SUSE-SU-2026:0371-1: important: Security update for glibc
openSUSE-SU-2026:0037-1: important: Security update for python-Django
SUSE-SU-2026:0374-1: moderate: Security update for protobuf
SUSE-SU-2026:0373-1: important: Security update for glib2
SUSE-SU-2026:0377-1: moderate: Security update for libheif
SUSE-SU-2026:0375-1: moderate: Security update for libvirt
SUSE-SU-2026:0383-1: moderate: Security update for rekor
openSUSE-SU-2026:10139-1: moderate: libsoup-3_0-0-3.6.5-12.1 on GA media
openSUSE-SU-2026:10140-1: moderate: patch-2.8-2.1 on GA media
openSUSE-SU-2026:10135-1: moderate: java-1_8_0-openj9-1.8.0.482-1.1 on GA media
openSUSE-SU-2026:10141-1: moderate: rizin-0.8.2-1.1 on GA media
openSUSE-SU-2026:10136-1: moderate: java-1_8_0-openjdk-1.8.0.482-1.1 on GA media
openSUSE-SU-2026:10134-1: moderate: java-17-openj9-17.0.18.0-1.1 on GA media
openSUSE-SU-2026:10133-1: moderate: java-11-openj9-11.0.30.0-1.1 on GA media
openSUSE-SU-2026:10137-1: moderate: java-21-openj9-21.0.10.0-1.1 on GA media
openSUSE-SU-2026:10132-1: moderate: freerdp-3.22.0-1.1 on GA media
SUSE-SU-2026:0381-1: moderate: Security update for abseil-cpp
openSUSE-SU-2026:20167-1: important: Security update for xrdp
SUSE-SU-2026:0371-1: important: Security update for glibc
# Security update for glibc
Announcement ID: SUSE-SU-2026:0371-1
Release Date: 2026-02-03T18:09:03Z
Rating: important
References:
* bsc#1256437
* bsc#1256766
* bsc#1256822
* bsc#1257005
Cross-References:
* CVE-2025-15281
* CVE-2026-0861
* CVE-2026-0915
CVSS scores:
* CVE-2025-15281 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-15281 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0861 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-0861 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-0915 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-0915 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-0915 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* Basesystem Module 15-SP7
* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves three vulnerabilities and has one security fix can now be
installed.
## Description:
This update for glibc fixes the following issues:
Security fixes:
* CVE-2026-0861: Fixed inadequate size check in the memalign suite may result
in an integer overflow (bsc#1256766).
* CVE-2026-0915: Fixed uninitialized stack buffer used as DNS query name when
net==0 in _nss_dns_getnetbyaddr_r (bsc#1256822).
* CVE-2025-15281: Fixed uninitialized memory may cause the process abort
(bsc#1257005).
Other fixes:
* NPTL: Optimize trylock for high cache contention workloads (bsc#1256437).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-371=1 openSUSE-SLE-15.6-2026-371=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-371=1
* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-371=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-371=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-371=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586 i686)
* glibc-2.38-150600.14.40.1
* glibc-debuginfo-2.38-150600.14.40.1
* glibc-devel-static-2.38-150600.14.40.1
* glibc-locale-2.38-150600.14.40.1
* glibc-locale-base-debuginfo-2.38-150600.14.40.1
* glibc-profile-2.38-150600.14.40.1
* libnsl1-debuginfo-2.38-150600.14.40.1
* glibc-devel-debuginfo-2.38-150600.14.40.1
* glibc-devel-2.38-150600.14.40.1
* libnsl1-2.38-150600.14.40.1
* glibc-locale-base-2.38-150600.14.40.1
* glibc-debugsource-2.38-150600.14.40.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* glibc-extra-2.38-150600.14.40.1
* nscd-2.38-150600.14.40.1
* glibc-utils-src-debugsource-2.38-150600.14.40.1
* nscd-debuginfo-2.38-150600.14.40.1
* glibc-utils-2.38-150600.14.40.1
* glibc-extra-debuginfo-2.38-150600.14.40.1
* glibc-utils-debuginfo-2.38-150600.14.40.1
* openSUSE Leap 15.6 (noarch)
* glibc-info-2.38-150600.14.40.1
* glibc-html-2.38-150600.14.40.1
* glibc-i18ndata-2.38-150600.14.40.1
* glibc-lang-2.38-150600.14.40.1
* openSUSE Leap 15.6 (x86_64)
* glibc-devel-32bit-debuginfo-2.38-150600.14.40.1
* glibc-devel-static-32bit-2.38-150600.14.40.1
* libnsl1-32bit-debuginfo-2.38-150600.14.40.1
* glibc-devel-32bit-2.38-150600.14.40.1
* glibc-utils-32bit-debuginfo-2.38-150600.14.40.1
* glibc-locale-base-32bit-debuginfo-2.38-150600.14.40.1
* glibc-profile-32bit-2.38-150600.14.40.1
* glibc-locale-base-32bit-2.38-150600.14.40.1
* glibc-32bit-2.38-150600.14.40.1
* libnsl1-32bit-2.38-150600.14.40.1
* glibc-utils-32bit-2.38-150600.14.40.1
* glibc-32bit-debuginfo-2.38-150600.14.40.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* glibc-64bit-debuginfo-2.38-150600.14.40.1
* glibc-devel-64bit-2.38-150600.14.40.1
* glibc-devel-64bit-debuginfo-2.38-150600.14.40.1
* glibc-64bit-2.38-150600.14.40.1
* libnsl1-64bit-debuginfo-2.38-150600.14.40.1
* glibc-devel-static-64bit-2.38-150600.14.40.1
* glibc-locale-base-64bit-2.38-150600.14.40.1
* glibc-profile-64bit-2.38-150600.14.40.1
* glibc-utils-64bit-debuginfo-2.38-150600.14.40.1
* glibc-locale-base-64bit-debuginfo-2.38-150600.14.40.1
* glibc-utils-64bit-2.38-150600.14.40.1
* libnsl1-64bit-2.38-150600.14.40.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* glibc-2.38-150600.14.40.1
* glibc-debuginfo-2.38-150600.14.40.1
* glibc-locale-2.38-150600.14.40.1
