SUSE-SU-2026:1753-1: important: Security update for 389-ds
SUSE-SU-2026:1755-1: important: Security update for freeipmi
SUSE-SU-2026:1744-1: moderate: Security update for python-pytest
SUSE-SU-2026:1732-1: important: Security update for java-17-openjdk
SUSE-SU-2026:1740-1: moderate: Security update for python-Django
SUSE-SU-2026:1749-1: moderate: Security update for webkit2gtk3
SUSE-SU-2026:1750-1: important: Security update for librsvg
SUSE-SU-2026:1735-1: important: Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1728-1: important: Security update for the Linux Kernel (Live Patch 17 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1736-1: important: Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1733-1: important: Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)
openSUSE-SU-2026:10691-1: moderate: gnutls-3.8.13-1.1 on GA media
openSUSE-SU-2026:10690-1: moderate: cri-tools-1.36.0-1.1 on GA media
openSUSE-SU-2026:10696-1: moderate: nix-2.34.7-1.1 on GA media
openSUSE-SU-2026:10692-1: moderate: grafana-11.6.14+security01-3.1 on GA media
openSUSE-SU-2026:10694-1: moderate: libmariadbd-devel-11.8.6-1.1 on GA media
openSUSE-SU-2026:10695-1: moderate: mutt-2.3.2-1.1 on GA media
openSUSE-SU-2026:10689-1: moderate: chromedriver-148.0.7778.96-1.1 on GA media
openSUSE-SU-2026:10688-1: moderate: cf-cli-8.18.3+git.0.83ce51d9c-1.1 on GA media
openSUSE-SU-2026:10697-1: moderate: traefik-3.6.15-1.1 on GA media
SUSE-SU-2026:1753-1: important: Security update for 389-ds
# Security update for 389-ds
Announcement ID: SUSE-SU-2026:1753-1
Release Date: 2026-05-07T13:54:19Z
Rating: important
References:
* bsc#1258727
Cross-References:
* CVE-2025-14905
CVSS scores:
* CVE-2025-14905 ( SUSE ): 8.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14905 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-14905 ( NVD ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves one vulnerability can now be installed.
## Description:
This update for 389-ds fixes the following issues:
Update to version 2.0.20~git89.937b1f291.
Security issues fixed:
* CVE-2025-14905: heap buffer overflow due to improper size calculation in
`schema_attr_enum_callback` callback (bsc#1258727).
Other updates and bugfixes:
* Issue 7224 - CI Test - Simplify `test_reserve_descriptor_validation`
(#7225).
* Issue 7189 - DSBLE0007 generates incorrect remediation commands for scan
limits.
* Issue 7172 - (2nd) Index ordering mismatch after upgrade (#7180).
* Issue 7172 - Index ordering mismatch after upgrade (#7173).
* Issue 7096 - During replication online total init the function
idl_id_is_in_idlist is not scaling with large database (#7145).
* Issue 7091 - Duplicate local password policy entries listed (#7092).
* Issue 7124 - BDB cursor race condition with transaction isolation (#7125).
* Issue 7121 - LeakSanitizer: various leaks during replication (#7122).
* Issue 7115 - LeakSanitizer: leak in `slapd_bind_local_user()` (#7116).
* Issue 7109 - AddressSanitizer: SEGV `ldap/servers/slapd/csnset.c:302` in
`csnset_dup` (#7114).
* Issue 7056 - DSBLE0007 doesn't generate remediation steps for missing
indexes.
* Issue 6846 - Attribute uniqueness is not enforced with modrdn (#7026).
* Issue 7055 - Online initialization of consumers fails with error `-23`
(#7075).
* Issue 7065 - A search filter containing a non normalized DN assertion does
not return matching entries (#7068).
* Issue 7032 - The new ipahealthcheck test
ipahealthcheck.ds.backends.BackendsCheck raises CRITICAL issue (#7036).
* Issue 6966 - On large DB, unlimited IDL scan limit reduce the SRCH
performance (#6967).
* Issue 6848 - AddressSanitizer: leak in `do_search`.
* Issue 6928 - The `parentId` attribute is indexed with improper matching
rule.
* Issue 6933 - When deferred `memberof` update is enabled after the server
crashed it should not launch memberof fixup task by default (#6935).
* Issue 6929 - Compilation failure with `rust-1.89` on Fedora ELN.
* Issue 6859 - `str2filter` is not fully applying matching rules.
* Issue 6857 - `uiduniq`: allow specifying match rules in the filter.
* Issue 6893 - Log user that is updated during password modify extended
operation.
* Issue 6680 - instance read-only mode is broken (#6681).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1753=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1753=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1753=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1753=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1753=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* 389-ds-devel-2.0.20~git89.937b1f291-150400.3.48.1
* libsvrcore0-debuginfo-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-snmp-debuginfo-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-debugsource-2.0.20~git89.937b1f291-150400.3.48.1
* lib389-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-debuginfo-2.0.20~git89.937b1f291-150400.3.48.1
* libsvrcore0-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-snmp-2.0.20~git89.937b1f291-150400.3.48.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* 389-ds-devel-2.0.20~git89.937b1f291-150400.3.48.1
* libsvrcore0-debuginfo-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-debugsource-2.0.20~git89.937b1f291-150400.3.48.1
* lib389-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-debuginfo-2.0.20~git89.937b1f291-150400.3.48.1
* libsvrcore0-2.0.20~git89.937b1f291-150400.3.48.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* 389-ds-devel-2.0.20~git89.937b1f291-150400.3.48.1
* libsvrcore0-debuginfo-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-debugsource-2.0.20~git89.937b1f291-150400.3.48.1
* lib389-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-debuginfo-2.0.20~git89.937b1f291-150400.3.48.1
* libsvrcore0-2.0.20~git89.937b1f291-150400.3.48.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* 389-ds-devel-2.0.20~git89.937b1f291-150400.3.48.1
* libsvrcore0-debuginfo-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-debugsource-2.0.20~git89.937b1f291-150400.3.48.1
* lib389-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-debuginfo-2.0.20~git89.937b1f291-150400.3.48.1
* libsvrcore0-2.0.20~git89.937b1f291-150400.3.48.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* 389-ds-devel-2.0.20~git89.937b1f291-150400.3.48.1
* libsvrcore0-debuginfo-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-debugsource-2.0.20~git89.937b1f291-150400.3.48.1
* lib389-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-2.0.20~git89.937b1f291-150400.3.48.1
* 389-ds-debuginfo-2.0.20~git89.937b1f291-150400.3.48.1
* libsvrcore0-2.0.20~git89.937b1f291-150400.3.48.1
## References:
* https://www.suse.com/security/cve/CVE-2025-14905.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258727
SUSE-SU-2026:1755-1: important: Security update for freeipmi
# Security update for freeipmi
Announcement ID: SUSE-SU-2026:1755-1
Release Date: 2026-05-07T13:55:17Z
Rating: important
References:
* bsc#1260414
Cross-References:
* CVE-2026-33554
CVSS scores:
* CVE-2026-33554 ( SUSE ): 5.9
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33554 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
* CVE-2026-33554 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for freeipmi fixes the following issue:
* CVE-2026-33554: improper memory handling and data validation can lead to
stack buffer overflows and acceptance of malformed payloads/responses
(bsc#1260414).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1755=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1755=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1755=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1755=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1755=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1755=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1755=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1755=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1755=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1755=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1755=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1755=1
## Package List:
* openSUSE Leap 15.4 (aarch64 x86_64 i586)
* freeipmi-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-1.6.8-150400.3.3.1
* freeipmi-devel-1.6.8-150400.3.3.1
* freeipmi-debuginfo-1.6.8-150400.3.3.1
* libipmidetect0-1.6.8-150400.3.3.1
* libipmiconsole2-debuginfo-1.6.8-150400.3.3.1
* freeipmi-debugsource-1.6.8-150400.3.3.1
* libipmidetect0-debuginfo-1.6.8-150400.3.3.1
* libfreeipmi17-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-debuginfo-1.6.8-150400.3.3.1
* libipmimonitoring6-debuginfo-1.6.8-150400.3.3.1
* freeipmi-bmc-watchdog-1.6.8-150400.3.3.1
* libipmiconsole2-1.6.8-150400.3.3.1
* freeipmi-ipmidetectd-debuginfo-1.6.8-150400.3.3.1
* freeipmi-bmc-watchdog-debuginfo-1.6.8-150400.3.3.1
* freeipmi-ipmidetectd-1.6.8-150400.3.3.1
* libipmimonitoring6-1.6.8-150400.3.3.1
* libfreeipmi17-debuginfo-1.6.8-150400.3.3.1
* Basesystem Module 15-SP7 (aarch64 x86_64)
* freeipmi-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-1.6.8-150400.3.3.1
* freeipmi-devel-1.6.8-150400.3.3.1
* freeipmi-debuginfo-1.6.8-150400.3.3.1
* libipmidetect0-1.6.8-150400.3.3.1
* libipmiconsole2-debuginfo-1.6.8-150400.3.3.1
* freeipmi-debugsource-1.6.8-150400.3.3.1
* libipmidetect0-debuginfo-1.6.8-150400.3.3.1
* libfreeipmi17-1.6.8-150400.3.3.1
* libipmimonitoring6-debuginfo-1.6.8-150400.3.3.1
* libipmiconsole2-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-debuginfo-1.6.8-150400.3.3.1
* libipmimonitoring6-1.6.8-150400.3.3.1
* libfreeipmi17-debuginfo-1.6.8-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* freeipmi-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-1.6.8-150400.3.3.1
* freeipmi-devel-1.6.8-150400.3.3.1
* freeipmi-debuginfo-1.6.8-150400.3.3.1
* libipmidetect0-1.6.8-150400.3.3.1
* libipmiconsole2-debuginfo-1.6.8-150400.3.3.1
* freeipmi-debugsource-1.6.8-150400.3.3.1
* libipmidetect0-debuginfo-1.6.8-150400.3.3.1
* libfreeipmi17-1.6.8-150400.3.3.1
* libipmimonitoring6-debuginfo-1.6.8-150400.3.3.1
* libipmiconsole2-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-debuginfo-1.6.8-150400.3.3.1
* libipmimonitoring6-1.6.8-150400.3.3.1
* libfreeipmi17-debuginfo-1.6.8-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* freeipmi-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-1.6.8-150400.3.3.1
* freeipmi-devel-1.6.8-150400.3.3.1
* freeipmi-debuginfo-1.6.8-150400.3.3.1
* libipmidetect0-1.6.8-150400.3.3.1
* libipmiconsole2-debuginfo-1.6.8-150400.3.3.1
* freeipmi-debugsource-1.6.8-150400.3.3.1
* libipmidetect0-debuginfo-1.6.8-150400.3.3.1
* libfreeipmi17-1.6.8-150400.3.3.1
* libipmimonitoring6-debuginfo-1.6.8-150400.3.3.1
* libipmiconsole2-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-debuginfo-1.6.8-150400.3.3.1
* libipmimonitoring6-1.6.8-150400.3.3.1
* libfreeipmi17-debuginfo-1.6.8-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* freeipmi-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-1.6.8-150400.3.3.1
* freeipmi-devel-1.6.8-150400.3.3.1
* freeipmi-debuginfo-1.6.8-150400.3.3.1
* libipmidetect0-1.6.8-150400.3.3.1
* libipmiconsole2-debuginfo-1.6.8-150400.3.3.1
* freeipmi-debugsource-1.6.8-150400.3.3.1
* libipmidetect0-debuginfo-1.6.8-150400.3.3.1
* libfreeipmi17-1.6.8-150400.3.3.1
* libipmimonitoring6-debuginfo-1.6.8-150400.3.3.1
* libipmiconsole2-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-debuginfo-1.6.8-150400.3.3.1
* libipmimonitoring6-1.6.8-150400.3.3.1
* libfreeipmi17-debuginfo-1.6.8-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* freeipmi-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-1.6.8-150400.3.3.1
* freeipmi-devel-1.6.8-150400.3.3.1
* freeipmi-debuginfo-1.6.8-150400.3.3.1
* libipmidetect0-1.6.8-150400.3.3.1
* libipmiconsole2-debuginfo-1.6.8-150400.3.3.1
* freeipmi-debugsource-1.6.8-150400.3.3.1
* libipmidetect0-debuginfo-1.6.8-150400.3.3.1
* libfreeipmi17-1.6.8-150400.3.3.1
* libipmimonitoring6-debuginfo-1.6.8-150400.3.3.1
* libipmiconsole2-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-debuginfo-1.6.8-150400.3.3.1
* libipmimonitoring6-1.6.8-150400.3.3.1
* libfreeipmi17-debuginfo-1.6.8-150400.3.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64)
* freeipmi-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-1.6.8-150400.3.3.1
* freeipmi-devel-1.6.8-150400.3.3.1
* freeipmi-debuginfo-1.6.8-150400.3.3.1
* libipmidetect0-1.6.8-150400.3.3.1
* libipmiconsole2-debuginfo-1.6.8-150400.3.3.1
* freeipmi-debugsource-1.6.8-150400.3.3.1
* libipmidetect0-debuginfo-1.6.8-150400.3.3.1
* libfreeipmi17-1.6.8-150400.3.3.1
* libipmimonitoring6-debuginfo-1.6.8-150400.3.3.1
* libipmiconsole2-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-debuginfo-1.6.8-150400.3.3.1
* libipmimonitoring6-1.6.8-150400.3.3.1
* libfreeipmi17-debuginfo-1.6.8-150400.3.3.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 x86_64)
* freeipmi-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-1.6.8-150400.3.3.1
* freeipmi-devel-1.6.8-150400.3.3.1
* freeipmi-debuginfo-1.6.8-150400.3.3.1
* libipmidetect0-1.6.8-150400.3.3.1
* libipmiconsole2-debuginfo-1.6.8-150400.3.3.1
* freeipmi-debugsource-1.6.8-150400.3.3.1
* libipmidetect0-debuginfo-1.6.8-150400.3.3.1
* libfreeipmi17-1.6.8-150400.3.3.1
* libipmimonitoring6-debuginfo-1.6.8-150400.3.3.1
* libipmiconsole2-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-debuginfo-1.6.8-150400.3.3.1
* libipmimonitoring6-1.6.8-150400.3.3.1
* libfreeipmi17-debuginfo-1.6.8-150400.3.3.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 x86_64)
* freeipmi-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-1.6.8-150400.3.3.1
* freeipmi-devel-1.6.8-150400.3.3.1
* freeipmi-debuginfo-1.6.8-150400.3.3.1
* libipmidetect0-1.6.8-150400.3.3.1
* libipmiconsole2-debuginfo-1.6.8-150400.3.3.1
* freeipmi-debugsource-1.6.8-150400.3.3.1
* libipmidetect0-debuginfo-1.6.8-150400.3.3.1
* libfreeipmi17-1.6.8-150400.3.3.1
* libipmimonitoring6-debuginfo-1.6.8-150400.3.3.1
