SUSE-IU-2026:3293-1: Security update of suse/sle-micro/5.5
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Tue May 12 07:10:25 UTC 2026
SUSE Image Update Advisory: suse/sle-micro/5.5
-----------------------------------------------------------------
Image Advisory ID : SUSE-IU-2026:3293-1
Image Tags : suse/sle-micro/5.5:2.0.4 , suse/sle-micro/5.5:2.0.4-5.8.1 , suse/sle-micro/5.5:latest
Image Release : 5.8.1
Severity : important
Type : security
References : 1001888 1006827 1029961 1098094 1098228 1103388 1104120 1106523
1121410 1168806 1170160 1170160 1170554 1180422 1180482 1182482
1182482 1185697 1186749 1187948 1190091 1191375 1192862 1194338
1196332 1196332 1200110 1206798 1222465 1224138 1229655 1233655
1234736 1246399 1246602 1246965 1247850 1247858 1248586 1248600
1248988 1249055 1250553 1250553 1252338 1253043 1253741 1253993
1254297 1254362 1254441 1254662 1254666 1254670 1254670 1254878
1255715 1255731 1255732 1255733 1255734 1256105 1256244 1256246
1256389 1256390 1256483 1256498 1256499 1256500 1256766 1256805
1256807 1256808 1256809 1256811 1256812 1256822 1256834 1256835
1256836 1256837 1256838 1256839 1256840 1257005 1257049 1257144
1257359 1257463 1257496 1257593 1257594 1257595 1258045 1258049
1258054 1258080 1258081 1258229 1258392 1258568 1258859 1259051
1259362 1259362 1259363 1259364 1259365 1259377 1259418 1259619
1259650 1259697 1259711 1259726 1259729 1259845 1259924 1259985
1260441 1260442 1260443 1260444 1260859 1261191 1261271 1261274
1261420 1261678 1261809 1262144 1262631 1262632 1262635 1262636
1262638 510058 529469 837347 CVE-2025-10158 CVE-2025-10911 CVE-2025-10911
CVE-2025-13601 CVE-2025-14017 CVE-2025-14087 CVE-2025-14104 CVE-2025-14512
CVE-2025-14524 CVE-2025-14819 CVE-2025-15079 CVE-2025-15224 CVE-2025-15281
CVE-2025-45582 CVE-2025-47914 CVE-2025-53906 CVE-2025-68160 CVE-2025-68276
CVE-2025-68468 CVE-2025-68471 CVE-2025-68973 CVE-2025-69418 CVE-2025-69419
CVE-2025-69420 CVE-2025-69421 CVE-2025-69720 CVE-2025-7039 CVE-2025-70873
CVE-2025-7709 CVE-2025-7709 CVE-2025-8058 CVE-2025-8732 CVE-2025-9403
CVE-2025-9615 CVE-2026-0861 CVE-2026-0915 CVE-2026-0964 CVE-2026-0965
CVE-2026-0966 CVE-2026-0967 CVE-2026-0968 CVE-2026-0988 CVE-2026-0989
CVE-2026-0990 CVE-2026-0992 CVE-2026-1757 CVE-2026-1965 CVE-2026-1965
CVE-2026-22795 CVE-2026-22796 CVE-2026-24515 CVE-2026-25210 CVE-2026-26269
CVE-2026-27135 CVE-2026-27171 CVE-2026-2781 CVE-2026-28387 CVE-2026-28388
CVE-2026-28389 CVE-2026-28390 CVE-2026-28417 CVE-2026-29111 CVE-2026-31789
CVE-2026-3184 CVE-2026-32776 CVE-2026-32777 CVE-2026-32778 CVE-2026-33412
CVE-2026-34714 CVE-2026-34982 CVE-2026-35535 CVE-2026-3731 CVE-2026-3783
CVE-2026-3784 CVE-2026-3805 CVE-2026-4105 CVE-2026-4873 CVE-2026-4878
CVE-2026-4897 CVE-2026-5545 CVE-2026-5958 CVE-2026-6253 CVE-2026-6276
CVE-2026-6429
-----------------------------------------------------------------
The container suse/sle-micro/5.5 was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2018:2022-1
Released: Wed Sep 26 09:48:09 2018
Summary: Recommended update for SUSE Manager Client Tools
Type: recommended
Severity: moderate
References: 1103388,1104120,1106523
This update fixes the following issues:
hwdata:
- Update to version 0.314:
+ Updated pci, usb and vendor ids.
spacewalk-backend:
- Channels to be actually un-subscribed from the assigned systems when being removed
using spacewalk-remove-channel tool. (bsc#1104120)
- Take only text files from /srv/salt to make spacewalk-debug smaller. (bsc#1103388)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2019:1022-1
Released: Wed Apr 24 13:46:51 2019
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References: 1121410
This update for hwdata fixes the following issues:
Update to version 0.320 (bsc#1121410):
- Updated the pci, usb and vendor ids vendor and product databases.
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2020:1261-1
Released: Tue May 12 18:40:18 2020
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References: 1168806
This update for hwdata fixes the following issues:
Update from version 0.320 to version 0.324 (bsc#1168806)
- Updated pci, usb and vendor ids.
- Replace pciutils-ids package providing compatibility symbolic link
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:421-1
Released: Wed Feb 10 12:05:23 2021
Summary: Recommended update for hwdata
Type: recommended
Severity: low
References: 1180422,1180482
This update for hwdata fixes the following issues:
- Added merge-pciids.pl to fully duplicate behavior of pciutils-ids (bsc#1180422, bsc#1180482)
- Updated pci, usb and vendor ids.