* glibc-locale-base-debuginfo-2.38-150600.14.40.1
* glibc-profile-2.38-150600.14.40.1
* libnsl1-debuginfo-2.38-150600.14.40.1
* glibc-extra-2.38-150600.14.40.1
* glibc-devel-debuginfo-2.38-150600.14.40.1
* nscd-2.38-150600.14.40.1
* glibc-devel-2.38-150600.14.40.1
* nscd-debuginfo-2.38-150600.14.40.1
* libnsl1-2.38-150600.14.40.1
* glibc-locale-base-2.38-150600.14.40.1
* glibc-debugsource-2.38-150600.14.40.1
* glibc-extra-debuginfo-2.38-150600.14.40.1
* Basesystem Module 15-SP7 (noarch)
* glibc-info-2.38-150600.14.40.1
* glibc-i18ndata-2.38-150600.14.40.1
* glibc-lang-2.38-150600.14.40.1
* Basesystem Module 15-SP7 (x86_64)
* libnsl1-32bit-debuginfo-2.38-150600.14.40.1
* glibc-locale-base-32bit-debuginfo-2.38-150600.14.40.1
* glibc-locale-base-32bit-2.38-150600.14.40.1
* glibc-32bit-2.38-150600.14.40.1
* libnsl1-32bit-2.38-150600.14.40.1
* glibc-32bit-debuginfo-2.38-150600.14.40.1
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* glibc-debuginfo-2.38-150600.14.40.1
* glibc-devel-static-2.38-150600.14.40.1
* glibc-utils-src-debugsource-2.38-150600.14.40.1
* glibc-debugsource-2.38-150600.14.40.1
* glibc-utils-2.38-150600.14.40.1
* glibc-utils-debuginfo-2.38-150600.14.40.1
* Development Tools Module 15-SP7 (x86_64)
* glibc-devel-32bit-2.38-150600.14.40.1
* glibc-devel-32bit-debuginfo-2.38-150600.14.40.1
* glibc-32bit-debuginfo-2.38-150600.14.40.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* glibc-2.38-150600.14.40.1
* glibc-debuginfo-2.38-150600.14.40.1
* glibc-devel-static-2.38-150600.14.40.1
* glibc-locale-2.38-150600.14.40.1
* glibc-locale-base-debuginfo-2.38-150600.14.40.1
* glibc-profile-2.38-150600.14.40.1
* libnsl1-debuginfo-2.38-150600.14.40.1
* glibc-extra-2.38-150600.14.40.1
* glibc-devel-debuginfo-2.38-150600.14.40.1
* glibc-utils-src-debugsource-2.38-150600.14.40.1
* nscd-2.38-150600.14.40.1
* glibc-devel-2.38-150600.14.40.1
* nscd-debuginfo-2.38-150600.14.40.1
* libnsl1-2.38-150600.14.40.1
* glibc-locale-base-2.38-150600.14.40.1
* glibc-debugsource-2.38-150600.14.40.1
* glibc-utils-2.38-150600.14.40.1
* glibc-extra-debuginfo-2.38-150600.14.40.1
* glibc-utils-debuginfo-2.38-150600.14.40.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* glibc-info-2.38-150600.14.40.1
* glibc-i18ndata-2.38-150600.14.40.1
* glibc-lang-2.38-150600.14.40.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64)
* glibc-devel-32bit-debuginfo-2.38-150600.14.40.1
* libnsl1-32bit-debuginfo-2.38-150600.14.40.1
* glibc-devel-32bit-2.38-150600.14.40.1
* glibc-locale-base-32bit-debuginfo-2.38-150600.14.40.1
* glibc-locale-base-32bit-2.38-150600.14.40.1
* glibc-32bit-2.38-150600.14.40.1
* libnsl1-32bit-2.38-150600.14.40.1
* glibc-32bit-debuginfo-2.38-150600.14.40.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* glibc-2.38-150600.14.40.1
* glibc-debuginfo-2.38-150600.14.40.1
* glibc-devel-static-2.38-150600.14.40.1
* glibc-locale-2.38-150600.14.40.1
* glibc-locale-base-debuginfo-2.38-150600.14.40.1
* glibc-profile-2.38-150600.14.40.1
* libnsl1-debuginfo-2.38-150600.14.40.1
* glibc-extra-2.38-150600.14.40.1
* glibc-devel-debuginfo-2.38-150600.14.40.1
* glibc-utils-src-debugsource-2.38-150600.14.40.1
* nscd-2.38-150600.14.40.1
* glibc-devel-2.38-150600.14.40.1
* nscd-debuginfo-2.38-150600.14.40.1
* libnsl1-2.38-150600.14.40.1
* glibc-locale-base-2.38-150600.14.40.1
* glibc-debugsource-2.38-150600.14.40.1
* glibc-utils-2.38-150600.14.40.1
* glibc-extra-debuginfo-2.38-150600.14.40.1
* glibc-utils-debuginfo-2.38-150600.14.40.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* glibc-info-2.38-150600.14.40.1
* glibc-i18ndata-2.38-150600.14.40.1
* glibc-lang-2.38-150600.14.40.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* glibc-devel-32bit-debuginfo-2.38-150600.14.40.1
* libnsl1-32bit-debuginfo-2.38-150600.14.40.1
* glibc-devel-32bit-2.38-150600.14.40.1
* glibc-locale-base-32bit-debuginfo-2.38-150600.14.40.1
* glibc-locale-base-32bit-2.38-150600.14.40.1
* glibc-32bit-2.38-150600.14.40.1
* libnsl1-32bit-2.38-150600.14.40.1
* glibc-32bit-debuginfo-2.38-150600.14.40.1
## References:
* https://www.suse.com/security/cve/CVE-2025-15281.html
* https://www.suse.com/security/cve/CVE-2026-0861.html
* https://www.suse.com/security/cve/CVE-2026-0915.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256437
* https://bugzilla.suse.com/show_bug.cgi?id=1256766
* https://bugzilla.suse.com/show_bug.cgi?id=1256822
* https://bugzilla.suse.com/show_bug.cgi?id=1257005
openSUSE-SU-2026:0037-1: important: Security update for python-Django
openSUSE Security Update: Security update for python-Django
_______________________________
Announcement ID: openSUSE-SU-2026:0037-1
Rating: important
References: #1257401 #1257405 #1257406 #1257407 #1257408
Cross-References: CVE-2025-13473 CVE-2026-1207 CVE-2026-1285
CVE-2026-1287 CVE-2026-1312
CVSS scores:
CVE-2025-13473 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2026-1207 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2026-1285 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2026-1287 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2026-1312 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________
An update that fixes 5 vulnerabilities is now available.
