ID: 478
Released:    Thu Apr  9 13:38:10 2026
Summary:     Security update for glibc
Type:        security
Severity:    important
References:  1243581,1248410,1248687,1258637,1260078,1260082,142461,544339,CVE-2025-46836,CVE-2026-26996,CVE-2026-4437,CVE-2026-4438
This update for glibc fixes the following issues:

- CVE-2026-4437: incorrect DNS response parsing via crafted DNS server response (bsc#1260078).
- CVE-2026-4438: invalid DNS hostname returned via gethostbyaddr functions (bsc#1260082).

-----------------------------------------------------------------
Advisory ID: 494
Released:    Mon Apr 20 19:04:13 2026
Summary:     Security update for libcap
Type:        security
Severity:    important
References:  1261809,CVE-2026-4878
This update for libcap fixes the following issue:

- CVE-2026-4878: local privilege escalation through file capability injection due to TOCTOU race condition in
  `cap_set_file()` (bsc#1261809).

-----------------------------------------------------------------
Advisory ID: 495
Released:    Mon Apr 20 19:12:53 2026
Summary:     Recommended update for util-linux
Type:        recommended
Severity:    moderate
References:  1222465,1234736,1246623,1250373,1250692,CVE-2025-40918,CVE-2025-41244
This update for util-linux fixes the following issues:

- Recognize fuse 'portal' as a virtual file system (bsc#1234736)

- fdisk: Fix possible partition overlay and data corruption if EBR
  gap is missing (bsc#1222465)

-----------------------------------------------------------------
Advisory ID: 499
Released:    Tue Apr 21 10:33:03 2026
Summary:     Security update for libpng16
Type:        security
Severity:    moderate
References:  1084929,1215720,1216355,1258664,1261957,CVE-2026-34757
This update for libpng16 fixes the following issue:

- CVE-2026-34757: libpng: Information disclosure and data corruption via use-after-free vulnerability (bsc#1261957).

-----------------------------------------------------------------
Advisory ID: 497
Released:    Tue Apr 21 10:42:57 2026
Summary:     Recommended update for grub2
Type:        recommended
Severity:    important
References:  1221126,1244485,1249385,1250952,1258022,1259543
This update for grub2 fixes the following issues:

- Fix missing install device check in grub2-install on PowerPC which could lead
  to bootlist corruption (bsc#1221126)
    * add mandatory install device check for PowerPC
- Fix PowerPC network boot prefix to correctly locate grub.cfg (bsc#1249385)
    * use net config for boot location instead of
- Fix double free in xen booting if root filesystem is Btrfs (bsc#1259543)
    * btrfs: add ability to boot from subvolumes
    * btrfs: get default subvolume
- Backport upstream's commit to prevent BIOS assert (bsc#1258022)

-----------------------------------------------------------------
Advisory ID: 513
Released:    Mon Apr 27 19:14:51 2026
Summary:     Security update for sed
Type:        security
Severity:    moderate
References:  1252376,1252543,1253334,1262144,CVE-2025-31133,CVE-2025-52565,CVE-2025-52881,CVE-2026-5958
This update for sed fixes the following issue:

- CVE-2026-5958: TOCTOU race allows write of user-controlled content to unintended files and can lead to arbitrary file
  overwrite (bsc#1262144).

-----------------------------------------------------------------
Advisory ID: 517
Released:    Thu Apr 30 16:47:08 2026
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1253126,1253132,1256780,1257238,1258051,1258183,1258784,1259362,1262631,1262632,1262635,1262636,1262638,CVE-2024-25621,CVE-2025-64329,CVE-2025-71120,CVE-2026-1965,CVE-2026-22999,CVE-2026-23074,CVE-2026-23111,CVE-2026-23209,CVE-2026-4873,CVE-2026-5545,CVE-2026-6253,CVE-2026-6276,CVE-2026-6429
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2026-4873: connection reuse ignores TLS requirement (bsc#1262631).
- CVE-2026-5545: wrong reuse of HTTP Negotiate connection (bsc#1262632).
- CVE-2026-6253: proxy credentials leak over redirect-to proxy (bsc#1262635).
- CVE-2026-6276: stale custom cookie host causes cookie leak (bsc#1262636).
- CVE-2026-6429: netrc credential leak with reused proxy connection (bsc#1262638).

