SUSE 5654 Published by

SUSE has released a series of critical security patches for several widely used software packages across its Linux distributions. These updates address numerous vulnerabilities in cpp-httplib, rsync, php8, mozjs115, dnsmasq, and GraphicsMagick that could otherwise allow attackers to execute arbitrary code or crash systems. Administrators should apply the recommended zypper patches immediately to prevent potential exploits like remote code execution and denial of service attacks. The fixes are available for various openSUSE Leap versions as well as SUSE Linux Enterprise Server releases.

openSUSE-SU-2026:0174-1: important: Security update for cpp-httplib
SUSE-SU-2026:2038-1: important: Security update for rsync
SUSE-SU-2026:2037-1: critical: Security update for php8
openSUSE-SU-2026:20769-1: important: Security update for mozjs115
openSUSE-SU-2026:10821-1: moderate: dnsmasq-2.92rel2-1.1 on GA media
openSUSE-SU-2026:10817-1: moderate: GraphicsMagick-1.3.46-7.1 on GA media




openSUSE-SU-2026:0174-1: important: Security update for cpp-httplib


openSUSE Security Update: Security update for cpp-httplib
_______________________________

Announcement ID: openSUSE-SU-2026:0174-1
Rating: important
References: #1255835 #1256518 #1259220 #1259221 #1259373

Cross-References: CVE-2026-21428 CVE-2026-22776 CVE-2026-28434
CVE-2026-28435 CVE-2026-29076
CVSS scores:
CVE-2026-21428 (SUSE): 8.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
CVE-2026-22776 (SUSE): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVE-2026-28434 (SUSE): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
CVE-2026-28435 (SUSE): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVE-2026-29076 (SUSE): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________

An update that fixes 5 vulnerabilities is now available.

Description:

This update for cpp-httplib fixes the following issues:

- CVE-2026-21428: Fixed a server-side request forgery via header injection
(boo#1255835)
- CVE-2026-22776: Fixed unsafe handling of compressed HTTP request that
could cause a denial of service (boo#1256518)
- CVE-2026-28434: Fixed that the default exception handler could leak
e.what() to clients via EXCEPTION_WHAT response header (boo#1259221)
- CVE-2026-28435: Fixed a payload size limit bypass via gzip decompression
in ContentReader (streaming) that could lead to denial of service
(boo#1259220)
- CVE-2026-29076: Fixed denial of service via crafted HTTP POST request
(boo#1259373)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP7:

zypper in -t patch openSUSE-2026-174=1

Package List:

- openSUSE Backports SLE-15-SP7 (aarch64 i586 ppc64le s390x x86_64):

cpp-httplib-devel-0.20.1-bp157.2.6.1
libcpp-httplib0_20-0.20.1-bp157.2.6.1

References:

https://www.suse.com/security/cve/CVE-2026-21428.html
https://www.suse.com/security/cve/CVE-2026-22776.html
https://www.suse.com/security/cve/CVE-2026-28434.html
https://www.suse.com/security/cve/CVE-2026-28435.html
https://www.suse.com/security/cve/CVE-2026-29076.html
https://bugzilla.suse.com/1255835
https://bugzilla.suse.com/1256518
https://bugzilla.suse.com/1259220
https://bugzilla.suse.com/1259221
https://bugzilla.suse.com/1259373



SUSE-SU-2026:2038-1: important: Security update for rsync


# Security update for rsync

Announcement ID: SUSE-SU-2026:2038-1
Release Date: 2026-05-21T13:33:42Z
Rating: important
References:

* bsc#1234100
* bsc#1234101
* bsc#1234102
* bsc#1234103
* bsc#1234104
* bsc#1235475
* bsc#1254441
* bsc#1262223
* bsc#1264511
* bsc#1264512
* bsc#1264513
* bsc#1264514
* bsc#1264515
* bsc#1265296

Cross-References:

* CVE-2024-12084
* CVE-2024-12085
* CVE-2024-12086
* CVE-2024-12087
* CVE-2024-12088
* CVE-2024-12747
* CVE-2025-10158
* CVE-2026-29518
* CVE-2026-41035
* CVE-2026-43617
* CVE-2026-43618
* CVE-2026-43619
* CVE-2026-43620
* CVE-2026-45232

CVSS scores:

* CVE-2024-12084 ( SUSE ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-12084 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-12084 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-12085 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-12085 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-12085 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-12086 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-12086 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2024-12086 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
* CVE-2024-12086 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-12087 ( SUSE ): 8.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-12087 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-12087 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2024-12087 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-12088 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-12088 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2024-12088 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-12088 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2024-12747 ( SUSE ): 7.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-12747 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-12747 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2025-10158 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-10158 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-29518 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-29518 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-29518 ( NVD ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-29518 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-41035 ( SUSE ): 8.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-41035 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-41035 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
* CVE-2026-41035 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-43617 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-43617 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-43617 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-43617 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-43618 ( SUSE ): 6.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-43618 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-43618 ( NVD ): 6.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-43618 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-43619 ( SUSE ): 7.2
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-43619 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-43619 ( NVD ): 7.2
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-43619 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-43620 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-43620 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-43620 ( NVD ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-43620 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-45232 ( SUSE ): 2.1
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-45232 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
* CVE-2026-45232 ( NVD ): 2.1
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-45232 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves 14 vulnerabilities can now be installed.

## Description:

This update for rsync fixes the following issues

* CVE-2026-29518: Symlink-Race TOCTOU in Daemon (bsc#1264511).
* CVE-2026-41035: Count of entries mismatch can lead to a use-after-free
(bsc#1262223)
* CVE-2026-43617: Authorization Bypass via Hostname Resolution (bsc#1264515).
* CVE-2026-43618: Integer Overflow Information Disclosure (bsc#1264512).
* CVE-2026-43619: Symlink Race Condition via Path-Based Syscalls
(bsc#1264514).
* CVE-2026-43620: Out-of-Bounds Array Read via recv_files() (bsc#1264513).
* CVE-2026-45232: Off-by-one stack OOB write in HTTP CONNECT proxy response
parsing (bsc#1265296).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-2038=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-2038=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-2038=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-2038=1

## Package List:

* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* rsync-3.2.7-150600.3.21.1
* rsync-debugsource-3.2.7-150600.3.21.1
* rsync-debuginfo-3.2.7-150600.3.21.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* rsync-3.2.7-150600.3.21.1
* rsync-debugsource-3.2.7-150600.3.21.1
* rsync-debuginfo-3.2.7-150600.3.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* rsync-3.2.7-150600.3.21.1
* rsync-debugsource-3.2.7-150600.3.21.1
* rsync-debuginfo-3.2.7-150600.3.21.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* rsync-3.2.7-150600.3.21.1
* rsync-debugsource-3.2.7-150600.3.21.1
* rsync-debuginfo-3.2.7-150600.3.21.1

## References:

* https://www.suse.com/security/cve/CVE-2024-12084.html
* https://www.suse.com/security/cve/CVE-2024-12085.html
* https://www.suse.com/security/cve/CVE-2024-12086.html
* https://www.suse.com/security/cve/CVE-2024-12087.html
* https://www.suse.com/security/cve/CVE-2024-12088.html
* https://www.suse.com/security/cve/CVE-2024-12747.html
* https://www.suse.com/security/cve/CVE-2025-10158.html
* https://www.suse.com/security/cve/CVE-2026-29518.html
* https://www.suse.com/security/cve/CVE-2026-41035.html
* https://www.suse.com/security/cve/CVE-2026-43617.html
* https://www.suse.com/security/cve/CVE-2026-43618.html
* https://www.suse.com/security/cve/CVE-2026-43619.html
* https://www.suse.com/security/cve/CVE-2026-43620.html
* https://www.suse.com/security/cve/CVE-2026-45232.html
* https://bugzilla.suse.com/show_bug.cgi?id=1234100
* https://bugzilla.suse.com/show_bug.cgi?id=1234101
* https://bugzilla.suse.com/show_bug.cgi?id=1234102
* https://bugzilla.suse.com/show_bug.cgi?id=1234103
* https://bugzilla.suse.com/show_bug.cgi?id=1234104
* https://bugzilla.suse.com/show_bug.cgi?id=1235475
* https://bugzilla.suse.com/show_bug.cgi?id=1254441
* https://bugzilla.suse.com/show_bug.cgi?id=1262223
* https://bugzilla.suse.com/show_bug.cgi?id=1264511
* https://bugzilla.suse.com/show_bug.cgi?id=1264512
* https://bugzilla.suse.com/show_bug.cgi?id=1264513
* https://bugzilla.suse.com/show_bug.cgi?id=1264514
* https://bugzilla.suse.com/show_bug.cgi?id=1264515
* https://bugzilla.suse.com/show_bug.cgi?id=1265296