Description:
This update for python-Django fixes the following issues:
- CVE-2026-1312: Fixed potential SQL injection via QuerySet.order_by and
FilteredRelation (bsc#1257408).
- CVE-2026-1287: Fixed potential SQL injection in column aliases via
control characters (bsc#1257407).
- CVE-2026-1207: Fixed potential SQL injection via raster lookups on
PostGIS (bsc#1257405).
- CVE-2026-1285: Fixed potential denial-of-service in
django.utils.text.Truncator HTML methods (bsc#1257406).
- CVE-2025-13473: Fixed username enumeration through timing difference in
mod_wsgi authentication handler (bsc#1257401).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2026-37=1
Package List:
- openSUSE Backports SLE-15-SP6 (noarch):
python3-Django-2.2.28-bp156.30.1
References:
https://www.suse.com/security/cve/CVE-2025-13473.html
https://www.suse.com/security/cve/CVE-2026-1207.html
https://www.suse.com/security/cve/CVE-2026-1285.html
https://www.suse.com/security/cve/CVE-2026-1287.html
https://www.suse.com/security/cve/CVE-2026-1312.html
https://bugzilla.suse.com/1257401
https://bugzilla.suse.com/1257405
https://bugzilla.suse.com/1257406
https://bugzilla.suse.com/1257407
https://bugzilla.suse.com/1257408
SUSE-SU-2026:0374-1: moderate: Security update for protobuf
# Security update for protobuf
Announcement ID: SUSE-SU-2026:0374-1
Release Date: 2026-02-04T07:03:50Z
Rating: moderate
References:
* bsc#1257173
Cross-References:
* CVE-2026-0994
CVSS scores:
* CVE-2026-0994 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0994 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0994 ( NVD ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* Basesystem Module 15-SP7
* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for protobuf fixes the following issues:
* CVE-2026-0994: Fixed google.protobuf.Any recursion depth bypass in Python
json_format.ParseDict (bsc#1257173).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-374=1 openSUSE-SLE-15.6-2026-374=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-374=1
* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-374=1
* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-374=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libprotobuf25_1_0-25.1-150600.16.16.1
* libprotoc25_1_0-debuginfo-25.1-150600.16.16.1
* protobuf-debugsource-25.1-150600.16.16.1
* protobuf-devel-debuginfo-25.1-150600.16.16.1
* libprotobuf25_1_0-debuginfo-25.1-150600.16.16.1
* protobuf-devel-25.1-150600.16.16.1
* libprotoc25_1_0-25.1-150600.16.16.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150600.16.16.1
* python311-protobuf-4.25.1-150600.16.16.1
* libprotobuf-lite25_1_0-25.1-150600.16.16.1
* openSUSE Leap 15.6 (x86_64)
* libprotoc25_1_0-32bit-25.1-150600.16.16.1
* libprotobuf-lite25_1_0-32bit-25.1-150600.16.16.1
* libprotoc25_1_0-32bit-debuginfo-25.1-150600.16.16.1
* libprotobuf-lite25_1_0-32bit-debuginfo-25.1-150600.16.16.1
* libprotobuf25_1_0-32bit-25.1-150600.16.16.1
* libprotobuf25_1_0-32bit-debuginfo-25.1-150600.16.16.1
* openSUSE Leap 15.6 (noarch)
* protobuf-java-25.1-150600.16.16.1
* protobuf-java-parent-25.1-150600.16.16.1
* protobuf-java-bom-25.1-150600.16.16.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libprotoc25_1_0-64bit-25.1-150600.16.16.1
* libprotobuf-lite25_1_0-64bit-debuginfo-25.1-150600.16.16.1
* libprotoc25_1_0-64bit-debuginfo-25.1-150600.16.16.1
* libprotobuf-lite25_1_0-64bit-25.1-150600.16.16.1
* libprotobuf25_1_0-64bit-25.1-150600.16.16.1
* libprotobuf25_1_0-64bit-debuginfo-25.1-150600.16.16.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libprotobuf25_1_0-25.1-150600.16.16.1
* libprotoc25_1_0-debuginfo-25.1-150600.16.16.1
* protobuf-debugsource-25.1-150600.16.16.1
* libprotobuf25_1_0-debuginfo-25.1-150600.16.16.1
* libprotoc25_1_0-25.1-150600.16.16.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150600.16.16.1
* libprotobuf-lite25_1_0-25.1-150600.16.16.1
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* protobuf-devel-debuginfo-25.1-150600.16.16.1
* protobuf-devel-25.1-150600.16.16.1
* protobuf-debugsource-25.1-150600.16.16.1
* Python 3 Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* python311-protobuf-4.25.1-150600.16.16.1
## References:
* https://www.suse.com/security/cve/CVE-2026-0994.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257173
SUSE-SU-2026:0373-1: important: Security update for glib2
# Security update for glib2
Announcement ID: SUSE-SU-2026:0373-1
Release Date: 2026-02-04T02:50:53Z
Rating: important
References:
* bsc#1257353
* bsc#1257354
* bsc#1257355
Cross-References:
* CVE-2026-1484
* CVE-2026-1485
* CVE-2026-1489
CVSS scores:
* CVE-2026-1484 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-1484 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-1484 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
* CVE-2026-1485 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-1485 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-1485 ( NVD ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-1489 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-1489 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-1489 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves three vulnerabilities can now be installed.