Other updates and bugfixes:

- sws: prevent 'connection monitor' to say disconnect twice (bsc#1259362).


The following package changes have been done:

- boost-license1_84_0-1.84.0-slfo.1.1_1.4 updated
- btrfsprogs-udev-rules-6.8.1-slfo.1.1_1.2 updated
- compat-usrmerge-tools-84.87-slfo.1.1_1.5 updated
- crypto-policies-20230920.570ea89-slfo.1.1_2.1 updated
- elemental-httpfy-1.7.4-slfo.1.1_1.1 updated
- elemental-seedimage-hooks-1.7.4-slfo.1.1_1.1 updated
- libsemanage-conf-3.5-slfo.1.1_1.3 updated
- libssh-config-0.10.6-slfo.1.1_5.1 added
- pkgconf-m4-1.8.0-slfo.1.1_1.5 updated
- system-user-root-20190513-slfo.1.1_1.2 updated
- filesystem-84.87-slfo.1.1_1.2 updated
- glibc-2.38-slfo.1.1_7.1 updated
- libzstd1-1.5.5-slfo.1.1_1.4 updated
- libz1-1.2.13-slfo.1.1_2.1 updated
- libxxhash0-0.8.1-slfo.1.1_2.1 updated
- libverto1-0.3.2-slfo.1.1_1.2 added
- libuuid1-2.40.4-slfo.1.1_5.1 updated
- liburcu8-0.14.0-slfo.1.1_1.3 updated
- libunistring5-1.1-slfo.1.1_1.2 updated
- libtextstyle0-0.21.1-slfo.1.1_2.1 updated
- libtasn1-6-4.19.0-slfo.1.1_3.1 updated
- libsmartcols1-2.40.4-slfo.1.1_5.1 updated
- libsepol2-3.5-slfo.1.1_1.3 updated
- libseccomp2-2.5.4-slfo.1.1_1.4 updated
- libsasl2-3-2.1.28-slfo.1.1_1.2 added
- libpopt0-1.19-slfo.1.1_1.3 updated
- libpkgconf3-1.8.0-slfo.1.1_1.5 updated
- libpcre2-8-0-10.42-slfo.1.1_1.4 updated
- libparted-fs-resize0-3.5-slfo.1.1_1.2 updated
- libnss_usrfiles2-2.27-slfo.1.1_1.3 updated
- libnghttp2-14-1.52.0-slfo.1.1_2.1 updated
- liblzo2-2-2.10-slfo.1.1_1.3 updated
- liblzma5-5.4.3-slfo.1.1_2.1 updated
- liblz4-1-1.9.4-slfo.1.1_1.2 updated
- liblua5_4-5-5.4.6-slfo.1.1_1.3 updated
- libkeyutils1-1.6.3-slfo.1.1_1.3 added
- libjson-c5-0.16-slfo.1.1_1.2 updated
- libjitterentropy3-3.4.1-slfo.1.1_1.3 updated
- libip4tc2-1.8.9-slfo.1.1_2.1 updated
- libgpg-error0-1.47-slfo.1.1_1.3 updated
- libgmp10-6.3.0-slfo.1.1_1.5 updated
- libgcc_s1-14.3.0+git11799-slfo.1.1_1.1 updated
- libfuse2-2.9.9-slfo.1.1_1.2 updated
- libffi8-3.4.6-slfo.1.1_1.4 updated
- libexpat1-2.7.1-slfo.1.1_5.1 updated
- libeconf0-0.7.2-slfo.1.1_1.3 updated
- libcrypt1-4.4.36-slfo.1.1_1.4 updated
- libcom_err2-1.47.0-slfo.1.1_1.2 updated
- libcap2-2.69-slfo.1.1_2.1 updated
- libcap-ng0-0.8.3-slfo.1.1_1.4 updated
- libbz2-1-1.0.8-slfo.1.1_1.4 updated
- libburn4-1.5.4-slfo.1.1_1.2 updated
- libbtrfsutil1-6.8.1-slfo.1.1_1.2 updated
- libbtrfs0-6.8.1-slfo.1.1_1.2 updated
- libbrotlicommon1-1.1.0-slfo.1.1_1.3 updated
- libaudit1-3.1.1-slfo.1.1_2.1 updated
- libattr1-2.5.1-slfo.1.1_1.3 updated