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:880-1
Released: Fri Mar 19 04:14:38 2021
Summary: Recommended update for hwdata
Type: recommended
Severity: low
References: 1170160,1182482
This update for hwdata fixes the following issues:
- Updated pci, usb and vendor ids (bsc#1182482, bsc#1170160, jsc#SLE-13791)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1950-1
Released: Thu Jun 10 14:42:00 2021
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References: 1170160,1182482,1185697
This update for hwdata fixes the following issues:
- Update to version 0.347:
+ Updated pci, usb and vendor ids. (bsc#1185697)
- Update to version 0.346:
+ Updated pci, usb and vendor ids. (bsc#1182482, jsc#SLE-13791, bsc#1170160)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:2447-1
Released: Thu Jul 22 08:26:29 2021
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References: 1186749,1187948
This update for hwdata fixes the following issue:
- Version 0.349: Updated pci, usb and vendor ids (bsc#1187948).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:2973-1
Released: Tue Sep 7 16:56:08 2021
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References: 1190091
This update for hwdata fixes the following issue:
- Update pci, usb and vendor ids (bsc#1190091)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:3832-1
Released: Wed Dec 1 14:51:19 2021
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References: 1191375
This update for hwdata fixes the following issue:
- Update to version 0.353 (bsc#1191375)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:100-1
Released: Tue Jan 18 05:20:03 2022
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References: 1194338
This update for hwdata fixes the following issues:
- Update hwdata from version 0.353 to 0.355 which includes updated pci, usb
and vendor ids (bsc#1194338)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:1204-1
Released: Thu Apr 14 12:15:55 2022
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References: 1196332
This update for hwdata fixes the following issues:
- Updated pci, usb and vendor ids (bsc#1196332)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:1703-1
Released: Tue May 17 12:13:36 2022
Summary: Recommended update for hwdata
Type: recommended
Severity: important
References: 1196332
This update for hwdata fixes the following issues:
- Updated pci, usb and vendor ids (bsc#1196332)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3135-1
Released: Wed Sep 7 08:39:31 2022
Summary: Recommended update for hwdata
Type: recommended
Severity: low
References: 1200110
This update for hwdata fixes the following issue:
- Update pci, usb and vendor ids to version 0.360 (bsc#1200110)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:4063-1
Released: Fri Nov 18 09:07:50 2022
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References:
This update for hwdata fixes the following issues:
- Updated pci, usb and vendor ids
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:46-1
Released: Mon Jan 9 10:35:21 2023
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References:
This update for hwdata fixes the following issues:
- Update pci, usb and vendor ids
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:1920-1
Released: Wed Apr 19 16:22:58 2023
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References:
This update for hwdata fixes the following issues:
- Update pci, usb and vendor ids
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:2649-1
Released: Tue Jun 27 10:01:13 2023
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References:
This update for hwdata fixes the following issues:
- update to 0.371:
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:458-1
Released: Tue Feb 13 14:34:14 2024
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References:
This update for hwdata fixes the following issues:
- Update to version 0.378
- Update pci, usb and vendor ids
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:1176-1
Released: Tue Apr 9 10:43:33 2024
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References:
This update for hwdata fixes the following issues:
- Update to 0.380
- Update pci, usb and vendor ids
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:4044-1
Released: Mon Nov 25 08:28:17 2024
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References:
This update for hwdata fixes the following issue:
- Version update to v0.389:
* Update pci, usb and vendor ids
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:4363-1
Released: Tue Dec 17 16:12:41 2024
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References:
This update for hwdata fixes the following issue:
- Version update v0.390
* Update pci and vendor ids
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1721-1
Released: Tue May 27 17:59:31 2025
Summary: Recommended update for hwdata
Type: recommended
Severity: moderate
References:
This update for hwdata fixes the following issue:
- Version update 0.394:
* Update pci, usb and vendor ids
* Fix usb.ids encoding and a couple of typos
* Fix configure to honor --prefix
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:4321-1
Released: Fri Dec 5 08:07:53 2025
Summary: Recommended update for pciutils
Type: recommended
Severity: moderate
References: 1001888,1006827,1029961,1098094,1098228,1170554,1192862,1206798,1224138,529469,837347
This update for pciutils fixes the following issues:
pciutils was updated from version 3.5.6 to 3.13.0 (jsc#PED-8402, jsc#PED-8393, bsc#1224138):
- Highlights of issues fixed:
* Fixed LnkCap speed recognition in `lspci` for multi PCIe ports such as
the ML110 Gen11 (bsc#1192862)
* Included several non-standard extensions to VPD decoder (bsc#1170554, bsc#1098228)
* Fixed the display of the gen4 speed for GEN 4 cards like Mellanox CX5 (bsc#1098094)
* Replaced dependency on pciutil-ids with hwdata
* Potentially disruptive change of PCI IDs Cache:
+ The local cache of PCI IDs (.pci-ids) was moved to the XDG standard location: `$XDG_CACHE_HOME/pci-ids` (v3.11.0)
This could be a disruptive change if users or scripts are relying on the old path.