* libipmiconsole2-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-debuginfo-1.6.8-150400.3.3.1
* libipmimonitoring6-1.6.8-150400.3.3.1
* libfreeipmi17-debuginfo-1.6.8-150400.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* freeipmi-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-1.6.8-150400.3.3.1
* freeipmi-devel-1.6.8-150400.3.3.1
* freeipmi-debuginfo-1.6.8-150400.3.3.1
* libipmidetect0-1.6.8-150400.3.3.1
* libipmiconsole2-debuginfo-1.6.8-150400.3.3.1
* freeipmi-debugsource-1.6.8-150400.3.3.1
* libipmidetect0-debuginfo-1.6.8-150400.3.3.1
* libfreeipmi17-1.6.8-150400.3.3.1
* libipmimonitoring6-debuginfo-1.6.8-150400.3.3.1
* libipmiconsole2-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-debuginfo-1.6.8-150400.3.3.1
* libipmimonitoring6-1.6.8-150400.3.3.1
* libfreeipmi17-debuginfo-1.6.8-150400.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* freeipmi-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-1.6.8-150400.3.3.1
* freeipmi-devel-1.6.8-150400.3.3.1
* freeipmi-debuginfo-1.6.8-150400.3.3.1
* libipmidetect0-1.6.8-150400.3.3.1
* libipmiconsole2-debuginfo-1.6.8-150400.3.3.1
* freeipmi-debugsource-1.6.8-150400.3.3.1
* libipmidetect0-debuginfo-1.6.8-150400.3.3.1
* libfreeipmi17-1.6.8-150400.3.3.1
* libipmimonitoring6-debuginfo-1.6.8-150400.3.3.1
* libipmiconsole2-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-debuginfo-1.6.8-150400.3.3.1
* libipmimonitoring6-1.6.8-150400.3.3.1
* libfreeipmi17-debuginfo-1.6.8-150400.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* freeipmi-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-1.6.8-150400.3.3.1
* freeipmi-devel-1.6.8-150400.3.3.1
* freeipmi-debuginfo-1.6.8-150400.3.3.1
* libipmidetect0-1.6.8-150400.3.3.1
* libipmiconsole2-debuginfo-1.6.8-150400.3.3.1
* freeipmi-debugsource-1.6.8-150400.3.3.1
* libipmidetect0-debuginfo-1.6.8-150400.3.3.1
* libfreeipmi17-1.6.8-150400.3.3.1
* libipmimonitoring6-debuginfo-1.6.8-150400.3.3.1
* libipmiconsole2-1.6.8-150400.3.3.1
* freeipmi-ipmiseld-debuginfo-1.6.8-150400.3.3.1
* libipmimonitoring6-1.6.8-150400.3.3.1
* libfreeipmi17-debuginfo-1.6.8-150400.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2026-33554.html
* https://bugzilla.suse.com/show_bug.cgi?id=1260414
SUSE-SU-2026:1744-1: moderate: Security update for python-pytest
# Security update for python-pytest
Announcement ID: SUSE-SU-2026:1744-1
Release Date: 2026-05-07T07:17:07Z
Rating: moderate
References:
* bsc#1257090
Cross-References:
* CVE-2025-71176
CVSS scores:
* CVE-2025-71176 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
* CVE-2025-71176 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
* CVE-2025-71176 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
Affected Products:
* openSUSE Leap 15.4
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for python-pytest fixes the following issue
* CVE-2025-71176: a TOCTOU race condition can cause a denial of service or
possibly gain privileges (bsc#1257090).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1744=1
* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-1744=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* python311-pytest-8.3.5-150400.3.15.1
* Python 3 Module 15-SP7 (noarch)
* python311-pytest-8.3.5-150400.3.15.1
## References:
* https://www.suse.com/security/cve/CVE-2025-71176.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257090
SUSE-SU-2026:1732-1: important: Security update for java-17-openjdk
# Security update for java-17-openjdk
Announcement ID: SUSE-SU-2026:1732-1
Release Date: 2026-05-07T00:43:53Z
Rating: important
References:
* bsc#1259118
* bsc#1262490
* bsc#1262494
* bsc#1262495
* bsc#1262496
* bsc#1262497
* bsc#1262500
* bsc#1262501
* jsc#PED-15898
Cross-References:
* CVE-2026-22007
* CVE-2026-22013
* CVE-2026-22016
* CVE-2026-22018
* CVE-2026-22021
* CVE-2026-23865
* CVE-2026-34268
* CVE-2026-34282
CVSS scores:
* CVE-2026-22007 ( SUSE ): 2.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-22007 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-22007 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-22013 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-22013 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2026-22013 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2026-22016 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-22016 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-22016 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-22018 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-22018 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22018 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22021 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-22021 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22021 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-23865 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-23865 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-23865 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-34268 ( SUSE ): 2.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34268 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-34268 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-34282 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34282 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-34282 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Legacy Module 15-SP7
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves eight vulnerabilities and contains one feature can now be
installed.
## Description:
This update for java-17-openjdk fixes the following issues:
Upgrade to upstream tag jdk-17.0.19+10 (April 2026 CPU).
Security issues fixed:
* CVE-2026-22007: Security: unauthenticated attacker with logon to the
infrastructure where java executes can gain unauthorized read access to a
subset of accessible data (bsc#1262490).
* CVE-2026-22013: JGSS: unauthenticated attacker with network access via
multiple protocols can gain unauthorized access to critical data
(bsc#1262494).
* CVE-2026-22016: JAXP: unauthenticated attacker with network access via
multiple protocols can gain unauthorized to access critical data
(bsc#1262495).
* CVE-2026-22018: Libraries: unauthenticated attacker with network access via
multiple protocols can cause a partial denial of service (bsc#1262496).
* CVE-2026-22021: JSSE: unauthenticated attacker with network access via HTTPS
can cause a partial denial of service (bsc#1262497).
* CVE-2026-23865: freetype2: integer overflow in the
`tt_var_load_item_variation_store` function allows for an out-of-bounds read
when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts(bsc#1259118).
* CVE-2026-34268: Security: unauthenticated attacker with logon to the
infrastructure where java executes can gain unauthorized read access to a
subset of data (bsc#1262500).
* CVE-2026-34282: Networking: unauthenticated attacker with network access via
multiple protocols can cause a hang or frequently repeatable crash
(bsc#1262501).