- libargon2-1-20190702-slfo.1.1_1.2 updated
- libalternatives1-1.2+30.a5431e9-slfo.1.1_1.3 updated
- libaio1-0.3.113-slfo.1.1_1.2 updated
- libacl1-2.3.1-slfo.1.1_1.3 updated
- fillup-1.42-slfo.1.1_2.2 updated
- dosfstools-4.2-slfo.1.1_1.2 updated
- diffutils-3.10-slfo.1.1_1.3 updated
- libpng16-16-1.6.43-slfo.1.1_5.1 updated
- libidn2-0-2.3.4-slfo.1.1_1.2 updated
- pkgconf-1.8.0-slfo.1.1_1.5 updated
- libselinux1-3.5-slfo.1.1_1.3 updated
- netcfg-11.6-slfo.1.1_1.2 updated
- libxml2-2-2.11.6-slfo.1.1_8.1 updated
- squashfs-4.6.1-slfo.1.1_1.2 updated
- libgcrypt20-1.10.3-slfo.1.1_3.1 updated
- libstdc++6-14.3.0+git11799-slfo.1.1_1.1 updated
- libp11-kit0-0.25.3-slfo.1.1_1.2 updated
- libblkid1-2.40.4-slfo.1.1_5.1 updated
- perl-base-5.38.2-slfo.1.1_2.1 updated
- libext2fs2-1.47.0-slfo.1.1_1.2 updated
- libudev1-254.27-slfo.1.1_4.1 updated
- chkstat-1600_20240206-slfo.1.1_1.5 updated
- libzio1-1.08-slfo.1.1_1.3 updated
- libjte2-1.22-slfo.1.1_1.2 updated
- libbrotlidec1-1.1.0-slfo.1.1_1.3 updated
- alts-1.2+30.a5431e9-slfo.1.1_1.3 updated
- libpsl5-0.21.2-slfo.1.1_1.2 updated
- sed-4.9-slfo.1.1_2.1 updated
- libsubid4-4.15.1-slfo.1.1_1.3 updated
- libsemanage2-3.5-slfo.1.1_1.3 updated
- findutils-4.9.0-slfo.1.1_2.1 updated
- libsystemd0-254.27-slfo.1.1_4.1 updated
- libncurses6-6.4.20240224-slfo.1.1_2.1 updated
- terminfo-base-6.4.20240224-slfo.1.1_2.1 updated
- libinih0-56-slfo.1.1_1.3 updated
- libboost_thread1_84_0-1.84.0-slfo.1.1_1.4 updated
- p11-kit-0.25.3-slfo.1.1_1.2 updated
- p11-kit-tools-0.25.3-slfo.1.1_1.2 updated
- libmount1-2.40.4-slfo.1.1_5.1 updated
- libfdisk1-2.40.4-slfo.1.1_5.1 updated
- libisofs6-1.5.4-slfo.1.1_1.2 updated
- libfreetype6-2.14.2-slfo.1.1_1.1 updated
- ncurses-utils-6.4.20240224-slfo.1.1_2.1 updated
- libreadline8-8.2-slfo.1.1_1.4 updated
- libedit0-20210910.3.1-slfo.1.1_1.3 updated
- gptfdisk-1.0.9-slfo.1.1_2.1 updated
- libisoburn1-1.5.4-slfo.1.1_1.2 updated
- bash-5.2.15-slfo.1.1_1.6 updated
- bash-sh-5.2.15-slfo.1.1_1.6 updated
- xz-5.4.3-slfo.1.1_2.1 updated
- systemd-default-settings-branding-openSUSE-0.7-slfo.1.1_1.2 updated
- systemd-default-settings-0.7-slfo.1.1_1.2 updated
- pkgconf-pkg-config-1.8.0-slfo.1.1_1.5 updated
- login_defs-4.15.1-slfo.1.1_1.3 updated
- libdevmapper1_03-2.03.22_1.02.196-slfo.1.1_1.3 updated
- gzip-1.13-slfo.1.1_2.4 updated
- grep-3.11-slfo.1.1_1.2 updated
- gettext-runtime-0.21.1-slfo.1.1_2.1 updated
- coreutils-9.4-slfo.1.1_2.1 updated
- ALP-dummy-release-0.1-slfo.1.1_1.5 updated
- libparted2-3.5-slfo.1.1_1.2 updated
- libdevmapper-event1_03-2.03.22_1.02.196-slfo.1.1_1.3 updated