- Key New Features and Utilities:
* New `pcilmr` Utility: A new tool, `pcilmr`, was added for 'PCIe lane margining,' which is a low-level
diagnostic feature (v3.11.0)
* New `lspci` Path Flag: You can now use `lspci -P` (or -PP) to see the path of bridges leading to a specific device
(v3.6.2)
* ECAM Support: Added support for the ECAM (Enhanced Configuration Access Mechanism), a standard way to access PCIe
configuration space (v3.10.0)
* IOMMU Group Display: lspci can now display IOMMU groups on Linux (v3.7.0)
- New Hardware and Protocol Decoding:
* Added support for decoding CXL capabilities (v3.9.0)
* Decoding for Advanced Error Reporting (AER) (v3.13.0)
* Decoding for IDE (Integrity and Data Encryption) and TEE-IO extended capabilities (v3.12.0)
* Decoding for Data Object Exchange (DOE) (v3.8.0)
* Decoding for standard and VF (Virtual Function) Resizable BARs (v3.7.0)
* Decoding for Multicast capabilities (v3.6.3)
- Improved Output Clarity:
* PCIe link speeds running below their maximum are now clearly marked as 'downgraded' (v3.6.0)
* BARs (Base Address Registers) reported by the OS but not actually set on the device are marked as
'[virtual]' (v3.6.0)
- Command Behavior and System Changes:
* `lspci` Tree View (-t):
+ Can now be combined with `-s` to show only a specific sub-tree (v3.6.3)
+ Improved filtering options (v3.9.0)
+ Improved support of multi-domain systems (v3.10.0)
* `setpci`:
+ Can now check if a named register exists for that device's header type (v3.9.0)
* `update-pciids`:
+ Now supports XZ compression when downloading new ID lists (v3.11.0)
* Database Update:
+ The pci.ids device database was continuously updated across all versions.
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:4326-1
Released: Tue Dec 9 11:31:28 2025
Summary: Recommended update for runc
Type: recommended
Severity: moderate
References: 1254362
This update for runc fixes the following issues:
- Update to runc v1.3.4 (bsc#1254362)
- libct: fix mips compilation:
* When configuring a tmpfs mount, only set the mode= argument if the
target path already existed.
* Fix various file descriptor leaks and add additional tests to detect them as
comprehensively as possible.
- Downgrade github.com/cyphar/filepath-securejoin dependency to v0.5.2,
which should make it easier for some downstreams to import runc without
pulling in too many extra packages.
- The runc binary distributed with this release are statically linked with the following
GNU LGPL-2.1 licensed libraries, with runc acting as a 'work that uses the Library':
* libseccomp: The versions of these libraries were not modified from their upstream versions
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:4331-1
Released: Tue Dec 9 12:55:17 2025
Summary: Recommended update for kmod
Type: recommended
Severity: important
References: 1253741
This update for kmod fixes the following issues:
- Fix modprobe.d confusion on man page (bsc#1253741):
* document the config file order handling
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:4347-1
Released: Wed Dec 10 14:02:26 2025
Summary: Security update for glib2
Type: security
Severity: moderate
References: 1249055,CVE-2025-7039
This update for glib2 fixes the following issues:
- CVE-2025-7039: Fixed buffer under-read on glib through glib/gfileutils.c via get_tmp_file() (bsc#1249055)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:4362-1
Released: Thu Dec 11 11:08:27 2025
Summary: Recommended update for gcc15
Type: recommended
Severity: moderate
References: 1253043
This update for gcc15 fixes the following issues:
- Enable the use of _dl_find_object even when not available at build time. [bsc#1253043]
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:4377-1
Released: Fri Dec 12 10:37:09 2025
Summary: Recommended update for lvm2
Type: recommended
Severity: moderate
References: 1233655,510058
This update for lvm2 fixes the following issues:
- Maintenance update attempt seems to be stuck at mkinitrd (bsc#510058).
- Fix for 'systemctl start lvmlockd.service' time out (bsc#1233655).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:4504-1
Released: Mon Dec 22 17:29:14 2025
Summary: Security update for glib2
Type: security
Severity: important
References: 1254297,1254662,1254878,CVE-2025-13601,CVE-2025-14087,CVE-2025-14512
This update for glib2 fixes the following issues:
- CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote
filesystem attribute values can lead to denial-of-service (bsc#1254878).
- CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()` functions when
processing attacker-influenced data may lead to crash or code execution (bsc#1254662).
- CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a
large number of unacceptable characters may lead to crash or code execution (bsc#1254297).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:41-1
Released: Tue Jan 6 11:33:23 2026
Summary: Security update for rsync
Type: security
Severity: moderate
References: 1254441,CVE-2025-10158
This update for rsync fixes the following issues:
- CVE-2025-10158: Fixed out of bounds array access via negative index (bsc#1254441)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:48-1
Released: Wed Jan 7 09:08:18 2026
Summary: Recommended update for pciutils
Type: recommended
Severity: moderate
References: 1252338
This update for pciutils fixes the following issues:
- Add a strict dependency to libpci to prevent possible segfault (bsc#1252338)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:67-1
Released: Thu Jan 8 13:22:12 2026
Summary: Security update for podman
Type: security
Severity: moderate
References: 1253993,CVE-2025-47914
This update for podman fixes the following issues:
- CVE-2025-47914: Fixed ssh-agent that could cause a panic due to an
out-of-bounds read with non validated message size (bsc#1253993)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:117-1
Released: Tue Jan 13 05:33:38 2026
Summary: Security update for util-linux
Type: security
Severity: moderate
References: 1254666,CVE-2025-14104
This update for util-linux fixes the following issues:
- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).
- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:214-1
Released: Thu Jan 22 13:09:26 2026
Summary: Security update for gpg2
Type: security
Severity: important
References: 1255715,1256244,1256246,1256390,CVE-2025-68973
This update for gpg2 fixes the following issues:
- CVE-2025-68973: Fix possible memory corruption in the armor parser (gpg.fail/memcpy)(bsc#1255715).
- Avoid potential downgrade to SHA1 in 3rd party key signatures (gpg.fail/sha1) (bsc#1256246).
- Error out on unverified output for non-detached signatures (gpg.fail/detached) (bsc#1256244).