## Description:
This update for glib2 fixes the following issues:
* CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to
integer wraparound in content type parsing (bsc#1257354).
* CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to
miscalculated buffer boundaries in the Base64 encoding routine
(bsc#1257355).
* CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds
access due to integer overflow in Unicode case conversion (bsc#1257353).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-373=1 openSUSE-SLE-15.6-2026-373=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-373=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-373=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-373=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* gio-branding-upstream-2.78.6-150600.4.35.1
* glib2-lang-2.78.6-150600.4.35.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* glib2-tools-2.78.6-150600.4.35.1
* glib2-tests-devel-2.78.6-150600.4.35.1
* libgio-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgmodule-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgthread-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgobject-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgio-2_0-0-2.78.6-150600.4.35.1
* libgmodule-2_0-0-2.78.6-150600.4.35.1
* libgobject-2_0-0-2.78.6-150600.4.35.1
* libgthread-2_0-0-2.78.6-150600.4.35.1
* glib2-doc-2.78.6-150600.4.35.1
* libglib-2_0-0-2.78.6-150600.4.35.1
* glib2-devel-static-2.78.6-150600.4.35.1
* glib2-devel-2.78.6-150600.4.35.1
* libglib-2_0-0-debuginfo-2.78.6-150600.4.35.1
* glib2-tools-debuginfo-2.78.6-150600.4.35.1
* glib2-tests-devel-debuginfo-2.78.6-150600.4.35.1
* glib2-devel-debuginfo-2.78.6-150600.4.35.1
* glib2-debugsource-2.78.6-150600.4.35.1
* openSUSE Leap 15.6 (x86_64)
* libglib-2_0-0-32bit-2.78.6-150600.4.35.1
* libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* libgthread-2_0-0-32bit-2.78.6-150600.4.35.1
* libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* libgmodule-2_0-0-32bit-2.78.6-150600.4.35.1
* glib2-devel-32bit-2.78.6-150600.4.35.1
* libgio-2_0-0-32bit-2.78.6-150600.4.35.1
* glib2-tools-32bit-debuginfo-2.78.6-150600.4.35.1
* libgobject-2_0-0-32bit-2.78.6-150600.4.35.1
* libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* glib2-tools-32bit-2.78.6-150600.4.35.1
* glib2-devel-32bit-debuginfo-2.78.6-150600.4.35.1
* libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* libgthread-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* glib2-tools-64bit-2.78.6-150600.4.35.1
* libgmodule-2_0-0-64bit-debuginfo-2.78.6-150600.4.35.1
* libgobject-2_0-0-64bit-2.78.6-150600.4.35.1
* libgio-2_0-0-64bit-2.78.6-150600.4.35.1
* glib2-tools-64bit-debuginfo-2.78.6-150600.4.35.1
* libgthread-2_0-0-64bit-2.78.6-150600.4.35.1
* glib2-devel-64bit-debuginfo-2.78.6-150600.4.35.1
* glib2-devel-64bit-2.78.6-150600.4.35.1
* libgio-2_0-0-64bit-debuginfo-2.78.6-150600.4.35.1
* libglib-2_0-0-64bit-2.78.6-150600.4.35.1
* libgobject-2_0-0-64bit-debuginfo-2.78.6-150600.4.35.1
* libgthread-2_0-0-64bit-debuginfo-2.78.6-150600.4.35.1
* libglib-2_0-0-64bit-debuginfo-2.78.6-150600.4.35.1
* libgmodule-2_0-0-64bit-2.78.6-150600.4.35.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* glib2-tools-2.78.6-150600.4.35.1
* libgio-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgmodule-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgthread-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgobject-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgio-2_0-0-2.78.6-150600.4.35.1
* libgmodule-2_0-0-2.78.6-150600.4.35.1
* libgobject-2_0-0-2.78.6-150600.4.35.1
* libgthread-2_0-0-2.78.6-150600.4.35.1
* libglib-2_0-0-2.78.6-150600.4.35.1
* glib2-devel-2.78.6-150600.4.35.1
* glib2-tools-debuginfo-2.78.6-150600.4.35.1
* libglib-2_0-0-debuginfo-2.78.6-150600.4.35.1
* glib2-devel-debuginfo-2.78.6-150600.4.35.1
* glib2-debugsource-2.78.6-150600.4.35.1
* Basesystem Module 15-SP7 (noarch)
* glib2-lang-2.78.6-150600.4.35.1
* Basesystem Module 15-SP7 (x86_64)
* libglib-2_0-0-32bit-2.78.6-150600.4.35.1
* libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* libgmodule-2_0-0-32bit-2.78.6-150600.4.35.1
* libgio-2_0-0-32bit-2.78.6-150600.4.35.1
* libgobject-2_0-0-32bit-2.78.6-150600.4.35.1
* libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* glib2-tools-2.78.6-150600.4.35.1
* libgio-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgmodule-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgthread-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgobject-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgio-2_0-0-2.78.6-150600.4.35.1
* libgmodule-2_0-0-2.78.6-150600.4.35.1
* libgobject-2_0-0-2.78.6-150600.4.35.1
* libgthread-2_0-0-2.78.6-150600.4.35.1
* libglib-2_0-0-2.78.6-150600.4.35.1
* glib2-devel-2.78.6-150600.4.35.1