SUSE-SU-2026:2037-1: critical: Security update for php8


# Security update for php8

Announcement ID: SUSE-SU-2026:2037-1
Release Date: 2026-05-21T11:57:05Z
Rating: critical
References:

* bsc#1264769
* bsc#1264771
* bsc#1264772
* bsc#1264773
* bsc#1264774
* bsc#1264775
* bsc#1264776
* bsc#1264778

Cross-References:

* CVE-2025-14179
* CVE-2026-6722
* CVE-2026-6735
* CVE-2026-7258
* CVE-2026-7259
* CVE-2026-7261
* CVE-2026-7262
* CVE-2026-7568

CVSS scores:

* CVE-2025-14179 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14179 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-14179 ( NVD ): 7.4
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:X/RE:M/U:Amber
* CVE-2025-14179 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-6722 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-6722 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-6722 ( NVD ): 9.5
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:X/RE:M/U:Red
* CVE-2026-6722 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-6735 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-6735 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-6735 ( NVD ): 7.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:X/V:X/RE:L/U:Amber
* CVE-2026-6735 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-7258 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-7258 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-7258 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Amber
* CVE-2026-7258 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-7259 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-7259 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-7259 ( NVD ): 2.1
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:X/RE:X/U:Amber
* CVE-2026-7259 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-7261 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-7261 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-7261 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:X/V:X/RE:M/U:Amber
* CVE-2026-7261 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-7262 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-7262 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-7262 ( NVD ): 2.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:X/RE:M/U:Amber
* CVE-2026-7262 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-7568 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-7568 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-7568 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:L/U:Amber
* CVE-2026-7568 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves eight vulnerabilities can now be installed.