Other updates and bugfixes:
* Provide the timezone-java and tzdata-java (jsc#PED-15898).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1732=1
* Legacy Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2026-1732=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1732=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1732=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1732=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1732=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1732=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1732=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1732=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1732=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1732=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1732=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* java-17-openjdk-debugsource-17.0.19.0-150400.3.66.2
* java-17-openjdk-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-src-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-17.0.19.0-150400.3.66.2
* java-17-openjdk-jmods-17.0.19.0-150400.3.66.2
* java-17-openjdk-17.0.19.0-150400.3.66.2
* java-17-openjdk-demo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-17.0.19.0-150400.3.66.2
* openSUSE Leap 15.4 (noarch)
* java-17-openjdk-javadoc-17.0.19.0-150400.3.66.2
* Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* java-17-openjdk-debugsource-17.0.19.0-150400.3.66.2
* java-17-openjdk-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-17.0.19.0-150400.3.66.2
* java-17-openjdk-17.0.19.0-150400.3.66.2
* java-17-openjdk-demo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-17.0.19.0-150400.3.66.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* java-17-openjdk-debugsource-17.0.19.0-150400.3.66.2
* java-17-openjdk-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-17.0.19.0-150400.3.66.2
* java-17-openjdk-17.0.19.0-150400.3.66.2
* java-17-openjdk-demo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-17.0.19.0-150400.3.66.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* java-17-openjdk-debugsource-17.0.19.0-150400.3.66.2
* java-17-openjdk-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-17.0.19.0-150400.3.66.2
* java-17-openjdk-17.0.19.0-150400.3.66.2
* java-17-openjdk-demo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-17.0.19.0-150400.3.66.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* java-17-openjdk-debugsource-17.0.19.0-150400.3.66.2
* java-17-openjdk-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-17.0.19.0-150400.3.66.2
* java-17-openjdk-17.0.19.0-150400.3.66.2
* java-17-openjdk-demo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-17.0.19.0-150400.3.66.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* java-17-openjdk-debugsource-17.0.19.0-150400.3.66.2
* java-17-openjdk-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-17.0.19.0-150400.3.66.2
* java-17-openjdk-17.0.19.0-150400.3.66.2
* java-17-openjdk-demo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-17.0.19.0-150400.3.66.2
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* java-17-openjdk-debugsource-17.0.19.0-150400.3.66.2
* java-17-openjdk-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-17.0.19.0-150400.3.66.2
* java-17-openjdk-17.0.19.0-150400.3.66.2
* java-17-openjdk-demo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-17.0.19.0-150400.3.66.2
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* java-17-openjdk-debugsource-17.0.19.0-150400.3.66.2
* java-17-openjdk-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-17.0.19.0-150400.3.66.2
* java-17-openjdk-17.0.19.0-150400.3.66.2
* java-17-openjdk-demo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-17.0.19.0-150400.3.66.2
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* java-17-openjdk-debugsource-17.0.19.0-150400.3.66.2
* java-17-openjdk-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-17.0.19.0-150400.3.66.2
* java-17-openjdk-17.0.19.0-150400.3.66.2
* java-17-openjdk-demo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-17.0.19.0-150400.3.66.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* java-17-openjdk-debugsource-17.0.19.0-150400.3.66.2
* java-17-openjdk-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-17.0.19.0-150400.3.66.2
* java-17-openjdk-17.0.19.0-150400.3.66.2
* java-17-openjdk-demo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-17.0.19.0-150400.3.66.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* java-17-openjdk-debugsource-17.0.19.0-150400.3.66.2
* java-17-openjdk-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-17.0.19.0-150400.3.66.2
* java-17-openjdk-17.0.19.0-150400.3.66.2
* java-17-openjdk-demo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-17.0.19.0-150400.3.66.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* java-17-openjdk-debugsource-17.0.19.0-150400.3.66.2
* java-17-openjdk-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-debuginfo-17.0.19.0-150400.3.66.2
* java-17-openjdk-devel-17.0.19.0-150400.3.66.2
* java-17-openjdk-17.0.19.0-150400.3.66.2
* java-17-openjdk-demo-17.0.19.0-150400.3.66.2
* java-17-openjdk-headless-17.0.19.0-150400.3.66.2
## References:
* https://www.suse.com/security/cve/CVE-2026-22007.html
* https://www.suse.com/security/cve/CVE-2026-22013.html
* https://www.suse.com/security/cve/CVE-2026-22016.html
* https://www.suse.com/security/cve/CVE-2026-22018.html
* https://www.suse.com/security/cve/CVE-2026-22021.html
* https://www.suse.com/security/cve/CVE-2026-23865.html
* https://www.suse.com/security/cve/CVE-2026-34268.html
* https://www.suse.com/security/cve/CVE-2026-34282.html
* https://bugzilla.suse.com/show_bug.cgi?id=1259118
* https://bugzilla.suse.com/show_bug.cgi?id=1262490
* https://bugzilla.suse.com/show_bug.cgi?id=1262494
* https://bugzilla.suse.com/show_bug.cgi?id=1262495
* https://bugzilla.suse.com/show_bug.cgi?id=1262496
* https://bugzilla.suse.com/show_bug.cgi?id=1262497
* https://bugzilla.suse.com/show_bug.cgi?id=1262500
* https://bugzilla.suse.com/show_bug.cgi?id=1262501
* https://jira.suse.com/browse/PED-15898
SUSE-SU-2026:1740-1: moderate: Security update for python-Django
# Security update for python-Django
Announcement ID: SUSE-SU-2026:1740-1
Release Date: 2026-05-07T07:00:33Z
Rating: moderate
References:
* bsc#1261722
* bsc#1261724
* bsc#1261729
* bsc#1261731
* bsc#1261732
* bsc#1264152
* bsc#1264153
* bsc#1264154
Cross-References:
* CVE-2026-33033
* CVE-2026-33034
* CVE-2026-35192
* CVE-2026-3902
* CVE-2026-4277
* CVE-2026-4292
* CVE-2026-5766
* CVE-2026-6907
CVSS scores:
* CVE-2026-33033 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-33033 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33033 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33034 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33034 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-35192 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-35192 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2026-35192 ( NVD ): 2.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-35192 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2026-3902 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-3902 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-3902 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-4277 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-4277 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-4292 ( SUSE ): 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-4292 ( NVD ): 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-5766 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-5766 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-5766 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-5766 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-6907 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-6907 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-6907 ( NVD ): 2.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-6907 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-6907 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for python-Django fixes the following issues
* CVE-2026-3902: headers spoofing by exploiting an ambiguous mapping of two
header variants in `ASGIRequest` requests (bsc#1261729).
* CVE-2026-4277: permissions on inline model instances were not validated on
submission of forged POST data in GenericInlineModelAdmin (bsc#1261731).
* CVE-2026-4292: admin changelist forms using ModelAdmin.list_editable
incorrectly allowed new instances to be created via forged POST data
(bsc#1261732).
* CVE-2026-5766: potential denial-of-service vulnerability in ASGI requests
via file upload limit bypass (bsc#1264153).
* CVE-2026-6907: potential exposure of private data due to incorrect handling
of `Vary: *` in `UpdateCacheMiddleware` (bsc#1264152).
* CVE-2026-33033: denial of service via missing or understated Content-Length
header in ASGI requests (bsc#1261722).
* CVE-2026-33034: ASGI requests with a missing or understated Content-Length
header could bypass the `DATA_UPLOAD_MAX_MEMORY_SIZE` limit when reading
HttpRequest.body (bsc#1261724).
* CVE-2026-35192: session fixation via public cached pages and
`SESSION_SAVE_EVERY_REQUEST` (bsc#1264154).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1740=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-1740=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* python311-Django-4.2.11-150600.3.56.1
* SUSE Package Hub 15 15-SP7 (noarch)
* python311-Django-4.2.11-150600.3.56.1
## References:
* https://www.suse.com/security/cve/CVE-2026-33033.html
* https://www.suse.com/security/cve/CVE-2026-33034.html
* https://www.suse.com/security/cve/CVE-2026-35192.html
* https://www.suse.com/security/cve/CVE-2026-3902.html
* https://www.suse.com/security/cve/CVE-2026-4277.html
* https://www.suse.com/security/cve/CVE-2026-4292.html
* https://www.suse.com/security/cve/CVE-2026-5766.html
* https://www.suse.com/security/cve/CVE-2026-6907.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261722
* https://bugzilla.suse.com/show_bug.cgi?id=1261724
* https://bugzilla.suse.com/show_bug.cgi?id=1261729
* https://bugzilla.suse.com/show_bug.cgi?id=1261731
* https://bugzilla.suse.com/show_bug.cgi?id=1261732
* https://bugzilla.suse.com/show_bug.cgi?id=1264152
* https://bugzilla.suse.com/show_bug.cgi?id=1264153
* https://bugzilla.suse.com/show_bug.cgi?id=1264154
SUSE-SU-2026:1749-1: moderate: Security update for webkit2gtk3
# Security update for webkit2gtk3
Announcement ID: SUSE-SU-2026:1749-1
Release Date: 2026-05-07T10:49:01Z
Rating: moderate
References:
* bsc#1261172
* bsc#1261173
* bsc#1261174
* bsc#1261175
* bsc#1261176
* bsc#1261177
* bsc#1261178
* bsc#1261179
Cross-References:
* CVE-2026-20643
* CVE-2026-20664
* CVE-2026-20665
* CVE-2026-20691
* CVE-2026-28857
* CVE-2026-28859
* CVE-2026-28861
* CVE-2026-28871
CVSS scores:
* CVE-2026-20643 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2026-20643 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2026-20664 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-20664 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-20665 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
* CVE-2026-20665 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-20691 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-20691 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-28857 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-28857 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-28859 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2026-28859 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-28861 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
* CVE-2026-28861 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-28871 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-28871 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for webkit2gtk3 fixes the following issues:
Update to version 2.52.1.