* glib2-tools-debuginfo-2.78.6-150600.4.35.1
* libglib-2_0-0-debuginfo-2.78.6-150600.4.35.1
* glib2-devel-debuginfo-2.78.6-150600.4.35.1
* glib2-debugsource-2.78.6-150600.4.35.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* glib2-lang-2.78.6-150600.4.35.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64)
* libglib-2_0-0-32bit-2.78.6-150600.4.35.1
* libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* libgmodule-2_0-0-32bit-2.78.6-150600.4.35.1
* libgio-2_0-0-32bit-2.78.6-150600.4.35.1
* libgobject-2_0-0-32bit-2.78.6-150600.4.35.1
* libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* glib2-tools-2.78.6-150600.4.35.1
* libgio-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgmodule-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgthread-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgobject-2_0-0-debuginfo-2.78.6-150600.4.35.1
* libgio-2_0-0-2.78.6-150600.4.35.1
* libgmodule-2_0-0-2.78.6-150600.4.35.1
* libgobject-2_0-0-2.78.6-150600.4.35.1
* libgthread-2_0-0-2.78.6-150600.4.35.1
* libglib-2_0-0-2.78.6-150600.4.35.1
* glib2-devel-2.78.6-150600.4.35.1
* glib2-tools-debuginfo-2.78.6-150600.4.35.1
* libglib-2_0-0-debuginfo-2.78.6-150600.4.35.1
* glib2-devel-debuginfo-2.78.6-150600.4.35.1
* glib2-debugsource-2.78.6-150600.4.35.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* glib2-lang-2.78.6-150600.4.35.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* libglib-2_0-0-32bit-2.78.6-150600.4.35.1
* libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* libgmodule-2_0-0-32bit-2.78.6-150600.4.35.1
* libgio-2_0-0-32bit-2.78.6-150600.4.35.1
* libgobject-2_0-0-32bit-2.78.6-150600.4.35.1
* libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
* libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.35.1
## References:
* https://www.suse.com/security/cve/CVE-2026-1484.html
* https://www.suse.com/security/cve/CVE-2026-1485.html
* https://www.suse.com/security/cve/CVE-2026-1489.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257353
* https://bugzilla.suse.com/show_bug.cgi?id=1257354
* https://bugzilla.suse.com/show_bug.cgi?id=1257355
SUSE-SU-2026:0377-1: moderate: Security update for libheif
# Security update for libheif
Announcement ID: SUSE-SU-2026:0377-1
Release Date: 2026-02-04T07:37:59Z
Rating: moderate
References:
* bsc#1255735
Cross-References:
* CVE-2025-68431
CVSS scores:
* CVE-2025-68431 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-68431 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
An update that solves one vulnerability can now be installed.
## Description:
This update for libheif fixes the following issues:
* CVE-2025-68431: Fixed heap buffer over-read in `HeifPixelImage::overlay()`
via crafted HEIF that exercises the overlay image item (bsc#1255735)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-377=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-377=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libheif-devel-1.12.0-150400.3.17.1
* libheif1-1.12.0-150400.3.17.1
* libheif-debugsource-1.12.0-150400.3.17.1
* libheif1-debuginfo-1.12.0-150400.3.17.1
* gdk-pixbuf-loader-libheif-debuginfo-1.12.0-150400.3.17.1
* gdk-pixbuf-loader-libheif-1.12.0-150400.3.17.1
* openSUSE Leap 15.4 (x86_64)
* libheif1-32bit-debuginfo-1.12.0-150400.3.17.1
* libheif1-32bit-1.12.0-150400.3.17.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libheif1-64bit-1.12.0-150400.3.17.1
* libheif1-64bit-debuginfo-1.12.0-150400.3.17.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libheif-devel-1.12.0-150400.3.17.1
* libheif1-1.12.0-150400.3.17.1
* libheif-debugsource-1.12.0-150400.3.17.1
* libheif1-debuginfo-1.12.0-150400.3.17.1
* gdk-pixbuf-loader-libheif-debuginfo-1.12.0-150400.3.17.1
* gdk-pixbuf-loader-libheif-1.12.0-150400.3.17.1
* openSUSE Leap 15.6 (x86_64)
* libheif1-32bit-debuginfo-1.12.0-150400.3.17.1
* libheif1-32bit-1.12.0-150400.3.17.1
## References:
* https://www.suse.com/security/cve/CVE-2025-68431.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255735
SUSE-SU-2026:0375-1: moderate: Security update for libvirt
# Security update for libvirt
Announcement ID: SUSE-SU-2026:0375-1
Release Date: 2026-02-04T07:37:41Z
Rating: moderate
References:
* bsc#1251822
* bsc#1253278
* bsc#1253703
Cross-References:
* CVE-2025-12748
* CVE-2025-13193
CVSS scores:
* CVE-2025-12748 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-12748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-12748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-13193 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-13193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-13193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
An update that solves two vulnerabilities and has one security fix can now be
installed.