## Description:

This update for php8 fixes the following issues

* CVE-2025-14179: improper handling of NULL bytes by the PDO Firebird driver
when preparing SQL queries can lead to SQL injection (bsc#1264778).
* CVE-2026-6722: use-after-free in SOAP using Apache map can lead to remote
code execution (bsc#1264776).
* CVE-2026-6735: improper validation of the request URI within the PHP-FPM
status page can lead to XSS (bsc#1264775).
* CVE-2026-7258: signed `char` values passed to `ctype` functions like
`isxdigit` can lead to OOB access and denial of service (bsc#1264774).
* CVE-2026-7259: NULL pointer dereference in `php_mb_check_encoding()` via
`mb_ereg_search_init()` can lead to a denial of service (bsc#1264773).
* CVE-2026-7261: use-after-free due to incorrectly handled persistence of
handler objects when SOAP_PERSISTENCE_SESSION is configured can lead to
memory corruption, information disclosure and process crashes (bsc#1264772).
* CVE-2026-7262: NULL pointer dereference caused by mistake in the SOAP
decoding process when a typemap is configured can lead to a denial of
service (bsc#1264771).
* CVE-2026-7568: integer overflow in the `metaphone` function can lead to
undefined behavior and affect the availability of the PHPprocess
(bsc#1264769).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-2037=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-2037=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-2037=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-2037=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-2037=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-2037=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-2037=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-2037=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-2037=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* php8-fastcgi-debugsource-8.0.30-150400.4.65.1
* php8-zlib-8.0.30-150400.4.65.1
* php8-phar-debuginfo-8.0.30-150400.4.65.1
* php8-posix-8.0.30-150400.4.65.1
* php8-intl-8.0.30-150400.4.65.1
* php8-xmlreader-8.0.30-150400.4.65.1
* php8-readline-debuginfo-8.0.30-150400.4.65.1
* php8-gd-debuginfo-8.0.30-150400.4.65.1
* php8-calendar-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-debuginfo-8.0.30-150400.4.65.1
* php8-phar-8.0.30-150400.4.65.1
* php8-sodium-debuginfo-8.0.30-150400.4.65.1
* php8-zip-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-8.0.30-150400.4.65.1
* php8-calendar-8.0.30-150400.4.65.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.65.1
* php8-bz2-debuginfo-8.0.30-150400.4.65.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.65.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.65.1
* php8-zip-8.0.30-150400.4.65.1
* php8-xsl-8.0.30-150400.4.65.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.65.1
* php8-pcntl-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-8.0.30-150400.4.65.1
* php8-cli-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.65.1
* php8-8.0.30-150400.4.65.1
* php8-mysql-8.0.30-150400.4.65.1
* php8-embed-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-8.0.30-150400.4.65.1
* php8-ldap-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-8.0.30-150400.4.65.1
* php8-sqlite-8.0.30-150400.4.65.1
* php8-ldap-8.0.30-150400.4.65.1
* php8-shmop-8.0.30-150400.4.65.1
* php8-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.65.1
* php8-pdo-debuginfo-8.0.30-150400.4.65.1
* php8-tidy-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-8.0.30-150400.4.65.1
* php8-sysvmsg-8.0.30-150400.4.65.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.65.1
* php8-ctype-8.0.30-150400.4.65.1
* php8-fpm-debugsource-8.0.30-150400.4.65.1
* php8-bcmath-8.0.30-150400.4.65.1
* php8-devel-8.0.30-150400.4.65.1
* php8-tidy-8.0.30-150400.4.65.1
* php8-openssl-debuginfo-8.0.30-150400.4.65.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.65.1
* php8-gmp-debuginfo-8.0.30-150400.4.65.1
* php8-curl-8.0.30-150400.4.65.1
* php8-iconv-8.0.30-150400.4.65.1
* php8-dba-8.0.30-150400.4.65.1
* apache2-mod_php8-8.0.30-150400.4.65.1
* php8-embed-debugsource-8.0.30-150400.4.65.1
* php8-bz2-8.0.30-150400.4.65.1
* php8-xsl-debuginfo-8.0.30-150400.4.65.1
* php8-fpm-debuginfo-8.0.30-150400.4.65.1
* php8-gd-8.0.30-150400.4.65.1
* php8-openssl-8.0.30-150400.4.65.1
* php8-readline-8.0.30-150400.4.65.1
* php8-ftp-8.0.30-150400.4.65.1
* php8-zlib-debuginfo-8.0.30-150400.4.65.1
* php8-soap-debuginfo-8.0.30-150400.4.65.1
* php8-bcmath-debuginfo-8.0.30-150400.4.65.1
* php8-mbstring-debuginfo-8.0.30-150400.4.65.1
* php8-ftp-debuginfo-8.0.30-150400.4.65.1
* php8-odbc-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-debuginfo-8.0.30-150400.4.65.1
* php8-sodium-8.0.30-150400.4.65.1
* php8-shmop-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.65.1
* php8-sqlite-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-8.0.30-150400.4.65.1
* php8-odbc-8.0.30-150400.4.65.1
* php8-snmp-8.0.30-150400.4.65.1
* php8-debugsource-8.0.30-150400.4.65.1
* php8-xmlwriter-8.0.30-150400.4.65.1
* php8-enchant-debuginfo-8.0.30-150400.4.65.1
* php8-exif-8.0.30-150400.4.65.1
* php8-dba-debuginfo-8.0.30-150400.4.65.1
* php8-enchant-8.0.30-150400.4.65.1
* php8-dom-8.0.30-150400.4.65.1
* php8-mbstring-8.0.30-150400.4.65.1
* php8-pcntl-8.0.30-150400.4.65.1
* php8-pdo-8.0.30-150400.4.65.1
* php8-fpm-8.0.30-150400.4.65.1
* php8-tokenizer-8.0.30-150400.4.65.1
* php8-ctype-debuginfo-8.0.30-150400.4.65.1
* php8-soap-8.0.30-150400.4.65.1
* php8-iconv-debuginfo-8.0.30-150400.4.65.1
* php8-cli-8.0.30-150400.4.65.1
* php8-intl-debuginfo-8.0.30-150400.4.65.1
* php8-exif-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-debuginfo-8.0.30-150400.4.65.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.65.1
* php8-embed-8.0.30-150400.4.65.1
* php8-gmp-8.0.30-150400.4.65.1
* php8-posix-debuginfo-8.0.30-150400.4.65.1
* php8-mysql-debuginfo-8.0.30-150400.4.65.1
* php8-curl-debuginfo-8.0.30-150400.4.65.1
* php8-test-8.0.30-150400.4.65.2
* php8-sysvshm-8.0.30-150400.4.65.1
* php8-dom-debuginfo-8.0.30-150400.4.65.1
* php8-snmp-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-8.0.30-150400.4.65.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* php8-fastcgi-debugsource-8.0.30-150400.4.65.1
* php8-zlib-8.0.30-150400.4.65.1
* php8-phar-debuginfo-8.0.30-150400.4.65.1
* php8-posix-8.0.30-150400.4.65.1
* php8-intl-8.0.30-150400.4.65.1
* php8-xmlreader-8.0.30-150400.4.65.1
* php8-readline-debuginfo-8.0.30-150400.4.65.1
* php8-gd-debuginfo-8.0.30-150400.4.65.1
* php8-calendar-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-debuginfo-8.0.30-150400.4.65.1
* php8-phar-8.0.30-150400.4.65.1
* php8-sodium-debuginfo-8.0.30-150400.4.65.1
* php8-zip-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-8.0.30-150400.4.65.1
* php8-calendar-8.0.30-150400.4.65.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.65.1
* php8-bz2-debuginfo-8.0.30-150400.4.65.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.65.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.65.1
* php8-zip-8.0.30-150400.4.65.1
* php8-xsl-8.0.30-150400.4.65.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.65.1
* php8-pcntl-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-8.0.30-150400.4.65.1
* php8-cli-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.65.1
* php8-8.0.30-150400.4.65.1
* php8-mysql-8.0.30-150400.4.65.1
* php8-embed-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-8.0.30-150400.4.65.1
* php8-ldap-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-8.0.30-150400.4.65.1
* php8-sqlite-8.0.30-150400.4.65.1
* php8-ldap-8.0.30-150400.4.65.1
* php8-shmop-8.0.30-150400.4.65.1
* php8-debuginfo-8.0.30-150400.4.65.1
* php8-pdo-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.65.1
* php8-tidy-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-8.0.30-150400.4.65.1
* php8-sysvmsg-8.0.30-150400.4.65.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.65.1
* php8-ctype-8.0.30-150400.4.65.1
* php8-fpm-debugsource-8.0.30-150400.4.65.1
* php8-bcmath-8.0.30-150400.4.65.1
* php8-devel-8.0.30-150400.4.65.1
* php8-tidy-8.0.30-150400.4.65.1