Security issues fixed:
* CVE-2026-20643: processing maliciously crafted web content may bypass Same
Origin Policy (bsc#1261172).
* CVE-2026-20664: processing maliciously crafted web content may lead to an
unexpected process crash (bsc#1261173).
* CVE-2026-20665: processing maliciously crafted web content may prevent
Content Security Policy from being enforced (bsc#1261174).
* CVE-2026-20691: a maliciously crafted webpage may be able to fingerprint the
user (bsc#1261175).
* CVE-2026-28857: processing maliciously crafted web content may lead to an
unexpected process crash (bsc#1261176).
* CVE-2026-28859: a malicious website may be able to process restricted web
content outside the sandbox (bsc#1261177).
* CVE-2026-28861: a malicious website may be able to access script message
handlers intended for other origins (bsc#1261178).
* CVE-2026-28871: visiting a maliciously crafted website may lead to a cross-
site scripting attack (bsc#1261179).
Other updates and bugfixes:
* Reduce the amount of useless MPRIS notifications produced by MediaSession
when the information about media being played is incomplete.
* Support turning off USE_GSTREAMER to configure the build with all multimedia
features disabled.
* Add Sysprof marks for mouse events.
* Fix MediaSession icon for iheart.com not being displayed.
* Fix the build with USE_GSTREAMER_GL disabled.
* Fix the build with librice version 0.3.0 or newer.
* Fix several crashes and rendering issues.
* Translation updates: Georgian.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1749=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* WebKitGTK-4.1-lang-2.52.1-150400.4.140.2
* WebKitGTK-6.0-lang-2.52.1-150400.4.140.2
* WebKitGTK-4.0-lang-2.52.1-150400.4.140.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* webkit-jsc-4-debuginfo-2.52.1-150400.4.140.2
* typelib-1_0-JavaScriptCore-4_0-2.52.1-150400.4.140.2
* webkit2gtk4-minibrowser-2.52.1-150400.4.140.2
* webkit2gtk-4_0-injected-bundles-2.52.1-150400.4.140.2
* libwebkitgtk-6_0-4-debuginfo-2.52.1-150400.4.140.2
* webkit2gtk4-debugsource-2.52.1-150400.4.140.2
* typelib-1_0-WebKit2-4_0-2.52.1-150400.4.140.2
* webkit2gtk4-devel-2.52.1-150400.4.140.2
* webkit-jsc-4-2.52.1-150400.4.140.2
* webkit2gtk3-soup2-minibrowser-debuginfo-2.52.1-150400.4.140.2
* typelib-1_0-JavaScriptCore-6_0-2.52.1-150400.4.140.2
* webkit2gtk-4_1-injected-bundles-debuginfo-2.52.1-150400.4.140.2
* webkit2gtk3-soup2-minibrowser-2.52.1-150400.4.140.2
* typelib-1_0-JavaScriptCore-4_1-2.52.1-150400.4.140.2
* libjavascriptcoregtk-4_1-0-2.52.1-150400.4.140.2
* libjavascriptcoregtk-6_0-1-2.52.1-150400.4.140.2
* webkit2gtk3-devel-2.52.1-150400.4.140.2
* typelib-1_0-WebKit2WebExtension-4_1-2.52.1-150400.4.140.2
* libwebkit2gtk-4_0-37-debuginfo-2.52.1-150400.4.140.2
* libjavascriptcoregtk-4_1-0-debuginfo-2.52.1-150400.4.140.2
* libjavascriptcoregtk-6_0-1-debuginfo-2.52.1-150400.4.140.2
* webkitgtk-6_0-injected-bundles-debuginfo-2.52.1-150400.4.140.2
* webkit-jsc-4.1-debuginfo-2.52.1-150400.4.140.2
* webkit-jsc-6.0-debuginfo-2.52.1-150400.4.140.2
* webkit2gtk3-soup2-debugsource-2.52.1-150400.4.140.2
* libjavascriptcoregtk-4_0-18-2.52.1-150400.4.140.2
* libwebkitgtk-6_0-4-2.52.1-150400.4.140.2
* libwebkit2gtk-4_1-0-2.52.1-150400.4.140.2
* webkit2gtk4-minibrowser-debuginfo-2.52.1-150400.4.140.2
* libwebkit2gtk-4_0-37-2.52.1-150400.4.140.2
* libwebkit2gtk-4_1-0-debuginfo-2.52.1-150400.4.140.2
* webkit2gtk-4_1-injected-bundles-2.52.1-150400.4.140.2
* typelib-1_0-WebKit2-4_1-2.52.1-150400.4.140.2
* typelib-1_0-WebKit-6_0-2.52.1-150400.4.140.2
* typelib-1_0-WebKitWebProcessExtension-6_0-2.52.1-150400.4.140.2
* webkitgtk-6_0-injected-bundles-2.52.1-150400.4.140.2
* libjavascriptcoregtk-4_0-18-debuginfo-2.52.1-150400.4.140.2
* webkit2gtk3-minibrowser-2.52.1-150400.4.140.2
* typelib-1_0-WebKit2WebExtension-4_0-2.52.1-150400.4.140.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.52.1-150400.4.140.2
* webkit-jsc-4.1-2.52.1-150400.4.140.2
* webkit2gtk3-debugsource-2.52.1-150400.4.140.2
* webkit2gtk3-minibrowser-debuginfo-2.52.1-150400.4.140.2
* webkit2gtk3-soup2-devel-2.52.1-150400.4.140.2
* webkit-jsc-6.0-2.52.1-150400.4.140.2
* openSUSE Leap 15.4 (x86_64)
* libwebkit2gtk-4_0-37-32bit-debuginfo-2.52.1-150400.4.140.2
* libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.52.1-150400.4.140.2
* libwebkit2gtk-4_1-0-32bit-2.52.1-150400.4.140.2
* libjavascriptcoregtk-4_0-18-32bit-2.52.1-150400.4.140.2
* libwebkit2gtk-4_1-0-32bit-debuginfo-2.52.1-150400.4.140.2
* libjavascriptcoregtk-4_1-0-32bit-2.52.1-150400.4.140.2
* libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.52.1-150400.4.140.2
* libwebkit2gtk-4_0-37-32bit-2.52.1-150400.4.140.2
* openSUSE Leap 15.4 (aarch64_ilp32)
* libwebkit2gtk-4_0-37-64bit-2.52.1-150400.4.140.2
* libjavascriptcoregtk-4_1-0-64bit-2.52.1-150400.4.140.2
* libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.52.1-150400.4.140.2
* libwebkit2gtk-4_0-37-64bit-debuginfo-2.52.1-150400.4.140.2
* libjavascriptcoregtk-4_0-18-64bit-2.52.1-150400.4.140.2
* libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.52.1-150400.4.140.2
* libwebkit2gtk-4_1-0-64bit-2.52.1-150400.4.140.2
* libwebkit2gtk-4_1-0-64bit-debuginfo-2.52.1-150400.4.140.2
## References:
* https://www.suse.com/security/cve/CVE-2026-20643.html
* https://www.suse.com/security/cve/CVE-2026-20664.html
* https://www.suse.com/security/cve/CVE-2026-20665.html
* https://www.suse.com/security/cve/CVE-2026-20691.html
* https://www.suse.com/security/cve/CVE-2026-28857.html
* https://www.suse.com/security/cve/CVE-2026-28859.html
* https://www.suse.com/security/cve/CVE-2026-28861.html
* https://www.suse.com/security/cve/CVE-2026-28871.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261172
* https://bugzilla.suse.com/show_bug.cgi?id=1261173
* https://bugzilla.suse.com/show_bug.cgi?id=1261174
* https://bugzilla.suse.com/show_bug.cgi?id=1261175
* https://bugzilla.suse.com/show_bug.cgi?id=1261176
* https://bugzilla.suse.com/show_bug.cgi?id=1261177
* https://bugzilla.suse.com/show_bug.cgi?id=1261178
* https://bugzilla.suse.com/show_bug.cgi?id=1261179
SUSE-SU-2026:1750-1: important: Security update for librsvg
# Security update for librsvg
Announcement ID: SUSE-SU-2026:1750-1
Release Date: 2026-05-07T11:52:26Z
Rating: important
References:
* bsc#1257922
Cross-References:
* CVE-2026-25727
CVSS scores:
* CVE-2026-25727 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25727 ( NVD ): 6.8
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-25727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP7
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for librsvg fixes the following issue:
* CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date
parser can lead to stack exhaustion (bsc#1257922).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1750=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1750=1
* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-1750=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1750=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1750=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* rsvg-convert-debuginfo-2.57.4-150600.3.8.2
* rsvg-convert-2.57.4-150600.3.8.2
* librsvg-debugsource-2.57.4-150600.3.8.2
* gdk-pixbuf-loader-rsvg-2.57.4-150600.3.8.2
* librsvg-2-2-debuginfo-2.57.4-150600.3.8.2
* gdk-pixbuf-loader-rsvg-debuginfo-2.57.4-150600.3.8.2
* librsvg-devel-2.57.4-150600.3.8.2
* typelib-1_0-Rsvg-2_0-2.57.4-150600.3.8.2
* librsvg-2-2-2.57.4-150600.3.8.2
* openSUSE Leap 15.6 (noarch)
* rsvg-thumbnailer-2.57.4-150600.3.8.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* librsvg-2-2-64bit-debuginfo-2.57.4-150600.3.8.2
* gdk-pixbuf-loader-rsvg-64bit-debuginfo-2.57.4-150600.3.8.2
* gdk-pixbuf-loader-rsvg-64bit-2.57.4-150600.3.8.2
* librsvg-2-2-64bit-2.57.4-150600.3.8.2
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* librsvg-debugsource-2.57.4-150600.3.8.2
* gdk-pixbuf-loader-rsvg-2.57.4-150600.3.8.2
* librsvg-2-2-debuginfo-2.57.4-150600.3.8.2
* gdk-pixbuf-loader-rsvg-debuginfo-2.57.4-150600.3.8.2
* librsvg-2-2-2.57.4-150600.3.8.2
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* typelib-1_0-Rsvg-2_0-2.57.4-150600.3.8.2
* librsvg-devel-2.57.4-150600.3.8.2
* librsvg-debugsource-2.57.4-150600.3.8.2
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* librsvg-debugsource-2.57.4-150600.3.8.2
* gdk-pixbuf-loader-rsvg-2.57.4-150600.3.8.2
* librsvg-2-2-debuginfo-2.57.4-150600.3.8.2
* gdk-pixbuf-loader-rsvg-debuginfo-2.57.4-150600.3.8.2
* librsvg-devel-2.57.4-150600.3.8.2
* typelib-1_0-Rsvg-2_0-2.57.4-150600.3.8.2
* librsvg-2-2-2.57.4-150600.3.8.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* librsvg-debugsource-2.57.4-150600.3.8.2
* gdk-pixbuf-loader-rsvg-2.57.4-150600.3.8.2
* librsvg-2-2-debuginfo-2.57.4-150600.3.8.2
* gdk-pixbuf-loader-rsvg-debuginfo-2.57.4-150600.3.8.2
* librsvg-devel-2.57.4-150600.3.8.2
* typelib-1_0-Rsvg-2_0-2.57.4-150600.3.8.2
* librsvg-2-2-2.57.4-150600.3.8.2
## References:
* https://www.suse.com/security/cve/CVE-2026-25727.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257922
SUSE-SU-2026:1735-1: important: Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP6)
# Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise
15 SP6)
Announcement ID: SUSE-SU-2026:1735-1
Release Date: 2026-05-07T02:34:47Z
Rating: important
References:
* bsc#1258005
* bsc#1258655
* bsc#1259126
* bsc#1263689
Cross-References:
* CVE-2025-71066
* CVE-2026-23004
* CVE-2026-23204
* CVE-2026-31431
CVSS scores:
* CVE-2025-71066 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23004 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23204 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-31431 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31431 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.87 fixes
various security issues
The following security issues were fixed:
* CVE-2025-71066: net/sched: ets: Always remove class from active list before
deleting in ets_qdisc_change (bsc#1258005).
* CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and
rt_del_uncached_list() (bsc#1258655).
* CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful()
(bsc#1259126).
* CVE-2026-31431: crypto: algif_aead - Revert to operating out-of-place
(bsc#1263689).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-1727=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1735=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-1735=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1727=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_20-debugsource-4-150600.2.1
* kernel-livepatch-6_4_0-150600_23_87-default-4-150600.2.1
* kernel-livepatch-6_4_0-150600_23_87-default-debuginfo-4-150600.2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_194-default-debuginfo-4-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_48-debugsource-4-150400.2.1
* kernel-livepatch-5_14_21-150400_24_194-default-4-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_194-default-debuginfo-4-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_48-debugsource-4-150400.2.1
* kernel-livepatch-5_14_21-150400_24_194-default-4-150400.2.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_20-debugsource-4-150600.2.1
* kernel-livepatch-6_4_0-150600_23_87-default-4-150600.2.1
* kernel-livepatch-6_4_0-150600_23_87-default-debuginfo-4-150600.2.1
## References:
* https://www.suse.com/security/cve/CVE-2025-71066.html
* https://www.suse.com/security/cve/CVE-2026-23004.html
* https://www.suse.com/security/cve/CVE-2026-23204.html
* https://www.suse.com/security/cve/CVE-2026-31431.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258005
* https://bugzilla.suse.com/show_bug.cgi?id=1258655
* https://bugzilla.suse.com/show_bug.cgi?id=1259126
* https://bugzilla.suse.com/show_bug.cgi?id=1263689
SUSE-SU-2026:1728-1: important: Security update for the Linux Kernel (Live Patch 17 for SUSE Linux Enterprise 15 SP6)
# Security update for the Linux Kernel (Live Patch 17 for SUSE Linux Enterprise
15 SP6)
Announcement ID: SUSE-SU-2026:1728-1
Release Date: 2026-05-06T21:38:02Z
Rating: important
References:
* bsc#1252048
* bsc#1258005
* bsc#1258655
* bsc#1259126
* bsc#1263689
Cross-References:
* CVE-2025-39977
* CVE-2025-71066
* CVE-2026-23004
* CVE-2026-23204
* CVE-2026-31431
CVSS scores:
* CVE-2025-39977 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71066 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23004 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23204 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23204 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-31431 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31431 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves five vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.78 fixes
various security issues
The following security issues were fixed:
* CVE-2025-39977: futex: Prevent use-after-free during requeue-PI
(bsc#1252048).
* CVE-2025-71066: net/sched: ets: Always remove class from active list before
deleting in ets_qdisc_change (bsc#1258005).
* CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and
rt_del_uncached_list() (bsc#1258655).
* CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful()
(bsc#1259126).