## Description:
This update for libvirt fixes the following issues:
Security fixes:
* CVE-2025-13193: Fixed umask for 'qemu-img' when creating external inactive
snapshots (bsc#1253703)
* CVE-2025-12748: Fixed check ACLs before parsing the whole domain XML
(bsc#1253278)
Other fixes:
* libvirt-supportconfig: Add support for supportconfig.rc (bsc#1251822)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-375=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-375=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-375=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-375=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-375=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libvirt-daemon-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.14.1
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-gluster-8.0.0-150400.7.14.1
* libvirt-daemon-lxc-8.0.0-150400.7.14.1
* libvirt-client-8.0.0-150400.7.14.1
* libvirt-devel-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-secret-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.14.1
* wireshark-plugin-libvirt-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.14.1
* libvirt-daemon-driver-network-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.14.1
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-interface-8.0.0-150400.7.14.1
* libvirt-daemon-config-network-8.0.0-150400.7.14.1
* libvirt-debugsource-8.0.0-150400.7.14.1
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.14.1
* libvirt-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-gluster-debuginfo-8.0.0-150400.7.14.1
* libvirt-nss-8.0.0-150400.7.14.1
* libvirt-daemon-driver-lxc-debuginfo-8.0.0-150400.7.14.1
* libvirt-lock-sanlock-8.0.0-150400.7.14.1
* libvirt-libs-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-8.0.0-150400.7.14.1
* libvirt-daemon-qemu-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.14.1
* libvirt-daemon-hooks-8.0.0-150400.7.14.1
* libvirt-client-debuginfo-8.0.0-150400.7.14.1
* libvirt-libs-8.0.0-150400.7.14.1
* wireshark-plugin-libvirt-debuginfo-8.0.0-150400.7.14.1
* libvirt-nss-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.14.1
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-lxc-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-qemu-8.0.0-150400.7.14.1
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.14.1
* openSUSE Leap 15.4 (x86_64)
* libvirt-client-32bit-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-libxl-8.0.0-150400.7.14.1
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-xen-8.0.0-150400.7.14.1
* libvirt-devel-32bit-8.0.0-150400.7.14.1
* openSUSE Leap 15.4 (noarch)
* libvirt-doc-8.0.0-150400.7.14.1
* openSUSE Leap 15.4 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.14.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libvirt-client-64bit-debuginfo-8.0.0-150400.7.14.1
* libvirt-devel-64bit-8.0.0-150400.7.14.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libvirt-daemon-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.14.1
* libvirt-client-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-secret-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.14.1
* libvirt-daemon-driver-network-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.14.1
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-interface-8.0.0-150400.7.14.1
* libvirt-debugsource-8.0.0-150400.7.14.1
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.14.1
* libvirt-libs-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-8.0.0-150400.7.14.1
* libvirt-daemon-qemu-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.14.1
* libvirt-libs-8.0.0-150400.7.14.1
* libvirt-client-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.14.1
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-qemu-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.14.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.14.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libvirt-daemon-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.14.1
* libvirt-client-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-secret-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.14.1
* libvirt-daemon-driver-network-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.14.1
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-interface-8.0.0-150400.7.14.1
* libvirt-debugsource-8.0.0-150400.7.14.1
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.14.1
* libvirt-libs-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-8.0.0-150400.7.14.1
* libvirt-daemon-qemu-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.14.1
* libvirt-libs-8.0.0-150400.7.14.1
* libvirt-client-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.14.1
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-qemu-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.14.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.14.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libvirt-daemon-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.14.1
* libvirt-client-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-secret-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.14.1
* libvirt-daemon-driver-network-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.14.1
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-interface-8.0.0-150400.7.14.1
* libvirt-debugsource-8.0.0-150400.7.14.1
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.14.1
* libvirt-libs-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-8.0.0-150400.7.14.1
* libvirt-daemon-qemu-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.14.1
* libvirt-libs-8.0.0-150400.7.14.1
* libvirt-client-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.14.1
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-qemu-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.14.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.14.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libvirt-daemon-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.14.1
* libvirt-client-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-secret-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.14.1
* libvirt-daemon-driver-network-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.14.1
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-interface-8.0.0-150400.7.14.1
* libvirt-debugsource-8.0.0-150400.7.14.1
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.14.1
* libvirt-libs-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-8.0.0-150400.7.14.1
* libvirt-daemon-qemu-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.14.1
* libvirt-libs-8.0.0-150400.7.14.1
* libvirt-client-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.14.1
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-qemu-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.14.1
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.14.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.14.1
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.14.1
## References:
* https://www.suse.com/security/cve/CVE-2025-12748.html
* https://www.suse.com/security/cve/CVE-2025-13193.html
* https://bugzilla.suse.com/show_bug.cgi?id=1251822
* https://bugzilla.suse.com/show_bug.cgi?id=1253278
* https://bugzilla.suse.com/show_bug.cgi?id=1253703
SUSE-SU-2026:0383-1: moderate: Security update for rekor
# Security update for rekor
Announcement ID: SUSE-SU-2026:0383-1
Release Date: 2026-02-04T12:46:33Z
Rating: moderate
References:
* bsc#1241153
* bsc#1248910
* jsc#SLE-23476
Cross-References:
* CVE-2025-29923
* CVE-2025-58058
CVSS scores:
* CVE-2025-29923 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-29923 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-58058 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58058 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58058 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves two vulnerabilities and contains one feature can now be
installed.