* php8-openssl-debuginfo-8.0.30-150400.4.65.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.65.1
* php8-gmp-debuginfo-8.0.30-150400.4.65.1
* php8-curl-8.0.30-150400.4.65.1
* php8-iconv-8.0.30-150400.4.65.1
* php8-dba-8.0.30-150400.4.65.1
* apache2-mod_php8-8.0.30-150400.4.65.1
* php8-embed-debugsource-8.0.30-150400.4.65.1
* php8-bz2-8.0.30-150400.4.65.1
* php8-xsl-debuginfo-8.0.30-150400.4.65.1
* php8-fpm-debuginfo-8.0.30-150400.4.65.1
* php8-gd-8.0.30-150400.4.65.1
* php8-openssl-8.0.30-150400.4.65.1
* php8-readline-8.0.30-150400.4.65.1
* php8-ftp-8.0.30-150400.4.65.1
* php8-zlib-debuginfo-8.0.30-150400.4.65.1
* php8-soap-debuginfo-8.0.30-150400.4.65.1
* php8-bcmath-debuginfo-8.0.30-150400.4.65.1
* php8-mbstring-debuginfo-8.0.30-150400.4.65.1
* php8-ftp-debuginfo-8.0.30-150400.4.65.1
* php8-odbc-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-debuginfo-8.0.30-150400.4.65.1
* php8-sodium-8.0.30-150400.4.65.1
* php8-shmop-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.65.1
* php8-sqlite-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-8.0.30-150400.4.65.1
* php8-odbc-8.0.30-150400.4.65.1
* php8-snmp-8.0.30-150400.4.65.1
* php8-debugsource-8.0.30-150400.4.65.1
* php8-xmlwriter-8.0.30-150400.4.65.1
* php8-exif-8.0.30-150400.4.65.1
* php8-enchant-debuginfo-8.0.30-150400.4.65.1
* php8-dba-debuginfo-8.0.30-150400.4.65.1
* php8-enchant-8.0.30-150400.4.65.1
* php8-dom-8.0.30-150400.4.65.1
* php8-mbstring-8.0.30-150400.4.65.1
* php8-pcntl-8.0.30-150400.4.65.1
* php8-fpm-8.0.30-150400.4.65.1
* php8-pdo-8.0.30-150400.4.65.1
* php8-tokenizer-8.0.30-150400.4.65.1
* php8-ctype-debuginfo-8.0.30-150400.4.65.1
* php8-soap-8.0.30-150400.4.65.1
* php8-iconv-debuginfo-8.0.30-150400.4.65.1
* php8-cli-8.0.30-150400.4.65.1
* php8-intl-debuginfo-8.0.30-150400.4.65.1
* php8-exif-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-debuginfo-8.0.30-150400.4.65.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.65.1
* php8-embed-8.0.30-150400.4.65.1
* php8-gmp-8.0.30-150400.4.65.1
* php8-posix-debuginfo-8.0.30-150400.4.65.1
* php8-mysql-debuginfo-8.0.30-150400.4.65.1
* php8-curl-debuginfo-8.0.30-150400.4.65.1
* php8-test-8.0.30-150400.4.65.2
* php8-sysvshm-8.0.30-150400.4.65.1
* php8-dom-debuginfo-8.0.30-150400.4.65.1
* php8-snmp-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-8.0.30-150400.4.65.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* php8-fastcgi-debugsource-8.0.30-150400.4.65.1
* php8-zlib-8.0.30-150400.4.65.1
* php8-phar-debuginfo-8.0.30-150400.4.65.1
* php8-posix-8.0.30-150400.4.65.1
* php8-intl-8.0.30-150400.4.65.1
* php8-xmlreader-8.0.30-150400.4.65.1
* php8-readline-debuginfo-8.0.30-150400.4.65.1
* php8-gd-debuginfo-8.0.30-150400.4.65.1
* php8-calendar-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-debuginfo-8.0.30-150400.4.65.1
* php8-phar-8.0.30-150400.4.65.1
* php8-sodium-debuginfo-8.0.30-150400.4.65.1
* php8-zip-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-8.0.30-150400.4.65.1
* php8-calendar-8.0.30-150400.4.65.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.65.1
* php8-bz2-debuginfo-8.0.30-150400.4.65.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.65.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.65.1
* php8-zip-8.0.30-150400.4.65.1
* php8-xsl-8.0.30-150400.4.65.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.65.1
* php8-pcntl-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-8.0.30-150400.4.65.1
* php8-cli-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.65.1
* php8-8.0.30-150400.4.65.1
* php8-mysql-8.0.30-150400.4.65.1
* php8-embed-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-8.0.30-150400.4.65.1
* php8-ldap-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-8.0.30-150400.4.65.1
* php8-sqlite-8.0.30-150400.4.65.1
* php8-ldap-8.0.30-150400.4.65.1
* php8-shmop-8.0.30-150400.4.65.1
* php8-debuginfo-8.0.30-150400.4.65.1
* php8-pdo-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.65.1
* php8-tidy-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-8.0.30-150400.4.65.1
* php8-sysvmsg-8.0.30-150400.4.65.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.65.1
* php8-ctype-8.0.30-150400.4.65.1
* php8-fpm-debugsource-8.0.30-150400.4.65.1
* php8-bcmath-8.0.30-150400.4.65.1
* php8-devel-8.0.30-150400.4.65.1
* php8-tidy-8.0.30-150400.4.65.1
* php8-openssl-debuginfo-8.0.30-150400.4.65.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.65.1
* php8-gmp-debuginfo-8.0.30-150400.4.65.1
* php8-curl-8.0.30-150400.4.65.1
* php8-iconv-8.0.30-150400.4.65.1
* php8-dba-8.0.30-150400.4.65.1
* apache2-mod_php8-8.0.30-150400.4.65.1
* php8-embed-debugsource-8.0.30-150400.4.65.1
* php8-bz2-8.0.30-150400.4.65.1
* php8-xsl-debuginfo-8.0.30-150400.4.65.1
* php8-fpm-debuginfo-8.0.30-150400.4.65.1
* php8-gd-8.0.30-150400.4.65.1
* php8-openssl-8.0.30-150400.4.65.1
* php8-readline-8.0.30-150400.4.65.1
* php8-ftp-8.0.30-150400.4.65.1
* php8-zlib-debuginfo-8.0.30-150400.4.65.1
* php8-soap-debuginfo-8.0.30-150400.4.65.1
* php8-bcmath-debuginfo-8.0.30-150400.4.65.1
* php8-mbstring-debuginfo-8.0.30-150400.4.65.1
* php8-ftp-debuginfo-8.0.30-150400.4.65.1
* php8-odbc-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-debuginfo-8.0.30-150400.4.65.1
* php8-sodium-8.0.30-150400.4.65.1
* php8-shmop-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.65.1
* php8-sqlite-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-8.0.30-150400.4.65.1
* php8-odbc-8.0.30-150400.4.65.1
* php8-snmp-8.0.30-150400.4.65.1
* php8-debugsource-8.0.30-150400.4.65.1
* php8-xmlwriter-8.0.30-150400.4.65.1
* php8-exif-8.0.30-150400.4.65.1
* php8-enchant-debuginfo-8.0.30-150400.4.65.1
* php8-dba-debuginfo-8.0.30-150400.4.65.1
* php8-enchant-8.0.30-150400.4.65.1
* php8-dom-8.0.30-150400.4.65.1
* php8-mbstring-8.0.30-150400.4.65.1
* php8-pcntl-8.0.30-150400.4.65.1
* php8-fpm-8.0.30-150400.4.65.1
* php8-pdo-8.0.30-150400.4.65.1
* php8-tokenizer-8.0.30-150400.4.65.1
* php8-ctype-debuginfo-8.0.30-150400.4.65.1
* php8-soap-8.0.30-150400.4.65.1
* php8-iconv-debuginfo-8.0.30-150400.4.65.1
* php8-cli-8.0.30-150400.4.65.1
* php8-intl-debuginfo-8.0.30-150400.4.65.1
* php8-exif-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-debuginfo-8.0.30-150400.4.65.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.65.1
* php8-embed-8.0.30-150400.4.65.1
* php8-gmp-8.0.30-150400.4.65.1
* php8-posix-debuginfo-8.0.30-150400.4.65.1
* php8-mysql-debuginfo-8.0.30-150400.4.65.1
* php8-curl-debuginfo-8.0.30-150400.4.65.1
* php8-test-8.0.30-150400.4.65.2
* php8-sysvshm-8.0.30-150400.4.65.1
* php8-dom-debuginfo-8.0.30-150400.4.65.1
* php8-snmp-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-8.0.30-150400.4.65.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* php8-fastcgi-debugsource-8.0.30-150400.4.65.1
* php8-zlib-8.0.30-150400.4.65.1
* php8-phar-debuginfo-8.0.30-150400.4.65.1
* php8-posix-8.0.30-150400.4.65.1
* php8-intl-8.0.30-150400.4.65.1
* php8-xmlreader-8.0.30-150400.4.65.1
* php8-readline-debuginfo-8.0.30-150400.4.65.1
* php8-gd-debuginfo-8.0.30-150400.4.65.1
* php8-calendar-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-debuginfo-8.0.30-150400.4.65.1
* php8-phar-8.0.30-150400.4.65.1
* php8-sodium-debuginfo-8.0.30-150400.4.65.1
* php8-zip-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-8.0.30-150400.4.65.1
* php8-calendar-8.0.30-150400.4.65.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.65.1
* php8-bz2-debuginfo-8.0.30-150400.4.65.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.65.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.65.1
* php8-zip-8.0.30-150400.4.65.1
* php8-xsl-8.0.30-150400.4.65.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.65.1
* php8-pcntl-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-8.0.30-150400.4.65.1
* php8-cli-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.65.1
* php8-8.0.30-150400.4.65.1
* php8-mysql-8.0.30-150400.4.65.1
* php8-embed-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-8.0.30-150400.4.65.1
* php8-ldap-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-8.0.30-150400.4.65.1
* php8-sqlite-8.0.30-150400.4.65.1
* php8-ldap-8.0.30-150400.4.65.1
* php8-shmop-8.0.30-150400.4.65.1
* php8-debuginfo-8.0.30-150400.4.65.1