- Fix Cleartext Signature Forgery in the NotDashEscaped header implementation in GnuPG (gpg.fail/notdash) (bsc#1256390).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:305-1
Released: Tue Jan 27 17:15:03 2026
Summary: Recommended update for kernel-firmware
Type: security
Severity: important
References: 1256483
This update for kernel-firmware fixes the following issues:
- Update AMD ucode to 20251203 (bsc#1256483)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:359-1
Released: Mon Feb 2 10:54:54 2026
Summary: Security update for openssl-1_1
Type: security
Severity: moderate
References: 1256834,1256835,1256836,1256837,1256838,1256839,1256840,CVE-2025-68160,CVE-2025-69418,CVE-2025-69419,CVE-2025-69420,CVE-2025-69421,CVE-2026-22795,CVE-2026-22796
This update for openssl-1_1 fixes the following issues:
- CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing (bsc#1256839).
- CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
- CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
- CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).
- CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834).
- CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (bsc#1256835).
- CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (bsc#1256836).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:391-1
Released: Thu Feb 5 15:23:42 2026
Summary: Security update for libxml2
Type: security
Severity: low
References: 1256805,CVE-2026-0989
This update for libxml2 fixes the following issues:
- CVE-2026-0989: Fixed call stack exhaustion leading to application
crash due to RelaxNG parser not limiting the recursion depth when
resolving `<include>` directives (bsc#1256805)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:432-1
Released: Wed Feb 11 10:11:56 2026
Summary: Security update for sqlite3
Type: security
Severity: moderate
References: 1248586,1254670,CVE-2025-7709
This update for sqlite3 fixes the following issues:
- Update to v3.51.2:
- CVE-2025-7709: Fixed an integer overflow in the FTS5 extension. (bsc#1254670)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:446-1
Released: Wed Feb 11 14:31:02 2026
Summary: Recommended update for podman
Type: recommended
Severity: moderate
References: 1248988
This update for podman fixes the following issues:
- Add symlink to catatonit in /usr/libexec/podman (bsc#1248988)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:458-1
Released: Thu Feb 12 00:28:37 2026
Summary: Security update for glib2
Type: security
Severity: important
References: 1257049,CVE-2026-0988
This update for glib2 fixes the following issues:
- CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to integer wraparound in content type parsing (bsc#1257354).
- CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to miscalculated buffer boundaries in the Base64 encoding routine (bsc#1257355).
- CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds access due to integer overflow in Unicode case conversion (bsc#1257353).
- CVE-2026-0988: Fixed a potential integer overflow in g_buffered_input_stream_peek (bsc#1257049).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:508-1
Released: Fri Feb 13 15:50:21 2026
Summary: Security update for curl
Type: security
Severity: moderate
References: 1255731,1255732,1255733,1255734,1256105,CVE-2025-14017,CVE-2025-14524,CVE-2025-14819,CVE-2025-15079,CVE-2025-15224
This update for curl fixes the following issues:
- CVE-2025-14017: Fixed broken TLS options for threaded LDAPS (bsc#1256105).
- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).
- CVE-2025-14819: libssh global knownhost override (bsc#1255732).
- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).
- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:570-1
Released: Tue Feb 17 17:38:47 2026
Summary: Security update for libxml2
Type: security
Severity: moderate
References: 1247850,1247858,1250553,1256807,1256808,1256809,1256811,1256812,1257593,1257594,1257595,CVE-2025-10911,CVE-2025-8732,CVE-2026-0990,CVE-2026-0992,CVE-2026-1757
This update for libxml2 fixes the following issues:
- CVE-2026-0990: Fixed a call stack overflow leading to application crash due to infinite recursion in `xmlCatalogXMLResolveURI`. (bsc#1256807, bsc#1256811)
- CVE-2026-0992: Fixed an excessive resource consumption when processing XML catalogs due to exponential behavior. (bsc#1256809, bsc#1256812)
- CVE-2026-1757: Fixed a memory leak in the `xmllint` interactive shell. (bsc#1257594, bsc#1257595)
- CVE-2025-10911: Fixed a use-after-free with key data stored cross-RVT. (bsc#1250553)
- CVE-2025-8732: Fixed an infinite recursion in catalog parsing functions when processing malformed SGML catalog files. (bsc#1247858)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:577-1
Released: Wed Feb 18 16:49:13 2026
Summary: Security update for avahi
Type: security
Severity: moderate
References: 1256498,1256499,1256500,CVE-2025-68276,CVE-2025-68468,CVE-2025-68471
This update for avahi fixes the following issues:
- CVE-2025-68276: Fixed refuse to create wide-area record browsers when
wide-area is off (bsc#1256498)
- CVE-2025-68471: Fixed DoS bug by changing assert to return (bsc#1256500)
- CVE-2025-68468: Fixed DoS bug by removing incorrect assertion (bsc#1256499)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:694-1
Released: Fri Feb 27 16:14:32 2026
Summary: Security update for gpg2
Type: security
Severity: moderate
References: 1256389
This update for gpg2 fixes the following issues:
Security fix:
- Fixed GnuPG accepting Path Separators and Path Traversals
in Literal Data (bsc#1256389)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:783-1
Released: Tue Mar 3 14:36:14 2026
Summary: Security update for zlib
Type: security
Severity: moderate
References: 1258392,CVE-2026-27171
This update for zlib fixes the following issue:
- CVE-2026-27171: Fixed infinite loop via the `crc32_combine64` and `crc32_combine_gen64` functions due to missing
checks for negative lengths (bsc#1258392).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:791-1