## Description:
This update for rekor fixes the following issues:
Security fixes:
* CVE-2025-58058: Fixed github.com/ulikunitz/xz leaks memory (bsc#1248910)
* CVE-2025-29923: Fixed potential out of order responses when `CLIENT SETINFO`
times out during connection establishment (bsc#1241153)
Other fixes:
* Update to version 1.4.3
* Update to version 1.4.2
* Update to version 1.4.1 (jsc#SLE-23476)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-383=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-383=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-383=1
## Package List:
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* rekor-1.4.3-150400.4.28.1
* rekor-debuginfo-1.4.3-150400.4.28.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* rekor-1.4.3-150400.4.28.1
* rekor-debuginfo-1.4.3-150400.4.28.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* rekor-1.4.3-150400.4.28.1
* rekor-debuginfo-1.4.3-150400.4.28.1
## References:
* https://www.suse.com/security/cve/CVE-2025-29923.html
* https://www.suse.com/security/cve/CVE-2025-58058.html
* https://bugzilla.suse.com/show_bug.cgi?id=1241153
* https://bugzilla.suse.com/show_bug.cgi?id=1248910
* https://jira.suse.com/browse/SLE-23476
openSUSE-SU-2026:10139-1: moderate: libsoup-3_0-0-3.6.5-12.1 on GA media
# libsoup-3_0-0-3.6.5-12.1 on GA media
Announcement ID: openSUSE-SU-2026:10139-1
Rating: moderate
Cross-References:
* CVE-2026-1536
* CVE-2026-1761
CVSS scores:
* CVE-2026-1536 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
* CVE-2026-1536 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N
* CVE-2026-1761 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-1761 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the libsoup-3_0-0-3.6.5-12.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libsoup-3_0-0 3.6.5-12.1
* libsoup-3_0-0-32bit 3.6.5-12.1
* libsoup-devel 3.6.5-12.1
* libsoup-devel-32bit 3.6.5-12.1
* libsoup-lang 3.6.5-12.1
* typelib-1_0-Soup-3_0 3.6.5-12.1
## References:
* https://www.suse.com/security/cve/CVE-2026-1536.html
* https://www.suse.com/security/cve/CVE-2026-1761.html
openSUSE-SU-2026:10140-1: moderate: patch-2.8-2.1 on GA media
# patch-2.8-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10140-1
Rating: moderate
Cross-References:
* CVE-2021-45261
CVSS scores:
* CVE-2021-45261 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the patch-2.8-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* patch 2.8-2.1
## References:
* https://www.suse.com/security/cve/CVE-2021-45261.html
openSUSE-SU-2026:10135-1: moderate: java-1_8_0-openj9-1.8.0.482-1.1 on GA media
# java-1_8_0-openj9-1.8.0.482-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10135-1
Rating: moderate
Cross-References:
* CVE-2026-21925
* CVE-2026-21933
CVSS scores:
* CVE-2026-21925 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21933 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.482-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* java-1_8_0-openj9 1.8.0.482-1.1
* java-1_8_0-openj9-accessibility 1.8.0.482-1.1
* java-1_8_0-openj9-demo 1.8.0.482-1.1
* java-1_8_0-openj9-devel 1.8.0.482-1.1
* java-1_8_0-openj9-headless 1.8.0.482-1.1
* java-1_8_0-openj9-javadoc 1.8.0.482-1.1
* java-1_8_0-openj9-src 1.8.0.482-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-21925.html
* https://www.suse.com/security/cve/CVE-2026-21933.html
openSUSE-SU-2026:10141-1: moderate: rizin-0.8.2-1.1 on GA media
# rizin-0.8.2-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10141-1
Rating: moderate
Cross-References:
* CVE-2026-22780
CVSS scores:
* CVE-2026-22780 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the rizin-0.8.2-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* rizin 0.8.2-1.1
* rizin-common 0.8.2-1.1
* rizin-devel 0.8.2-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-22780.html
openSUSE-SU-2026:10136-1: moderate: java-1_8_0-openjdk-1.8.0.482-1.1 on GA media
# java-1_8_0-openjdk-1.8.0.482-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10136-1
Rating: moderate
Cross-References:
* CVE-2026-21925
* CVE-2026-21932
* CVE-2026-21933
* CVE-2026-21945
CVSS scores:
* CVE-2026-21925 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21932 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
* CVE-2026-21933 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-21945 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves 4 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.482-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* java-1_8_0-openjdk 1.8.0.482-1.1
* java-1_8_0-openjdk-accessibility 1.8.0.482-1.1
* java-1_8_0-openjdk-demo 1.8.0.482-1.1
* java-1_8_0-openjdk-devel 1.8.0.482-1.1
* java-1_8_0-openjdk-headless 1.8.0.482-1.1
* java-1_8_0-openjdk-javadoc 1.8.0.482-1.1
* java-1_8_0-openjdk-src 1.8.0.482-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-21925.html
* https://www.suse.com/security/cve/CVE-2026-21932.html
* https://www.suse.com/security/cve/CVE-2026-21933.html
* https://www.suse.com/security/cve/CVE-2026-21945.html
openSUSE-SU-2026:10134-1: moderate: java-17-openj9-17.0.18.0-1.1 on GA media
# java-17-openj9-17.0.18.0-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10134-1
Rating: moderate
Cross-References:
* CVE-2026-21925
* CVE-2026-21933
CVSS scores:
* CVE-2026-21925 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21933 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the java-17-openj9-17.0.18.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* java-17-openj9 17.0.18.0-1.1
* java-17-openj9-demo 17.0.18.0-1.1
* java-17-openj9-devel 17.0.18.0-1.1
* java-17-openj9-headless 17.0.18.0-1.1
* java-17-openj9-javadoc 17.0.18.0-1.1
* java-17-openj9-jmods 17.0.18.0-1.1
* java-17-openj9-src 17.0.18.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-21925.html
* https://www.suse.com/security/cve/CVE-2026-21933.html
openSUSE-SU-2026:10133-1: moderate: java-11-openj9-11.0.30.0-1.1 on GA media
# java-11-openj9-11.0.30.0-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10133-1
Rating: moderate
Cross-References:
* CVE-2026-21925