* php8-pdo-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.65.1
* php8-tidy-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-8.0.30-150400.4.65.1
* php8-sysvmsg-8.0.30-150400.4.65.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.65.1
* php8-ctype-8.0.30-150400.4.65.1
* php8-fpm-debugsource-8.0.30-150400.4.65.1
* php8-bcmath-8.0.30-150400.4.65.1
* php8-devel-8.0.30-150400.4.65.1
* php8-tidy-8.0.30-150400.4.65.1
* php8-openssl-debuginfo-8.0.30-150400.4.65.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.65.1
* php8-gmp-debuginfo-8.0.30-150400.4.65.1
* php8-curl-8.0.30-150400.4.65.1
* php8-iconv-8.0.30-150400.4.65.1
* php8-dba-8.0.30-150400.4.65.1
* apache2-mod_php8-8.0.30-150400.4.65.1
* php8-embed-debugsource-8.0.30-150400.4.65.1
* php8-bz2-8.0.30-150400.4.65.1
* php8-xsl-debuginfo-8.0.30-150400.4.65.1
* php8-fpm-debuginfo-8.0.30-150400.4.65.1
* php8-gd-8.0.30-150400.4.65.1
* php8-openssl-8.0.30-150400.4.65.1
* php8-readline-8.0.30-150400.4.65.1
* php8-ftp-8.0.30-150400.4.65.1
* php8-zlib-debuginfo-8.0.30-150400.4.65.1
* php8-soap-debuginfo-8.0.30-150400.4.65.1
* php8-bcmath-debuginfo-8.0.30-150400.4.65.1
* php8-mbstring-debuginfo-8.0.30-150400.4.65.1
* php8-ftp-debuginfo-8.0.30-150400.4.65.1
* php8-odbc-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-debuginfo-8.0.30-150400.4.65.1
* php8-sodium-8.0.30-150400.4.65.1
* php8-shmop-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.65.1
* php8-sqlite-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-8.0.30-150400.4.65.1
* php8-odbc-8.0.30-150400.4.65.1
* php8-snmp-8.0.30-150400.4.65.1
* php8-debugsource-8.0.30-150400.4.65.1
* php8-xmlwriter-8.0.30-150400.4.65.1
* php8-exif-8.0.30-150400.4.65.1
* php8-enchant-debuginfo-8.0.30-150400.4.65.1
* php8-dba-debuginfo-8.0.30-150400.4.65.1
* php8-enchant-8.0.30-150400.4.65.1
* php8-dom-8.0.30-150400.4.65.1
* php8-mbstring-8.0.30-150400.4.65.1
* php8-pcntl-8.0.30-150400.4.65.1
* php8-fpm-8.0.30-150400.4.65.1
* php8-pdo-8.0.30-150400.4.65.1
* php8-tokenizer-8.0.30-150400.4.65.1
* php8-ctype-debuginfo-8.0.30-150400.4.65.1
* php8-soap-8.0.30-150400.4.65.1
* php8-iconv-debuginfo-8.0.30-150400.4.65.1
* php8-cli-8.0.30-150400.4.65.1
* php8-intl-debuginfo-8.0.30-150400.4.65.1
* php8-exif-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-debuginfo-8.0.30-150400.4.65.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.65.1
* php8-embed-8.0.30-150400.4.65.1
* php8-gmp-8.0.30-150400.4.65.1
* php8-posix-debuginfo-8.0.30-150400.4.65.1
* php8-mysql-debuginfo-8.0.30-150400.4.65.1
* php8-curl-debuginfo-8.0.30-150400.4.65.1
* php8-test-8.0.30-150400.4.65.2
* php8-sysvshm-8.0.30-150400.4.65.1
* php8-dom-debuginfo-8.0.30-150400.4.65.1
* php8-snmp-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-8.0.30-150400.4.65.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* php8-fastcgi-debugsource-8.0.30-150400.4.65.1
* php8-zlib-8.0.30-150400.4.65.1
* php8-phar-debuginfo-8.0.30-150400.4.65.1
* php8-posix-8.0.30-150400.4.65.1
* php8-intl-8.0.30-150400.4.65.1
* php8-xmlreader-8.0.30-150400.4.65.1
* php8-readline-debuginfo-8.0.30-150400.4.65.1
* php8-gd-debuginfo-8.0.30-150400.4.65.1
* php8-calendar-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-debuginfo-8.0.30-150400.4.65.1
* php8-phar-8.0.30-150400.4.65.1
* php8-sodium-debuginfo-8.0.30-150400.4.65.1
* php8-zip-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-8.0.30-150400.4.65.1
* php8-calendar-8.0.30-150400.4.65.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.65.1
* php8-bz2-debuginfo-8.0.30-150400.4.65.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.65.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.65.1
* php8-zip-8.0.30-150400.4.65.1
* php8-xsl-8.0.30-150400.4.65.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.65.1
* php8-pcntl-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-8.0.30-150400.4.65.1
* php8-cli-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.65.1
* php8-8.0.30-150400.4.65.1
* php8-mysql-8.0.30-150400.4.65.1
* php8-embed-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-8.0.30-150400.4.65.1
* php8-ldap-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-8.0.30-150400.4.65.1
* php8-sqlite-8.0.30-150400.4.65.1
* php8-ldap-8.0.30-150400.4.65.1
* php8-shmop-8.0.30-150400.4.65.1
* php8-debuginfo-8.0.30-150400.4.65.1
* php8-pdo-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.65.1
* php8-tidy-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-8.0.30-150400.4.65.1
* php8-sysvmsg-8.0.30-150400.4.65.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.65.1
* php8-ctype-8.0.30-150400.4.65.1
* php8-fpm-debugsource-8.0.30-150400.4.65.1
* php8-bcmath-8.0.30-150400.4.65.1
* php8-devel-8.0.30-150400.4.65.1
* php8-tidy-8.0.30-150400.4.65.1
* php8-openssl-debuginfo-8.0.30-150400.4.65.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.65.1
* php8-gmp-debuginfo-8.0.30-150400.4.65.1
* php8-curl-8.0.30-150400.4.65.1
* php8-iconv-8.0.30-150400.4.65.1
* php8-dba-8.0.30-150400.4.65.1
* php8-embed-debugsource-8.0.30-150400.4.65.1
* apache2-mod_php8-8.0.30-150400.4.65.1
* php8-bz2-8.0.30-150400.4.65.1
* php8-xsl-debuginfo-8.0.30-150400.4.65.1
* php8-fpm-debuginfo-8.0.30-150400.4.65.1
* php8-gd-8.0.30-150400.4.65.1
* php8-openssl-8.0.30-150400.4.65.1
* php8-readline-8.0.30-150400.4.65.1
* php8-ftp-8.0.30-150400.4.65.1
* php8-zlib-debuginfo-8.0.30-150400.4.65.1
* php8-soap-debuginfo-8.0.30-150400.4.65.1
* php8-bcmath-debuginfo-8.0.30-150400.4.65.1
* php8-mbstring-debuginfo-8.0.30-150400.4.65.1
* php8-ftp-debuginfo-8.0.30-150400.4.65.1
* php8-odbc-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-debuginfo-8.0.30-150400.4.65.1
* php8-sodium-8.0.30-150400.4.65.1
* php8-shmop-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.65.1
* php8-sqlite-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-8.0.30-150400.4.65.1
* php8-odbc-8.0.30-150400.4.65.1
* php8-snmp-8.0.30-150400.4.65.1
* php8-debugsource-8.0.30-150400.4.65.1
* php8-xmlwriter-8.0.30-150400.4.65.1
* php8-exif-8.0.30-150400.4.65.1
* php8-enchant-debuginfo-8.0.30-150400.4.65.1
* php8-dba-debuginfo-8.0.30-150400.4.65.1
* php8-enchant-8.0.30-150400.4.65.1
* php8-dom-8.0.30-150400.4.65.1
* php8-mbstring-8.0.30-150400.4.65.1
* php8-pcntl-8.0.30-150400.4.65.1
* php8-fpm-8.0.30-150400.4.65.1
* php8-pdo-8.0.30-150400.4.65.1
* php8-tokenizer-8.0.30-150400.4.65.1
* php8-ctype-debuginfo-8.0.30-150400.4.65.1
* php8-soap-8.0.30-150400.4.65.1
* php8-iconv-debuginfo-8.0.30-150400.4.65.1
* php8-cli-8.0.30-150400.4.65.1
* php8-intl-debuginfo-8.0.30-150400.4.65.1
* php8-exif-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-debuginfo-8.0.30-150400.4.65.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.65.1
* php8-embed-8.0.30-150400.4.65.1
* php8-gmp-8.0.30-150400.4.65.1
* php8-posix-debuginfo-8.0.30-150400.4.65.1
* php8-mysql-debuginfo-8.0.30-150400.4.65.1
* php8-curl-debuginfo-8.0.30-150400.4.65.1
* php8-test-8.0.30-150400.4.65.2
* php8-sysvshm-8.0.30-150400.4.65.1
* php8-dom-debuginfo-8.0.30-150400.4.65.1
* php8-snmp-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-8.0.30-150400.4.65.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* php8-fastcgi-debugsource-8.0.30-150400.4.65.1
* php8-zlib-8.0.30-150400.4.65.1
* php8-phar-debuginfo-8.0.30-150400.4.65.1
* php8-posix-8.0.30-150400.4.65.1
* php8-intl-8.0.30-150400.4.65.1
* php8-xmlreader-8.0.30-150400.4.65.1
* php8-readline-debuginfo-8.0.30-150400.4.65.1
* php8-gd-debuginfo-8.0.30-150400.4.65.1
* php8-calendar-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-debuginfo-8.0.30-150400.4.65.1
* php8-phar-8.0.30-150400.4.65.1
* php8-sodium-debuginfo-8.0.30-150400.4.65.1
* php8-zip-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-8.0.30-150400.4.65.1
* php8-calendar-8.0.30-150400.4.65.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.65.1
* php8-bz2-debuginfo-8.0.30-150400.4.65.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.65.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.65.1
* php8-zip-8.0.30-150400.4.65.1
* php8-xsl-8.0.30-150400.4.65.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.65.1