Released: Tue Mar 3 16:59:33 2026
Summary: Recommended update for gcc15
Type: recommended
Severity: moderate
References: 1257463
This update for gcc15 fixes the following issues:
- Fix bogus expression simplification (bsc#1257463)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:801-1
Released: Wed Mar 4 13:33:26 2026
Summary: Security update for libxslt
Type: security
Severity: moderate
References: 1250553,CVE-2025-10911
This update for libxslt fixes the following issues:
- CVE-2025-10911: use-after-free will be fixed on libxml2 side instead (bsc#1250553).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:813-1
Released: Thu Mar 5 09:33:59 2026
Summary: Security update for mozilla-nss
Type: security
Severity: moderate
References: 1258568,CVE-2026-2781
This update for mozilla-nss fixes the following issues:
Update to NSS 3.112.3:
* CVE-2026-2781: Avoid integer overflow in platform-independent ghash (bsc#1258568)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:826-1
Released: Thu Mar 5 16:16:29 2026
Summary: Security update for expat
Type: security
Severity: moderate
References: 1257144,1257496,CVE-2026-24515,CVE-2026-25210
This update for expat fixes the following issues:
- CVE-2026-24515: Fixed a null dereference in XML_ExternalEntityParserCreate. (bsc#1257144)
- CVE-2026-25210: Fixed an integer overflow in doContent. (bsc#1257496)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:856-1
Released: Tue Mar 10 09:35:24 2026
Summary: Security update for util-linux
Type: security
Severity: moderate
References: 1258859,CVE-2026-3184
This update for util-linux fixes the following issues:
- CVE-2026-3184: Fix full hostname usage for PAM to ensure correct access control for 'login -h' (bsc#1258859).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:896-1
Released: Fri Mar 13 16:25:07 2026
Summary: Security update for glibc
Type: security
Severity: important
References: 1246965,1256766,1256822,1257005,CVE-2025-15281,CVE-2025-8058,CVE-2026-0861,CVE-2026-0915
This update for glibc fixes the following issues:
- CVE-2026-0861: memalign: reinstate alignment overflow check (bsc#1256766)
- CVE-2026-0915: resolv: Fix NSS DNS backend for getnetbyaddr (bsc#1256822)
- CVE-2025-15281: posix: Reset wordexp_t fields with WRDE_REUSE (bsc#1257005)
- CVE-2025-8058: posix: Fix double-free after allocation failure in regcomp (bsc#1246965)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:910-1
Released: Tue Mar 17 20:34:12 2026
Summary: Security update for vim
Type: security
Severity: moderate
References: 1246602,1258229,1259051,CVE-2025-53906,CVE-2026-26269,CVE-2026-28417
This update for vim fixes the following issues:
Update Vim to version 9.2.0110:
- CVE-2025-53906: malicious zip archive may cause a path traversal in Vim's zip (bsc#1246602).
- CVE-2026-26269: Netbeans specialKeys stack buffer overflow (bsc#1258229).
- CVE-2026-28417: crafted URL parsed by netrw plugin can lead to execute arbitrary shell commands (bsc#1259051).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:911-1
Released: Tue Mar 17 20:56:12 2026
Summary: Security update for curl
Type: security
Severity: important
References: 1259362,1259363,1259364,1259365,CVE-2026-1965,CVE-2026-3783,CVE-2026-3784,CVE-2026-3805
This update for curl fixes the following issues:
- CVE-2026-1965: bad reuse of HTTP Negotiate connection (bsc#1259362).
- CVE-2026-3783: token leak with redirect and netrc (bsc#1259363).
- CVE-2026-3784: wrong proxy connection reuse with credentials (bsc#1259364).
- CVE-2026-3805: use after free in SMB connection reuse (bsc#1259365).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:931-1
Released: Thu Mar 19 09:23:14 2026
Summary: Security update for jq
Type: security
Severity: low
References: 1248600,CVE-2025-9403
This update for jq fixes the following issue:
- CVE-2025-9403: test suite assertion failure in JSON parsing consistency validation (bsc#1248600).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:949-1
Released: Fri Mar 20 19:08:19 2026
Summary: Security update for runc
Type: security
Severity: important
References:
This update for runc rebuilds it against the current go 1.25 security release.
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1061-1
Released: Thu Mar 26 11:35:08 2026
Summary: Security update for systemd
Type: security
Severity: important
References: 1259418,1259650,1259697,CVE-2026-29111,CVE-2026-4105
This update for systemd fixes the following issues:
- CVE-2026-4105: privilege escalation due to improper access control in RegisterMachine D-Bus method (bsc#1259650).
- CVE-2026-29111: local unprivileged user can trigger an assert in systemd (bsc#1259418).
- udev: check for invalid chars in various fields received from the kernel (bsc#1259697).
Changelog:
- 6a38d88a42 machined: reject invalid class types when registering machines
- 8c9a592e5a udev: fix review mixup
- b57007a917 udev-builtin-net-id: print cescaped bad attributes
- ee23c7604b udev-builtin-net_id: do not assume the current interface name is ethX
- 0f63e799e6 udev: ensure tag parsing stays within bounds
- 046f52ec12 udev: ensure there is space for trailing NUL before calling sprintf
- 5be21460ce udev: check for invalid chars in various fields received from the kernel
- 9559607b16 core/cgroup: avoid one unnecessary strjoina()
- fcae348ca4 core: validate input cgroup path more prudently
- a3ca6b3031 alloc-util: add strdupa_safe() + strndupa_safe() and use it everywhere
- 08125d6b06 units: add dep on systemd-logind.service by user at .service
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1065-1
Released: Thu Mar 26 11:38:12 2026
Summary: Security update for sqlite3
Type: security
Severity: moderate
References: 1254670,1259619,CVE-2025-70873,CVE-2025-7709
This update for sqlite3 fixes the following issues:
Update sqlite3 to 3.51.3:
- CVE-2025-7709: Integer Overflow in FTS5 Extension (bsc#1254670).
- CVE-2025-70873: SQLite zipfile extension may disclose uninitialized heap memory during inflation (bsc#1259619).