* CVE-2026-21933
CVSS scores:
* CVE-2026-21925 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21933 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the java-11-openj9-11.0.30.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* java-11-openj9 11.0.30.0-1.1
* java-11-openj9-demo 11.0.30.0-1.1
* java-11-openj9-devel 11.0.30.0-1.1
* java-11-openj9-headless 11.0.30.0-1.1
* java-11-openj9-javadoc 11.0.30.0-1.1
* java-11-openj9-jmods 11.0.30.0-1.1
* java-11-openj9-src 11.0.30.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-21925.html
* https://www.suse.com/security/cve/CVE-2026-21933.html
openSUSE-SU-2026:10137-1: moderate: java-21-openj9-21.0.10.0-1.1 on GA media
# java-21-openj9-21.0.10.0-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10137-1
Rating: moderate
Cross-References:
* CVE-2026-21925
* CVE-2026-21933
CVSS scores:
* CVE-2026-21925 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21933 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the java-21-openj9-21.0.10.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* java-21-openj9 21.0.10.0-1.1
* java-21-openj9-demo 21.0.10.0-1.1
* java-21-openj9-devel 21.0.10.0-1.1
* java-21-openj9-headless 21.0.10.0-1.1
* java-21-openj9-javadoc 21.0.10.0-1.1
* java-21-openj9-jmods 21.0.10.0-1.1
* java-21-openj9-src 21.0.10.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-21925.html
* https://www.suse.com/security/cve/CVE-2026-21933.html
openSUSE-SU-2026:10132-1: moderate: freerdp-3.22.0-1.1 on GA media
# freerdp-3.22.0-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10132-1
Rating: moderate
Cross-References:
* CVE-2026-23948
* CVE-2026-24491
* CVE-2026-24675
* CVE-2026-24676
* CVE-2026-24677
* CVE-2026-24678
* CVE-2026-24679
* CVE-2026-24680
* CVE-2026-24681
* CVE-2026-24682
* CVE-2026-24683
* CVE-2026-24684
Affected Products:
* openSUSE Tumbleweed
An update that solves 12 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the freerdp-3.22.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* freerdp 3.22.0-1.1
* freerdp-devel 3.22.0-1.1
* freerdp-proxy 3.22.0-1.1
* freerdp-proxy-plugins 3.22.0-1.1
* freerdp-sdl 3.22.0-1.1
* freerdp-server 3.22.0-1.1
* freerdp-wayland 3.22.0-1.1
* libfreerdp-server-proxy3-3 3.22.0-1.1
* libfreerdp3-3 3.22.0-1.1
* librdtk0-0 3.22.0-1.1
* libuwac0-0 3.22.0-1.1
* libwinpr3-3 3.22.0-1.1
* rdtk0-devel 3.22.0-1.1
* uwac0-devel 3.22.0-1.1
* winpr-devel 3.22.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-23948.html
* https://www.suse.com/security/cve/CVE-2026-24491.html
* https://www.suse.com/security/cve/CVE-2026-24675.html
* https://www.suse.com/security/cve/CVE-2026-24676.html
* https://www.suse.com/security/cve/CVE-2026-24677.html
* https://www.suse.com/security/cve/CVE-2026-24678.html
* https://www.suse.com/security/cve/CVE-2026-24679.html
* https://www.suse.com/security/cve/CVE-2026-24680.html
* https://www.suse.com/security/cve/CVE-2026-24681.html
* https://www.suse.com/security/cve/CVE-2026-24682.html
* https://www.suse.com/security/cve/CVE-2026-24683.html
* https://www.suse.com/security/cve/CVE-2026-24684.html
SUSE-SU-2026:0381-1: moderate: Security update for abseil-cpp
# Security update for abseil-cpp
Announcement ID: SUSE-SU-2026:0381-1
Release Date: 2026-02-04T09:34:54Z
Rating: moderate
References:
* bsc#1237543
Cross-References:
* CVE-2025-0838
CVSS scores:
* CVE-2025-0838 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:A/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L
* CVE-2025-0838 ( SUSE ): 5.6 CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L
* CVE-2025-0838 ( NVD ): 5.9
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:A/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-0838 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.4
An update that solves one vulnerability can now be installed.
## Description:
This update for abseil-cpp fixes the following issues:
Update to 20240116.3
* CVE-2025-0838: Fixed potential integer overflow in hash container
create/resize (bsc#1237543).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-381=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-381=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-381=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-381=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* abseil-cpp-debugsource-20240116.3-150500.13.10.1
* libabsl2401_0_0-20240116.3-150500.13.10.1
* abseil-cpp-devel-20240116.3-150500.13.10.1
* libabsl2401_0_0-debuginfo-20240116.3-150500.13.10.1
* openSUSE Leap 15.5 (x86_64)
* libabsl2401_0_0-32bit-debuginfo-20240116.3-150500.13.10.1
* libabsl2401_0_0-32bit-20240116.3-150500.13.10.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libabsl2401_0_0-64bit-20240116.3-150500.13.10.1
* libabsl2401_0_0-64bit-debuginfo-20240116.3-150500.13.10.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* abseil-cpp-debugsource-20240116.3-150500.13.10.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* abseil-cpp-debugsource-20240116.3-150500.13.10.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* abseil-cpp-debugsource-20240116.3-150500.13.10.1
* libabsl2401_0_0-20240116.3-150500.13.10.1
## References:
* https://www.suse.com/security/cve/CVE-2025-0838.html
* https://bugzilla.suse.com/show_bug.cgi?id=1237543
openSUSE-SU-2026:20167-1: important: Security update for xrdp
openSUSE security update: security update for xrdp
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20167-1
Rating: important
References:
* bsc#1257362
Cross-References:
* CVE-2025-68670
CVSS scores:
* CVE-2025-68670 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68670 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for xrdp fixes the following issues:
Changes in xrdp:
- CVE-2025-68670: Fixed a potential overflow (bsc#1257362).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-packagehub-105=1
Package List:
- openSUSE Leap 16.0:
libpainter0-0.9.26-bp160.2.1
librfxencode0-0.9.26-bp160.2.1
xrdp-0.9.26-bp160.2.1
xrdp-devel-0.9.26-bp160.2.1
References:
* https://www.suse.com/security/cve/CVE-2025-68670.html