* php8-pcntl-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-8.0.30-150400.4.65.1
* php8-cli-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.65.1
* php8-8.0.30-150400.4.65.1
* php8-mysql-8.0.30-150400.4.65.1
* php8-embed-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-8.0.30-150400.4.65.1
* php8-ldap-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-8.0.30-150400.4.65.1
* php8-sqlite-8.0.30-150400.4.65.1
* php8-ldap-8.0.30-150400.4.65.1
* php8-shmop-8.0.30-150400.4.65.1
* php8-debuginfo-8.0.30-150400.4.65.1
* php8-pdo-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.65.1
* php8-tidy-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-8.0.30-150400.4.65.1
* php8-sysvmsg-8.0.30-150400.4.65.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.65.1
* php8-ctype-8.0.30-150400.4.65.1
* php8-fpm-debugsource-8.0.30-150400.4.65.1
* php8-bcmath-8.0.30-150400.4.65.1
* php8-devel-8.0.30-150400.4.65.1
* php8-tidy-8.0.30-150400.4.65.1
* php8-openssl-debuginfo-8.0.30-150400.4.65.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.65.1
* php8-gmp-debuginfo-8.0.30-150400.4.65.1
* php8-curl-8.0.30-150400.4.65.1
* php8-iconv-8.0.30-150400.4.65.1
* php8-dba-8.0.30-150400.4.65.1
* apache2-mod_php8-8.0.30-150400.4.65.1
* php8-embed-debugsource-8.0.30-150400.4.65.1
* php8-bz2-8.0.30-150400.4.65.1
* php8-xsl-debuginfo-8.0.30-150400.4.65.1
* php8-fpm-debuginfo-8.0.30-150400.4.65.1
* php8-gd-8.0.30-150400.4.65.1
* php8-openssl-8.0.30-150400.4.65.1
* php8-readline-8.0.30-150400.4.65.1
* php8-ftp-8.0.30-150400.4.65.1
* php8-zlib-debuginfo-8.0.30-150400.4.65.1
* php8-soap-debuginfo-8.0.30-150400.4.65.1
* php8-bcmath-debuginfo-8.0.30-150400.4.65.1
* php8-mbstring-debuginfo-8.0.30-150400.4.65.1
* php8-ftp-debuginfo-8.0.30-150400.4.65.1
* php8-odbc-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-debuginfo-8.0.30-150400.4.65.1
* php8-sodium-8.0.30-150400.4.65.1
* php8-shmop-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.65.1
* php8-sqlite-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-8.0.30-150400.4.65.1
* php8-odbc-8.0.30-150400.4.65.1
* php8-snmp-8.0.30-150400.4.65.1
* php8-debugsource-8.0.30-150400.4.65.1
* php8-xmlwriter-8.0.30-150400.4.65.1
* php8-exif-8.0.30-150400.4.65.1
* php8-enchant-debuginfo-8.0.30-150400.4.65.1
* php8-dba-debuginfo-8.0.30-150400.4.65.1
* php8-enchant-8.0.30-150400.4.65.1
* php8-dom-8.0.30-150400.4.65.1
* php8-mbstring-8.0.30-150400.4.65.1
* php8-pcntl-8.0.30-150400.4.65.1
* php8-fpm-8.0.30-150400.4.65.1
* php8-pdo-8.0.30-150400.4.65.1
* php8-tokenizer-8.0.30-150400.4.65.1
* php8-ctype-debuginfo-8.0.30-150400.4.65.1
* php8-soap-8.0.30-150400.4.65.1
* php8-iconv-debuginfo-8.0.30-150400.4.65.1
* php8-cli-8.0.30-150400.4.65.1
* php8-intl-debuginfo-8.0.30-150400.4.65.1
* php8-exif-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-debuginfo-8.0.30-150400.4.65.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.65.1
* php8-embed-8.0.30-150400.4.65.1
* php8-gmp-8.0.30-150400.4.65.1
* php8-posix-debuginfo-8.0.30-150400.4.65.1
* php8-mysql-debuginfo-8.0.30-150400.4.65.1
* php8-curl-debuginfo-8.0.30-150400.4.65.1
* php8-test-8.0.30-150400.4.65.2
* php8-sysvshm-8.0.30-150400.4.65.1
* php8-dom-debuginfo-8.0.30-150400.4.65.1
* php8-snmp-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-8.0.30-150400.4.65.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* php8-fastcgi-debugsource-8.0.30-150400.4.65.1
* php8-zlib-8.0.30-150400.4.65.1
* php8-phar-debuginfo-8.0.30-150400.4.65.1
* php8-posix-8.0.30-150400.4.65.1
* php8-intl-8.0.30-150400.4.65.1
* php8-xmlreader-8.0.30-150400.4.65.1
* php8-readline-debuginfo-8.0.30-150400.4.65.1
* php8-gd-debuginfo-8.0.30-150400.4.65.1
* php8-calendar-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-debuginfo-8.0.30-150400.4.65.1
* php8-phar-8.0.30-150400.4.65.1
* php8-sodium-debuginfo-8.0.30-150400.4.65.1
* php8-zip-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-8.0.30-150400.4.65.1
* php8-calendar-8.0.30-150400.4.65.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.65.1
* php8-bz2-debuginfo-8.0.30-150400.4.65.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.65.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.65.1
* php8-zip-8.0.30-150400.4.65.1
* php8-xsl-8.0.30-150400.4.65.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.65.1
* php8-pcntl-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-8.0.30-150400.4.65.1
* php8-cli-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.65.1
* php8-8.0.30-150400.4.65.1
* php8-mysql-8.0.30-150400.4.65.1
* php8-embed-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-8.0.30-150400.4.65.1
* php8-ldap-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-8.0.30-150400.4.65.1
* php8-sqlite-8.0.30-150400.4.65.1
* php8-ldap-8.0.30-150400.4.65.1
* php8-shmop-8.0.30-150400.4.65.1
* php8-debuginfo-8.0.30-150400.4.65.1
* php8-pdo-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.65.1
* php8-tidy-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-8.0.30-150400.4.65.1
* php8-sysvmsg-8.0.30-150400.4.65.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.65.1
* php8-ctype-8.0.30-150400.4.65.1
* php8-fpm-debugsource-8.0.30-150400.4.65.1
* php8-bcmath-8.0.30-150400.4.65.1
* php8-devel-8.0.30-150400.4.65.1
* php8-tidy-8.0.30-150400.4.65.1
* php8-openssl-debuginfo-8.0.30-150400.4.65.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.65.1
* php8-gmp-debuginfo-8.0.30-150400.4.65.1
* php8-curl-8.0.30-150400.4.65.1
* php8-iconv-8.0.30-150400.4.65.1
* php8-dba-8.0.30-150400.4.65.1
* apache2-mod_php8-8.0.30-150400.4.65.1
* php8-embed-debugsource-8.0.30-150400.4.65.1
* php8-bz2-8.0.30-150400.4.65.1
* php8-xsl-debuginfo-8.0.30-150400.4.65.1
* php8-fpm-debuginfo-8.0.30-150400.4.65.1
* php8-gd-8.0.30-150400.4.65.1
* php8-openssl-8.0.30-150400.4.65.1
* php8-readline-8.0.30-150400.4.65.1
* php8-ftp-8.0.30-150400.4.65.1
* php8-zlib-debuginfo-8.0.30-150400.4.65.1
* php8-soap-debuginfo-8.0.30-150400.4.65.1
* php8-bcmath-debuginfo-8.0.30-150400.4.65.1
* php8-mbstring-debuginfo-8.0.30-150400.4.65.1
* php8-ftp-debuginfo-8.0.30-150400.4.65.1
* php8-odbc-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-debuginfo-8.0.30-150400.4.65.1
* php8-sodium-8.0.30-150400.4.65.1
* php8-shmop-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.65.1
* php8-sqlite-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-8.0.30-150400.4.65.1
* php8-odbc-8.0.30-150400.4.65.1
* php8-snmp-8.0.30-150400.4.65.1
* php8-debugsource-8.0.30-150400.4.65.1
* php8-xmlwriter-8.0.30-150400.4.65.1
* php8-exif-8.0.30-150400.4.65.1
* php8-enchant-debuginfo-8.0.30-150400.4.65.1
* php8-dba-debuginfo-8.0.30-150400.4.65.1
* php8-enchant-8.0.30-150400.4.65.1
* php8-dom-8.0.30-150400.4.65.1
* php8-mbstring-8.0.30-150400.4.65.1
* php8-pcntl-8.0.30-150400.4.65.1
* php8-fpm-8.0.30-150400.4.65.1
* php8-pdo-8.0.30-150400.4.65.1
* php8-tokenizer-8.0.30-150400.4.65.1
* php8-ctype-debuginfo-8.0.30-150400.4.65.1
* php8-soap-8.0.30-150400.4.65.1
* php8-iconv-debuginfo-8.0.30-150400.4.65.1
* php8-cli-8.0.30-150400.4.65.1
* php8-intl-debuginfo-8.0.30-150400.4.65.1
* php8-exif-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-debuginfo-8.0.30-150400.4.65.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.65.1
* php8-embed-8.0.30-150400.4.65.1
* php8-gmp-8.0.30-150400.4.65.1
* php8-posix-debuginfo-8.0.30-150400.4.65.1
* php8-mysql-debuginfo-8.0.30-150400.4.65.1
* php8-curl-debuginfo-8.0.30-150400.4.65.1
* php8-test-8.0.30-150400.4.65.2
* php8-sysvshm-8.0.30-150400.4.65.1
* php8-dom-debuginfo-8.0.30-150400.4.65.1
* php8-snmp-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-8.0.30-150400.4.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* php8-fastcgi-debugsource-8.0.30-150400.4.65.1
* php8-zlib-8.0.30-150400.4.65.1
* php8-phar-debuginfo-8.0.30-150400.4.65.1
* php8-posix-8.0.30-150400.4.65.1
* php8-intl-8.0.30-150400.4.65.1
* php8-xmlreader-8.0.30-150400.4.65.1
* php8-readline-debuginfo-8.0.30-150400.4.65.1
* php8-gd-debuginfo-8.0.30-150400.4.65.1
* php8-calendar-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-debuginfo-8.0.30-150400.4.65.1
* php8-phar-8.0.30-150400.4.65.1
* php8-sodium-debuginfo-8.0.30-150400.4.65.1