Changelog:
* Fix the WAL-reset database corruption bug:
https://sqlite.org/wal.html#walresetbug
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:1087-1
Released: Thu Mar 26 16:20:57 2026
Summary: Recommended update for util-linux
Type: recommended
Severity: moderate
References: 1222465,1234736
This update for util-linux fixes the following issues:
- recognize fuse 'portal' as a virtual file system (bsc#1234736).
- fdisk: Fix possible partition overlay and data corruption if EBR gap is missing (bsc#1222465).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1166-1
Released: Thu Apr 2 03:08:04 2026
Summary: Security update for expat
Type: security
Severity: important
References: 1259711,1259726,1259729,CVE-2026-32776,CVE-2026-32777,CVE-2026-32778
This update for expat fixes the following issues:
- CVE-2026-32776: NULL pointer dereference when processing empty external parameter entities inside an entity
declaration value (bsc#1259726).
- CVE-2026-32777: denial of service due to infinite loop in DTD content parsing (bsc#1259711).
- CVE-2026-32778: NULL pointer dereference in `setContext` on retry after an out-of-memory condition (bsc#1259729).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1177-1
Released: Thu Apr 2 17:00:30 2026
Summary: Security update for tar
Type: security
Severity: important
References: 1246399,CVE-2025-45582
This update for tar fixes the following issue:
- CVE-2025-45582: file overwrite via directory traversal in crafted TAR archives (bsc#1246399).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1247-1
Released: Fri Apr 10 12:34:39 2026
Summary: Security update for nghttp2
Type: security
Severity: important
References: 1259845,CVE-2026-27135
This update for nghttp2 fixes the following issue:
- CVE-2026-27135: assertion failure due to missing state validation can lead to DoS (bsc#1259845).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1290-1
Released: Mon Apr 13 10:08:34 2026
Summary: Security update for openssl-1_1
Type: security
Severity: important
References: 1260441,1260442,1260443,1260444,CVE-2026-28387,CVE-2026-28388,CVE-2026-28389,CVE-2026-31789
This update for openssl-1_1 fixes the following issues:
- CVE-2026-28387: Potential use-after-free in DANE client code (bsc#1260441).
- CVE-2026-28388: NULL Pointer Dereference When Processing a Delta CRL (bsc#1260442).
- CVE-2026-28389: Possible NULL dereference when processing CMS KeyAgreeRecipientInfo (bsc#1260443).
- CVE-2026-31789: Heap buffer overflow in hexadecimal conversion (bsc#1260444).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1308-1
Released: Tue Apr 14 12:37:49 2026
Summary: Security update for sudo
Type: security
Severity: important
References: 1261420,CVE-2026-35535
This update for sudo fixes the following issue:
- CVE-2026-35535: Fixed potential privilege escalation when running the mailer (bsc#1261420).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:1403-1
Released: Thu Apr 16 13:34:01 2026
Summary: Recommended update for cyrus-sasl
Type: recommended
Severity: moderate
References: 1229655
This update for cyrus-sasl fixes the following issues:
- Add Channel Binding support for GSSAPI/GSS-SPNEGO (bsc#1229655, jsc#PED-12097)
- Add support for setting max ssf 0 to GSS-SPNEGO
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1424-1
Released: Fri Apr 17 10:02:57 2026
Summary: Security update for polkit
Type: security
Severity: moderate
References: 1260859,CVE-2026-4897
This update for polkit fixes the following issue:
- CVE-2026-4897: Fixed possible OOM condition via specially crafted input to `polkit-agent-helper-1` (bsc#1260859).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1427-1
Released: Fri Apr 17 11:58:37 2026
Summary: Security update for NetworkManager
Type: security
Severity: moderate
References: 1257359,CVE-2025-9615
This update for NetworkManager fixes the following issue:
- CVE-2025-9615: Fixed non-admin user using others' certificates (bsc#1257359).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1432-1
Released: Fri Apr 17 12:12:08 2026
Summary: Security update for libcap
Type: security
Severity: important
References: 1261809,CVE-2026-4878
This update for libcap fixes the following issue:
- CVE-2026-4878: Address a potential TOCTOU race condition in cap_set_file() (bsc#1261809).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1487-1
Released: Mon Apr 20 17:52:11 2026
Summary: Security update for runc
Type: security
Severity: important
References:
This update for runc rebuilds it against the current go 1.25 security release.
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1510-1
Released: Tue Apr 21 08:28:12 2026
Summary: Security update for ncurses
Type: security
Severity: moderate
References: 1259924,CVE-2025-69720
This update for ncurses fixes the following issue:
- CVE-2025-69720: buffer overflow in function `analyze_string()`of `progs/infocmp.c` (bsc#1259924).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1540-1
Released: Wed Apr 22 09:21:58 2026
Summary: Security update for podman
Type: security
Severity: important
References:
This update for podman rebuilds it against the current go 1.25 security release.
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1550-1
Released: Wed Apr 22 11:41:14 2026
Summary: Security update for openssl-1_1
Type: security
Severity: moderate
References: 1261678,CVE-2026-28390
This update for openssl-1_1 fixes the following issues:
- CVE-2026-28390: NULL pointer dereference during processing of a crafted CMS EnvelopedData message with
KeyTransportRecipientInfo (bsc#1261678).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:1561-1
Released: Thu Apr 23 08:34:49 2026
Summary: Recommended update for mozilla-nss
Type: recommended
Severity: moderate
References:
This update for mozilla-nss fixes the following issues:
Update to NSS 3.112.4:
* improve error handling in PK11_ImportPrivateKeyInfoAndReturnKey.
* Improving the allocation of S/MIME DecryptSymKey.
* store email on subject cache_entry in NSS trust domain.
* Heap use-after-free in cert_VerifyCertChainOld via dangling certsList[] entry on NameConstraints violation.