- info-7.0.3-slfo.1.1_1.3 updated
- xfsprogs-6.5.0-slfo.1.1_1.2 updated
- thin-provisioning-tools-0.9.0-slfo.1.1_1.4 updated
- systemd-rpm-macros-24-slfo.1.1_1.2 updated
- systemd-presets-common-SUSE-15-slfo.1.1_1.2 updated
- rpm-config-SUSE-20240214-slfo.1.1_1.2 updated
- rpm-4.18.0-slfo.1.1_2.1 updated
- permissions-config-1600_20240206-slfo.1.1_1.5 updated
- glibc-locale-base-2.38-slfo.1.1_7.1 updated
- e2fsprogs-1.47.0-slfo.1.1_1.2 updated
- ca-certificates-2+git20240805.fd24d50-slfo.1.1_1.2 updated
- ca-certificates-mozilla-2.84-slfo.1.1_1.1 updated
- btrfsprogs-6.8.1-slfo.1.1_1.2 updated
- parted-3.5-slfo.1.1_1.2 updated
- liblvm2cmd2_03-2.03.22-slfo.1.1_1.3 updated
- xorriso-1.5.4-slfo.1.1_1.2 updated
- device-mapper-2.03.22_1.02.196-slfo.1.1_1.3 updated
- systemd-presets-branding-ALP-transactional-20230214-slfo.1.1_1.2 updated
- permissions-1600_20240206-slfo.1.1_1.5 updated
- mtools-4.0.43-slfo.1.1_1.2 updated
- libopenssl3-3.1.4-slfo.1.1_9.1 updated
- pam-1.6.1-slfo.1.1_4.1 updated
- grub2-2.12-slfo.1.1_5.1 updated
- grub2-i386-pc-2.12-slfo.1.1_5.1 updated
- suse-module-tools-16.0.43-slfo.1.1_1.2 updated
- kmod-32-slfo.1.1_2.1 updated
- rsync-3.3.0-slfo.1.1_4.1 updated
- libldap2-2.6.4-slfo.1.1_1.2 added
- libkmod2-32-slfo.1.1_2.1 updated
- libcryptsetup12-2.6.1-slfo.1.1_1.2 updated
- krb5-1.21.3-slfo.1.1_2.1 added
- util-linux-2.40.4-slfo.1.1_5.1 updated
- shadow-4.15.1-slfo.1.1_1.3 updated
- pam-config-2.11+git.20240906-slfo.1.1_2.1 updated
- kbd-2.6.4-slfo.1.1_1.3 updated
- libssh4-0.10.6-slfo.1.1_5.1 added
- libsnapper7-0.11.2-slfo.1.1_1.2 updated
- aaa_base-84.87+git20250903.33e5ba4-slfo.1.1_1.1 updated
- libcurl4-8.14.1-slfo.1.1_7.1 added
- dbus-1-daemon-1.14.10-slfo.1.1_1.2 updated
- curl-8.14.1-slfo.1.1_7.1 updated
- dbus-1-tools-1.14.10-slfo.1.1_1.2 updated
- systemd-254.27-slfo.1.1_4.1 updated
- sysuser-shadow-3.1-slfo.1.1_1.2 updated
- dbus-1-common-1.14.10-slfo.1.1_1.2 updated
- libdbus-1-3-1.14.10-slfo.1.1_1.2 updated
- dbus-1-1.14.10-slfo.1.1_1.2 updated
- system-group-kvm-20170617-slfo.1.1_1.2 updated
- system-group-hardware-20170617-slfo.1.1_1.2 updated
- udev-254.27-slfo.1.1_4.1 updated
- snapper-0.11.2-slfo.1.1_1.2 updated
- lvm2-2.03.22-slfo.1.1_1.3 updated
- elemental-toolkit-2.2.7-slfo.1.1_1.1 updated
- container:suse-toolbox-image-1.0.0-5.50 updated
- file-magic-5.44-4.151 removed
- kbd-legacy-2.6.4-1.3 removed
- libcurl-mini4-8.14.1-6.1 removed
- libmagic1-5.44-4.151 removed


More information about the sle-container-updates mailing list