* php8-zip-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-8.0.30-150400.4.65.1
* php8-calendar-8.0.30-150400.4.65.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.65.1
* php8-bz2-debuginfo-8.0.30-150400.4.65.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.65.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.65.1
* php8-zip-8.0.30-150400.4.65.1
* php8-xsl-8.0.30-150400.4.65.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.65.1
* php8-pcntl-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-8.0.30-150400.4.65.1
* php8-cli-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.65.1
* php8-8.0.30-150400.4.65.1
* php8-mysql-8.0.30-150400.4.65.1
* php8-embed-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-8.0.30-150400.4.65.1
* php8-ldap-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-8.0.30-150400.4.65.1
* php8-sqlite-8.0.30-150400.4.65.1
* php8-ldap-8.0.30-150400.4.65.1
* php8-shmop-8.0.30-150400.4.65.1
* php8-debuginfo-8.0.30-150400.4.65.1
* php8-pdo-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.65.1
* php8-tidy-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-8.0.30-150400.4.65.1
* php8-sysvmsg-8.0.30-150400.4.65.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.65.1
* php8-ctype-8.0.30-150400.4.65.1
* php8-fpm-debugsource-8.0.30-150400.4.65.1
* php8-bcmath-8.0.30-150400.4.65.1
* php8-devel-8.0.30-150400.4.65.1
* php8-tidy-8.0.30-150400.4.65.1
* php8-openssl-debuginfo-8.0.30-150400.4.65.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.65.1
* php8-gmp-debuginfo-8.0.30-150400.4.65.1
* php8-curl-8.0.30-150400.4.65.1
* php8-iconv-8.0.30-150400.4.65.1
* php8-dba-8.0.30-150400.4.65.1
* apache2-mod_php8-8.0.30-150400.4.65.1
* php8-embed-debugsource-8.0.30-150400.4.65.1
* php8-bz2-8.0.30-150400.4.65.1
* php8-xsl-debuginfo-8.0.30-150400.4.65.1
* php8-fpm-debuginfo-8.0.30-150400.4.65.1
* php8-gd-8.0.30-150400.4.65.1
* php8-openssl-8.0.30-150400.4.65.1
* php8-readline-8.0.30-150400.4.65.1
* php8-ftp-8.0.30-150400.4.65.1
* php8-zlib-debuginfo-8.0.30-150400.4.65.1
* php8-soap-debuginfo-8.0.30-150400.4.65.1
* php8-bcmath-debuginfo-8.0.30-150400.4.65.1
* php8-mbstring-debuginfo-8.0.30-150400.4.65.1
* php8-ftp-debuginfo-8.0.30-150400.4.65.1
* php8-odbc-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-debuginfo-8.0.30-150400.4.65.1
* php8-sodium-8.0.30-150400.4.65.1
* php8-shmop-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.65.1
* php8-sqlite-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-8.0.30-150400.4.65.1
* php8-odbc-8.0.30-150400.4.65.1
* php8-snmp-8.0.30-150400.4.65.1
* php8-debugsource-8.0.30-150400.4.65.1
* php8-xmlwriter-8.0.30-150400.4.65.1
* php8-exif-8.0.30-150400.4.65.1
* php8-enchant-debuginfo-8.0.30-150400.4.65.1
* php8-dba-debuginfo-8.0.30-150400.4.65.1
* php8-enchant-8.0.30-150400.4.65.1
* php8-dom-8.0.30-150400.4.65.1
* php8-mbstring-8.0.30-150400.4.65.1
* php8-pcntl-8.0.30-150400.4.65.1
* php8-fpm-8.0.30-150400.4.65.1
* php8-pdo-8.0.30-150400.4.65.1
* php8-tokenizer-8.0.30-150400.4.65.1
* php8-ctype-debuginfo-8.0.30-150400.4.65.1
* php8-soap-8.0.30-150400.4.65.1
* php8-iconv-debuginfo-8.0.30-150400.4.65.1
* php8-cli-8.0.30-150400.4.65.1
* php8-intl-debuginfo-8.0.30-150400.4.65.1
* php8-exif-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-debuginfo-8.0.30-150400.4.65.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.65.1
* php8-embed-8.0.30-150400.4.65.1
* php8-gmp-8.0.30-150400.4.65.1
* php8-posix-debuginfo-8.0.30-150400.4.65.1
* php8-mysql-debuginfo-8.0.30-150400.4.65.1
* php8-curl-debuginfo-8.0.30-150400.4.65.1
* php8-test-8.0.30-150400.4.65.2
* php8-sysvshm-8.0.30-150400.4.65.1
* php8-dom-debuginfo-8.0.30-150400.4.65.1
* php8-snmp-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-8.0.30-150400.4.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* php8-fastcgi-debugsource-8.0.30-150400.4.65.1
* php8-zlib-8.0.30-150400.4.65.1
* php8-phar-debuginfo-8.0.30-150400.4.65.1
* php8-posix-8.0.30-150400.4.65.1
* php8-intl-8.0.30-150400.4.65.1
* php8-xmlreader-8.0.30-150400.4.65.1
* php8-readline-debuginfo-8.0.30-150400.4.65.1
* php8-gd-debuginfo-8.0.30-150400.4.65.1
* php8-calendar-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-debuginfo-8.0.30-150400.4.65.1
* php8-phar-8.0.30-150400.4.65.1
* php8-sodium-debuginfo-8.0.30-150400.4.65.1
* php8-zip-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-8.0.30-150400.4.65.1
* php8-calendar-8.0.30-150400.4.65.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.65.1
* php8-bz2-debuginfo-8.0.30-150400.4.65.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.65.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.65.1
* php8-zip-8.0.30-150400.4.65.1
* php8-xsl-8.0.30-150400.4.65.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.65.1
* php8-pcntl-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-8.0.30-150400.4.65.1
* php8-cli-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.65.1
* php8-8.0.30-150400.4.65.1
* php8-mysql-8.0.30-150400.4.65.1
* php8-embed-debuginfo-8.0.30-150400.4.65.1
* php8-opcache-8.0.30-150400.4.65.1
* php8-ldap-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-8.0.30-150400.4.65.1
* php8-sqlite-8.0.30-150400.4.65.1
* php8-ldap-8.0.30-150400.4.65.1
* php8-shmop-8.0.30-150400.4.65.1
* php8-debuginfo-8.0.30-150400.4.65.1
* php8-pdo-debuginfo-8.0.30-150400.4.65.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.65.1
* php8-tidy-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-8.0.30-150400.4.65.1
* php8-sysvmsg-8.0.30-150400.4.65.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.65.1
* php8-ctype-8.0.30-150400.4.65.1
* php8-fpm-debugsource-8.0.30-150400.4.65.1
* php8-bcmath-8.0.30-150400.4.65.1
* php8-devel-8.0.30-150400.4.65.1
* php8-tidy-8.0.30-150400.4.65.1
* php8-openssl-debuginfo-8.0.30-150400.4.65.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.65.1
* php8-gmp-debuginfo-8.0.30-150400.4.65.1
* php8-curl-8.0.30-150400.4.65.1
* php8-iconv-8.0.30-150400.4.65.1
* php8-dba-8.0.30-150400.4.65.1
* apache2-mod_php8-8.0.30-150400.4.65.1
* php8-embed-debugsource-8.0.30-150400.4.65.1
* php8-bz2-8.0.30-150400.4.65.1
* php8-xsl-debuginfo-8.0.30-150400.4.65.1
* php8-fpm-debuginfo-8.0.30-150400.4.65.1
* php8-openssl-8.0.30-150400.4.65.1
* php8-gd-8.0.30-150400.4.65.1
* php8-readline-8.0.30-150400.4.65.1
* php8-ftp-8.0.30-150400.4.65.1
* php8-zlib-debuginfo-8.0.30-150400.4.65.1
* php8-soap-debuginfo-8.0.30-150400.4.65.1
* php8-mbstring-debuginfo-8.0.30-150400.4.65.1
* php8-bcmath-debuginfo-8.0.30-150400.4.65.1
* php8-ftp-debuginfo-8.0.30-150400.4.65.1
* php8-odbc-debuginfo-8.0.30-150400.4.65.1
* php8-gettext-debuginfo-8.0.30-150400.4.65.1
* php8-sodium-8.0.30-150400.4.65.1
* php8-shmop-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.65.1
* php8-sqlite-debuginfo-8.0.30-150400.4.65.1
* php8-sockets-debuginfo-8.0.30-150400.4.65.1
* php8-fileinfo-8.0.30-150400.4.65.1
* php8-odbc-8.0.30-150400.4.65.1
* php8-snmp-8.0.30-150400.4.65.1
* php8-debugsource-8.0.30-150400.4.65.1
* php8-xmlwriter-8.0.30-150400.4.65.1
* php8-exif-8.0.30-150400.4.65.1
* php8-enchant-debuginfo-8.0.30-150400.4.65.1
* php8-dba-debuginfo-8.0.30-150400.4.65.1
* php8-enchant-8.0.30-150400.4.65.1
* php8-dom-8.0.30-150400.4.65.1
* php8-mbstring-8.0.30-150400.4.65.1
* php8-pcntl-8.0.30-150400.4.65.1
* php8-pdo-8.0.30-150400.4.65.1
* php8-fpm-8.0.30-150400.4.65.1
* php8-tokenizer-8.0.30-150400.4.65.1
* php8-ctype-debuginfo-8.0.30-150400.4.65.1
* php8-soap-8.0.30-150400.4.65.1
* php8-iconv-debuginfo-8.0.30-150400.4.65.1
* php8-cli-8.0.30-150400.4.65.1
* php8-intl-debuginfo-8.0.30-150400.4.65.1
* php8-exif-debuginfo-8.0.30-150400.4.65.1
* php8-pgsql-debuginfo-8.0.30-150400.4.65.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.65.1
* php8-embed-8.0.30-150400.4.65.1
* php8-gmp-8.0.30-150400.4.65.1
* php8-posix-debuginfo-8.0.30-150400.4.65.1
* php8-mysql-debuginfo-8.0.30-150400.4.65.1
* php8-curl-debuginfo-8.0.30-150400.4.65.1
* php8-test-8.0.30-150400.4.65.2
* php8-sysvshm-8.0.30-150400.4.65.1
* php8-dom-debuginfo-8.0.30-150400.4.65.1
* php8-snmp-debuginfo-8.0.30-150400.4.65.1
* php8-fastcgi-8.0.30-150400.4.65.1