* CVE-2026-31431: crypto: algif_aead - Revert to operating out-of-place
(bsc#1263689).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1728=1 SUSE-2026-1729=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-1728=1 SUSE-SLE-
Module-Live-Patching-15-SP6-2026-1729=1
## Package List:
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_73-default-debuginfo-7-150600.2.1
* kernel-livepatch-6_4_0-150600_23_78-default-5-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_17-debugsource-5-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_16-debugsource-7-150600.2.1
* kernel-livepatch-6_4_0-150600_23_73-default-7-150600.2.1
* kernel-livepatch-6_4_0-150600_23_78-default-debuginfo-5-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_73-default-debuginfo-7-150600.2.1
* kernel-livepatch-6_4_0-150600_23_78-default-5-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_17-debugsource-5-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_16-debugsource-7-150600.2.1
* kernel-livepatch-6_4_0-150600_23_73-default-7-150600.2.1
* kernel-livepatch-6_4_0-150600_23_78-default-debuginfo-5-150600.2.1
## References:
* https://www.suse.com/security/cve/CVE-2025-39977.html
* https://www.suse.com/security/cve/CVE-2025-71066.html
* https://www.suse.com/security/cve/CVE-2026-23004.html
* https://www.suse.com/security/cve/CVE-2026-23204.html
* https://www.suse.com/security/cve/CVE-2026-31431.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252048
* https://bugzilla.suse.com/show_bug.cgi?id=1258005
* https://bugzilla.suse.com/show_bug.cgi?id=1258655
* https://bugzilla.suse.com/show_bug.cgi?id=1259126
* https://bugzilla.suse.com/show_bug.cgi?id=1263689
SUSE-SU-2026:1736-1: important: Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP6)
# Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise
15 SP6)
Announcement ID: SUSE-SU-2026:1736-1
Release Date: 2026-05-07T02:35:14Z
Rating: important
References:
* bsc#1263689
Cross-References:
* CVE-2026-31431
CVSS scores:
* CVE-2026-31431 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31431 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.95 fixes one
security issue
The following security issue was fixed:
* CVE-2026-31431: crypto: algif_aead - Revert to operating out-of-place
(bsc#1263689).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-1737=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2026-1736=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1730=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-1730=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1736=1 SUSE-2026-1737=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_197-default-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_197-default-debuginfo-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_200-default-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_50-debugsource-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_49-debugsource-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_200-default-debuginfo-2-150400.2.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_95-default-debuginfo-2-150600.2.1
* kernel-livepatch-6_4_0-150600_23_95-default-2-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_22-debugsource-2-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_95-default-debuginfo-2-150600.2.1
* kernel-livepatch-6_4_0-150600_23_95-default-2-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_22-debugsource-2-150600.2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_197-default-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_197-default-debuginfo-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_200-default-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_50-debugsource-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_49-debugsource-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_200-default-debuginfo-2-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-31431.html
* https://bugzilla.suse.com/show_bug.cgi?id=1263689
SUSE-SU-2026:1733-1: important: Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)
# Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise
15 SP5)
Announcement ID: SUSE-SU-2026:1733-1
Release Date: 2026-05-07T09:04:22Z
Rating: important
References:
* bsc#1252048
* bsc#1258005
* bsc#1258073
* bsc#1258655
* bsc#1259126
* bsc#1263689
Cross-References:
* CVE-2025-38375
* CVE-2025-39977
* CVE-2025-71066
* CVE-2026-23004
* CVE-2026-23204
* CVE-2026-31431
CVSS scores:
* CVE-2025-38375 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38375 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38375 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39977 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71066 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23004 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23204 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-31431 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31431 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves six vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.121 fixes
various security issues
The following security issues were fixed:
* CVE-2025-38375: virtio-net: ensure the received length does not exceed
allocated size (bsc#1258073).
* CVE-2025-39977: futex: Prevent use-after-free during requeue-PI
(bsc#1252048).
* CVE-2025-71066: net/sched: ets: Always remove class from active list before
deleting in ets_qdisc_change (bsc#1258005).
* CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and
rt_del_uncached_list() (bsc#1258655).
* CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful()
(bsc#1259126).
* CVE-2026-31431: crypto: algif_aead - Revert to operating out-of-place
(bsc#1263689).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1733=1 SUSE-2026-1734=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-1733=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2026-1734=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1739=1 SUSE-2026-1746=1 SUSE-2026-1747=1
SUSE-2026-1738=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-1738=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2026-1739=1 SUSE-SLE-Module-Live-
Patching-15-SP5-2026-1746=1 SUSE-SLE-Module-Live-Patching-15-SP5-2026-1747=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_184-default-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_46-debugsource-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_44-debugsource-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-12-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_184-default-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_46-debugsource-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_44-debugsource-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-12-150400.2.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-18-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_29-debugsource-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_26-debugsource-18-150500.2.1
* kernel-livepatch-5_14_21-150500_55_121-default-11-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_27-debugsource-17-150500.2.1
* kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-11-150500.2.1
* kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-17-150500.2.1
* kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_30-debugsource-11-150500.2.1
* kernel-livepatch-5_14_21-150500_55_110-default-17-150500.2.1
* kernel-livepatch-5_14_21-150500_55_103-default-18-150500.2.1
* kernel-livepatch-5_14_21-150500_55_116-default-14-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-18-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_26-debugsource-18-150500.2.1
* kernel-livepatch-5_14_21-150500_55_121-default-11-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_27-debugsource-17-150500.2.1
* kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-11-150500.2.1
* kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-17-150500.2.1
* kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_30-debugsource-11-150500.2.1
* kernel-livepatch-5_14_21-150500_55_110-default-17-150500.2.1
* kernel-livepatch-5_14_21-150500_55_103-default-18-150500.2.1
* kernel-livepatch-5_14_21-150500_55_116-default-14-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x)
* kernel-livepatch-SLE15-SP5_Update_29-debugsource-14-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2025-38375.html
* https://www.suse.com/security/cve/CVE-2025-39977.html
* https://www.suse.com/security/cve/CVE-2025-71066.html
* https://www.suse.com/security/cve/CVE-2026-23004.html
* https://www.suse.com/security/cve/CVE-2026-23204.html
* https://www.suse.com/security/cve/CVE-2026-31431.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252048
* https://bugzilla.suse.com/show_bug.cgi?id=1258005
* https://bugzilla.suse.com/show_bug.cgi?id=1258073
* https://bugzilla.suse.com/show_bug.cgi?id=1258655
* https://bugzilla.suse.com/show_bug.cgi?id=1259126
* https://bugzilla.suse.com/show_bug.cgi?id=1263689
openSUSE-SU-2026:10691-1: moderate: gnutls-3.8.13-1.1 on GA media
# gnutls-3.8.13-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10691-1
Rating: moderate