* Improve size calculations in CMS content buffering.
* avoid integer overflow while escaping RFC822 Names.
* Reject excessively large ASN.1 SEQUENCE OF in quickder.
* Deep copy profile data in CERT_FindSMimeProfile.
* Improve input validation in DSAU signature decoding.
* avoid integer overflow in RSA_EMSAEncodePSS.
* RSA_EMSAEncodePSS should validate the length of mHash.
* Add a maximum cert uncompressed len and tests.
* Clarify extension negotiation mechanism for TLS Handshakes.
* ensure permittedSubtrees don't match wildcards that could be outside the permitted tree.
* Fix integer underflow in tls13_AEAD when ciphertext is shorter than tag.
* Remove invalid PORT_Free().
* free digest objects in SEC_PKCS7DecoderFinish if they haven't already been freed.
* make ss->ssl3.hs.cookie an owned-copy of the cookie.
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1565-1
Released: Thu Apr 23 09:08:29 2026
Summary: Security update for libssh
Type: security
Severity: moderate
References: 1258045,1258049,1258054,1258080,1258081,1259377,CVE-2026-0964,CVE-2026-0965,CVE-2026-0966,CVE-2026-0967,CVE-2026-0968,CVE-2026-3731
This update for libssh fixes the following issues:
- CVE-2026-0964: improper sanitation of paths received from SCP servers can cause path traversal (bsc#1258049).
- CVE-2026-0965: possible denial of service when parsing unexpected configuration files (bsc#1258045).
- CVE-2026-0966: buffer underflow in ssh_get_hexa() on invalid input (bsc#1258054).
- CVE-2026-0967: specially crafted patterns could cause denial of service (bsc#1258081).
- CVE-2026-0968: malformed SFTP message can lead to out of bound read (bsc#1258080).
- CVE-2026-3731: denial of service via out-of-bounds read in SFTP extension name handler (bsc#1259377).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1607-1
Released: Fri Apr 24 13:50:52 2026
Summary: Security update for vim
Type: security
Severity: important
References: 1259985,1261191,1261271,CVE-2026-33412,CVE-2026-34714,CVE-2026-34982
This update for vim fixes the following issues:
Update to version 9.2.0280.
- CVE-2026-34982: missing input validation allows for a modeline sandbox bypass and can lead to arbitrary OS command
execution (bsc#1261271).
- CVE-2026-34714: missing checks allow for a `tabpanel` modeline escape and can lead to arbitrary OS command execution
(bsc#1261191).
- CVE-2026-33412: improper escaping of newline characters allows for command injection in `glob` and can lead to
arbitrary code execution (bsc#1259985).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1659-1
Released: Wed Apr 29 13:09:06 2026
Summary: Security update for sed
Type: security
Severity: moderate
References: 1262144,CVE-2026-5958
This update for sed fixes the following issues:
- CVE-2026-5958: TOCTOU race allows write of user-controlled content to unintended files and can lead to arbitrary file
overwrite (bsc#1262144).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:1717-1
Released: Wed May 6 14:13:17 2026
Summary: Security update for curl
Type: security
Severity: important
References: 1259362,1262631,1262632,1262635,1262636,1262638,CVE-2026-1965,CVE-2026-4873,CVE-2026-5545,CVE-2026-6253,CVE-2026-6276,CVE-2026-6429
This update for curl fixes the following issues:
Security issues fixed:
- CVE-2026-4873: connection reuse ignores TLS requirement (bsc#1262631).
- CVE-2026-5545: wrong reuse of HTTP Negotiate connection (bsc#1262632).
- CVE-2026-6253: proxy credentials leak over redirect-to proxy (bsc#1262635).
- CVE-2026-6276: stale custom cookie host causes cookie leak (bsc#1262636).
- CVE-2026-6429: netrc credential leak with reused proxy connection (bsc#1262638).
Other updates and bugfixes:
- sws: prevent 'connection monitor' to say disconnect twice (bsc#1259362).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2026:1759-1
Released: Thu May 7 16:03:37 2026
Summary: Recommended update for dracut
Type: recommended
Severity: moderate
References: 1261274
This update for dracut fixes the following issues:
- Update to version 055+suse.399.g9aa7e567:
* fix: make iso-scan trigger udev events (bsc#1261274)
The following package changes have been done:
- glibc-2.31-150300.98.1 updated
- libz1-1.2.13-150500.4.6.1 updated
- libuuid1-2.37.4-150500.9.26.1 updated
- libudev1-249.17-150400.8.55.1 updated
- libsmartcols1-2.37.4-150500.9.26.1 updated
- libgcc_s1-15.2.0+git10201-150000.1.9.1 updated
- libexpat1-2.7.1-150400.3.37.1 updated
- libcap2-2.63-150400.3.6.1 updated
- libblkid1-2.37.4-150500.9.26.1 updated
- libxml2-2-2.10.3-150500.5.38.1 updated
- libopenssl1_1-1.1.1l-150500.17.54.1 updated