## References:

* https://www.suse.com/security/cve/CVE-2025-14179.html
* https://www.suse.com/security/cve/CVE-2026-6722.html
* https://www.suse.com/security/cve/CVE-2026-6735.html
* https://www.suse.com/security/cve/CVE-2026-7258.html
* https://www.suse.com/security/cve/CVE-2026-7259.html
* https://www.suse.com/security/cve/CVE-2026-7261.html
* https://www.suse.com/security/cve/CVE-2026-7262.html
* https://www.suse.com/security/cve/CVE-2026-7568.html
* https://bugzilla.suse.com/show_bug.cgi?id=1264769
* https://bugzilla.suse.com/show_bug.cgi?id=1264771
* https://bugzilla.suse.com/show_bug.cgi?id=1264772
* https://bugzilla.suse.com/show_bug.cgi?id=1264773
* https://bugzilla.suse.com/show_bug.cgi?id=1264774
* https://bugzilla.suse.com/show_bug.cgi?id=1264775
* https://bugzilla.suse.com/show_bug.cgi?id=1264776
* https://bugzilla.suse.com/show_bug.cgi?id=1264778



openSUSE-SU-2026:20769-1: important: Security update for mozjs115


openSUSE security update: security update for mozjs115
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20769-1
Rating: important
References:

* bsc#1259713
* bsc#1259728
* bsc#1259731

Cross-References:

* CVE-2026-32776
* CVE-2026-32777
* CVE-2026-32778

CVSS scores:

* CVE-2026-32776 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-32776 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-32777 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-32777 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-32778 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-32778 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 3 vulnerabilities and has 3 bug fixes can now be installed.

Description:

This update for mozjs115 fixes the following issues:

Changes in mozjs115:

- CVE-2026-32776: Fixed a NULL pointer dereference when processing empty external parameter entities inside an entity declaration value (bsc#1259728)
- CVE-2026-32777: Fixed a denial of service due to infinite loop in DTD content parsing (bsc#1259713)
- CVE-2026-32778: Fixed a NULL pointer dereference in 'setContext' on retry after an out-of-memory condition (bsc#1259731)

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-packagehub-261=1

Package List:

- openSUSE Leap 16.0:

libmozjs-115-0-115.15.0-bp160.2.1
mozjs115-115.15.0-bp160.2.1
mozjs115-devel-115.15.0-bp160.2.1

References:

* https://www.suse.com/security/cve/CVE-2026-32776.html
* https://www.suse.com/security/cve/CVE-2026-32777.html
* https://www.suse.com/security/cve/CVE-2026-32778.html



openSUSE-SU-2026:10821-1: moderate: dnsmasq-2.92rel2-1.1 on GA media


# dnsmasq-2.92rel2-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10821-1
Rating: moderate

Cross-References:

* CVE-2026-2291
* CVE-2026-4890
* CVE-2026-4891
* CVE-2026-4892
* CVE-2026-4893
* CVE-2026-5172

CVSS scores:

* CVE-2026-2291 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-2291 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-4890 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-4891 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-4892 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-4893 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-5172 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Tumbleweed

An update that solves 6 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the dnsmasq-2.92rel2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* dnsmasq 2.92rel2-1.1
* dnsmasq-utils 2.92rel2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-2291.html
* https://www.suse.com/security/cve/CVE-2026-4890.html
* https://www.suse.com/security/cve/CVE-2026-4891.html
* https://www.suse.com/security/cve/CVE-2026-4892.html
* https://www.suse.com/security/cve/CVE-2026-4893.html
* https://www.suse.com/security/cve/CVE-2026-5172.html



openSUSE-SU-2026:10817-1: moderate: GraphicsMagick-1.3.46-7.1 on GA media


# GraphicsMagick-1.3.46-7.1 on GA media

Announcement ID: openSUSE-SU-2026:10817-1
Rating: moderate

Cross-References:

* CVE-2026-42050

CVSS scores:

* CVE-2026-42050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the GraphicsMagick-1.3.46-7.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* GraphicsMagick 1.3.46-7.1
* GraphicsMagick-devel 1.3.46-7.1
* libGraphicsMagick++-Q16-12 1.3.46-7.1
* libGraphicsMagick++-devel 1.3.46-7.1
* libGraphicsMagick-Q16-3 1.3.46-7.1
* libGraphicsMagick3-config 1.3.46-7.1
* libGraphicsMagickWand-Q16-2 1.3.46-7.1
* perl-GraphicsMagick 1.3.46-7.1

## References:

* https://www.suse.com/security/cve/CVE-2026-42050.html