Cross-References:
* CVE-2026-33845
* CVE-2026-33846
* CVE-2026-3832
* CVE-2026-3833
* CVE-2026-42009
* CVE-2026-42010
* CVE-2026-42011
* CVE-2026-42012
* CVE-2026-42013
* CVE-2026-42014
* CVE-2026-42015
* CVE-2026-5260
* CVE-2026-5419
Affected Products:
* openSUSE Tumbleweed
An update that solves 13 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the gnutls-3.8.13-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* gnutls 3.8.13-1.1
* libgnutls-dane-devel 3.8.13-1.1
* libgnutls-dane0 3.8.13-1.1
* libgnutls-devel 3.8.13-1.1
* libgnutls-devel-32bit 3.8.13-1.1
* libgnutls-devel-doc 3.8.13-1.1
* libgnutls30 3.8.13-1.1
* libgnutls30-32bit 3.8.13-1.1
* libgnutlsxx-devel 3.8.13-1.1
* libgnutlsxx30 3.8.13-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-33845.html
* https://www.suse.com/security/cve/CVE-2026-33846.html
* https://www.suse.com/security/cve/CVE-2026-3832.html
* https://www.suse.com/security/cve/CVE-2026-3833.html
* https://www.suse.com/security/cve/CVE-2026-42009.html
* https://www.suse.com/security/cve/CVE-2026-42010.html
* https://www.suse.com/security/cve/CVE-2026-42011.html
* https://www.suse.com/security/cve/CVE-2026-42012.html
* https://www.suse.com/security/cve/CVE-2026-42013.html
* https://www.suse.com/security/cve/CVE-2026-42014.html
* https://www.suse.com/security/cve/CVE-2026-42015.html
* https://www.suse.com/security/cve/CVE-2026-5260.html
* https://www.suse.com/security/cve/CVE-2026-5419.html
openSUSE-SU-2026:10690-1: moderate: cri-tools-1.36.0-1.1 on GA media
# cri-tools-1.36.0-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10690-1
Rating: moderate
Cross-References:
* CVE-2026-33186
CVSS scores:
* CVE-2026-33186 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33186 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the cri-tools-1.36.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* cri-tools 1.36.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-33186.html
openSUSE-SU-2026:10696-1: moderate: nix-2.34.7-1.1 on GA media
# nix-2.34.7-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10696-1
Rating: moderate
Cross-References:
* CVE-2026-44028
CVSS scores:
* CVE-2026-44028 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the nix-2.34.7-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* nix 2.34.7-1.1
* nix-bash-completion 2.34.7-1.1
* nix-devel 2.34.7-1.1
* nix-fish-completion 2.34.7-1.1
* nix-zsh-completion 2.34.7-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-44028.html
openSUSE-SU-2026:10692-1: moderate: grafana-11.6.14+security01-3.1 on GA media
# grafana-11.6.14+security01-3.1 on GA media
Announcement ID: openSUSE-SU-2026:10692-1
Rating: moderate
Cross-References:
* CVE-2026-41602
CVSS scores:
* CVE-2026-41602 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-41602 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the grafana-11.6.14+security01-3.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* grafana 11.6.14+security01-3.1
## References:
* https://www.suse.com/security/cve/CVE-2026-41602.html
openSUSE-SU-2026:10694-1: moderate: libmariadbd-devel-11.8.6-1.1 on GA media
# libmariadbd-devel-11.8.6-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10694-1
Rating: moderate
Cross-References:
* CVE-2026-32710
CVSS scores:
* CVE-2026-32710 ( SUSE ): 8.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-32710 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the libmariadbd-devel-11.8.6-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libmariadbd-devel 11.8.6-1.1
* libmariadbd19 11.8.6-1.1
* mariadb 11.8.6-1.1
* mariadb-bench 11.8.6-1.1
* mariadb-client 11.8.6-1.1
* mariadb-errormessages 11.8.6-1.1
* mariadb-galera 11.8.6-1.1
* mariadb-rpm-macros 11.8.6-1.1
* mariadb-test 11.8.6-1.1
* mariadb-tools 11.8.6-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-32710.html
openSUSE-SU-2026:10695-1: moderate: mutt-2.3.2-1.1 on GA media
# mutt-2.3.2-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10695-1
Rating: moderate
Cross-References:
* CVE-2026-43859
* CVE-2026-43861
* CVE-2026-43862
* CVE-2026-43863
CVSS scores:
* CVE-2026-43859 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-43859 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-43861 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-43861 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-43862 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-43862 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-43863 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-43863 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 4 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the mutt-2.3.2-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* mutt 2.3.2-1.1
* mutt-doc 2.3.2-1.1
* mutt-lang 2.3.2-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-43859.html
* https://www.suse.com/security/cve/CVE-2026-43861.html
* https://www.suse.com/security/cve/CVE-2026-43862.html
* https://www.suse.com/security/cve/CVE-2026-43863.html
openSUSE-SU-2026:10689-1: moderate: chromedriver-148.0.7778.96-1.1 on GA media
# chromedriver-148.0.7778.96-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10689-1
Rating: moderate
Cross-References:
* CVE-2026-7333
* CVE-2026-7334
* CVE-2026-7335
* CVE-2026-7336
* CVE-2026-7337
* CVE-2026-7338
* CVE-2026-7339
* CVE-2026-7340
* CVE-2026-7341
* CVE-2026-7342
* CVE-2026-7343
* CVE-2026-7344
* CVE-2026-7345
* CVE-2026-7346
* CVE-2026-7347
* CVE-2026-7348
* CVE-2026-7349
* CVE-2026-7350
* CVE-2026-7351
* CVE-2026-7352
* CVE-2026-7353
* CVE-2026-7354
* CVE-2026-7355
* CVE-2026-7356
* CVE-2026-7357
* CVE-2026-7358
* CVE-2026-7359
* CVE-2026-7360
* CVE-2026-7361
* CVE-2026-7363
Affected Products:
* openSUSE Tumbleweed
An update that solves 30 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the chromedriver-148.0.7778.96-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* chromedriver 148.0.7778.96-1.1
* chromium 148.0.7778.96-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-7333.html
* https://www.suse.com/security/cve/CVE-2026-7334.html
* https://www.suse.com/security/cve/CVE-2026-7335.html
* https://www.suse.com/security/cve/CVE-2026-7336.html
* https://www.suse.com/security/cve/CVE-2026-7337.html
* https://www.suse.com/security/cve/CVE-2026-7338.html
* https://www.suse.com/security/cve/CVE-2026-7339.html
* https://www.suse.com/security/cve/CVE-2026-7340.html
* https://www.suse.com/security/cve/CVE-2026-7341.html
* https://www.suse.com/security/cve/CVE-2026-7342.html
* https://www.suse.com/security/cve/CVE-2026-7343.html
* https://www.suse.com/security/cve/CVE-2026-7344.html
* https://www.suse.com/security/cve/CVE-2026-7345.html
* https://www.suse.com/security/cve/CVE-2026-7346.html
* https://www.suse.com/security/cve/CVE-2026-7347.html
* https://www.suse.com/security/cve/CVE-2026-7348.html
* https://www.suse.com/security/cve/CVE-2026-7349.html
* https://www.suse.com/security/cve/CVE-2026-7350.html
* https://www.suse.com/security/cve/CVE-2026-7351.html
* https://www.suse.com/security/cve/CVE-2026-7352.html
* https://www.suse.com/security/cve/CVE-2026-7353.html
* https://www.suse.com/security/cve/CVE-2026-7354.html
* https://www.suse.com/security/cve/CVE-2026-7355.html
* https://www.suse.com/security/cve/CVE-2026-7356.html
* https://www.suse.com/security/cve/CVE-2026-7357.html
* https://www.suse.com/security/cve/CVE-2026-7358.html
* https://www.suse.com/security/cve/CVE-2026-7359.html
* https://www.suse.com/security/cve/CVE-2026-7360.html
* https://www.suse.com/security/cve/CVE-2026-7361.html
* https://www.suse.com/security/cve/CVE-2026-7363.html
openSUSE-SU-2026:10688-1: moderate: cf-cli-8.18.3+git.0.83ce51d9c-1.1 on GA media
# cf-cli-8.18.3+git.0.83ce51d9c-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10688-1
Rating: moderate
Cross-References:
* CVE-2025-61729
CVSS scores:
* CVE-2025-61729 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61729 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the cf-cli-8.18.3+git.0.83ce51d9c-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* cf-cli 8.18.3+git.0.83ce51d9c-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-61729.html
openSUSE-SU-2026:10697-1: moderate: traefik-3.6.15-1.1 on GA media
# traefik-3.6.15-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10697-1
Rating: moderate
Cross-References:
* CVE-2026-34986
* CVE-2026-35051
* CVE-2026-39858
* CVE-2026-40912
* CVE-2026-41174
* CVE-2026-41263
CVSS scores:
* CVE-2026-34986 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-34986 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 6 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the traefik-3.6.15-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* traefik 3.6.15-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-34986.html
* https://www.suse.com/security/cve/CVE-2026-35051.html
* https://www.suse.com/security/cve/CVE-2026-39858.html
* https://www.suse.com/security/cve/CVE-2026-40912.html
* https://www.suse.com/security/cve/CVE-2026-41174.html
* https://www.suse.com/security/cve/CVE-2026-41263.html