- libstdc++6-15.2.0+git10201-150000.1.9.1 updated
- libfdisk1-2.37.4-150500.9.26.1 updated
- libmount1-2.37.4-150500.9.26.1 updated
- libkmod2-29-150300.4.18.1 updated
- libsystemd0-249.17-150400.8.55.1 updated
- libncurses6-6.1-150000.5.33.1 updated
- terminfo-base-6.1-150000.5.33.1 updated
- ncurses-utils-6.1-150000.5.33.1 updated
- libdevmapper1_03-2.03.22_1.02.196-150500.7.18.4 updated
- sed-4.4-150300.13.6.1 updated
- openssl-1_1-1.1.1l-150500.17.54.1 updated
- util-linux-2.37.4-150500.9.26.1 updated
- kmod-29-150300.4.18.1 updated
- systemd-249.17-150400.8.55.1 updated
- util-linux-systemd-2.37.4-150500.9.26.1 updated
- systemd-sysvinit-249.17-150400.8.55.1 updated
- udev-249.17-150400.8.55.1 updated
- dracut-055+suse.399.g9aa7e567-150500.3.35.1 updated
- libdevmapper-event1_03-2.03.22_1.02.196-150500.7.18.4 updated
- libfreebl3-3.112.4-150400.3.66.1 updated
- libglib-2_0-0-2.70.5-150400.3.34.1 updated
- libnghttp2-14-1.40.0-150200.22.1 updated
- libsasl2-3-2.1.28-150500.3.3.1 updated
- libsqlite3-0-3.51.3-150000.3.39.1 updated
- libssh-config-0.9.8-150400.3.17.1 updated
- libgobject-2_0-0-2.70.5-150400.3.34.1 updated
- libgmodule-2_0-0-2.70.5-150400.3.34.1 updated
- libssh4-0.9.8-150400.3.17.1 updated
- mozilla-nss-certs-3.112.4-150400.3.66.1 updated
- tar-1.34-150000.3.37.1 updated
- device-mapper-2.03.22_1.02.196-150500.7.18.4 updated
- libgio-2_0-0-2.70.5-150400.3.34.1 updated
- glib2-tools-2.70.5-150400.3.34.1 updated
- libcurl4-8.14.1-150400.5.83.1 updated
- mozilla-nss-3.112.4-150400.3.66.1 updated
- libsoftokn3-3.112.4-150400.3.66.1 updated
- libnm0-1.38.6-150500.3.5.1 updated
- NetworkManager-1.38.6-150500.3.5.1 updated
- liblvm2cmd2_03-2.03.22-150500.7.18.4 updated
- lvm2-2.03.22-150500.7.18.4 updated
- glibc-locale-base-2.31-150300.98.1 updated
- rsync-3.2.3-150400.3.26.1 updated
- gpg2-2.2.27-150300.3.19.1 updated
- kernel-firmware-amdgpu-20230724-150500.3.15.1 updated
- kernel-firmware-ath10k-20230724-150500.3.15.1 updated
- kernel-firmware-ath11k-20230724-150500.3.15.1 updated
- kernel-firmware-atheros-20230724-150500.3.15.1 updated
- kernel-firmware-bluetooth-20230724-150500.3.15.1 updated
- kernel-firmware-bnx2-20230724-150500.3.15.1 updated
- kernel-firmware-brcm-20230724-150500.3.15.1 updated
- kernel-firmware-chelsio-20230724-150500.3.15.1 updated
- kernel-firmware-dpaa2-20230724-150500.3.15.1 updated
- kernel-firmware-i915-20230724-150500.3.15.1 updated
- kernel-firmware-intel-20230724-150500.3.15.1 updated
- kernel-firmware-iwlwifi-20230724-150500.3.15.1 updated
- kernel-firmware-liquidio-20230724-150500.3.15.1 updated
- kernel-firmware-marvell-20230724-150500.3.15.1 updated
- kernel-firmware-media-20230724-150500.3.15.1 updated
- kernel-firmware-mediatek-20230724-150500.3.15.1 updated
- kernel-firmware-mellanox-20230724-150500.3.15.1 updated
- kernel-firmware-mwifiex-20230724-150500.3.15.1 updated
- kernel-firmware-network-20230724-150500.3.15.1 updated
- kernel-firmware-nfp-20230724-150500.3.15.1 updated
- kernel-firmware-nvidia-20230724-150500.3.15.1 updated
- kernel-firmware-platform-20230724-150500.3.15.1 updated
- kernel-firmware-prestera-20230724-150500.3.15.1 updated
- kernel-firmware-qcom-20230724-150500.3.15.1 updated
- kernel-firmware-qlogic-20230724-150500.3.15.1 updated
- kernel-firmware-radeon-20230724-150500.3.15.1 updated
- kernel-firmware-realtek-20230724-150500.3.15.1 updated
- kernel-firmware-serial-20230724-150500.3.15.1 updated
- kernel-firmware-sound-20230724-150500.3.15.1 updated
- kernel-firmware-ti-20230724-150500.3.15.1 updated
- kernel-firmware-ueagle-20230724-150500.3.15.1 updated
- kernel-firmware-usb-network-20230724-150500.3.15.1 updated
- libavahi-common3-0.8-150400.7.26.1 updated
- libpci3-3.13.0-150300.13.12.1 updated
- libxslt1-1.1.34-150400.3.16.1 updated
- runc-1.3.4-150000.92.1 updated
- sudo-1.9.12p1-150500.7.16.1 updated
- vim-data-common-9.2.0280-150500.20.46.1 updated
- kernel-firmware-all-20230724-150500.3.15.1 updated
- libavahi-core7-0.8-150400.7.26.1 updated
- libpolkit-gobject-1-0-121-150500.3.11.1 updated
- libpolkit-agent-1-0-121-150500.3.11.1 updated
- polkit-121-150500.3.11.1 updated
- libjq1-1.6-150000.3.12.1 updated
- vim-small-9.2.0280-150500.20.46.1 updated
- avahi-0.8-150400.7.26.1 updated
- hwdata-0.394-150000.3.77.2 added
- jq-1.6-150000.3.12.1 updated
- pciutils-3.13.0-150300.13.12.1 updated
- NetworkManager-wwan-1.38.6-150500.3.5.1 updated
- podman-4.9.5-150500.3.67.1 updated
- container:suse-sle-micro-base-5.5-latest-2.0.4-5.8.272 updated
- pciutils-ids-20200324-3.6.1 removed
More information about the sle-container-updates
mailing list