SUSE 5627 Published by

SUSE has released a batch of security patches addressing multiple vulnerabilities across essential software packages like flatpak, podman, openssl-1_1, and gdk-pixbuf. These updates tackle critical flaws ranging from sandbox escape risks in container tools to denial of service attacks triggered by malformed images or crafted network messages. Administrators managing SUSE Linux Enterprise Server, openSUSE Leap, or Tumbleweed systems should apply these fixes immediately using zypper patch or YaST to prevent potential system compromise. The patches also include routine version bumps and bug corrections for utilities like kea and python-multipart alongside the primary security hardening measures.

openSUSE-SU-2026:20590-1: moderate: Security update for gnome-remote-desktop
openSUSE-SU-2026:20598-1: moderate: Security update for python-PyPDF2
SUSE-SU-2026:1541-1: important: Security update for flatpak
SUSE-SU-2026:1540-1: important: Security update for podman
SUSE-SU-2026:1539-1: important: Security update for gdk-pixbuf
SUSE-SU-2026:1544-1: moderate: Security update for python-python-multipart
SUSE-SU-2026:1548-1: important: Security update for kea
SUSE-SU-2026:1550-1: moderate: Security update for openssl-1_1
openSUSE-SU-2026:10593-1: moderate: openCryptoki-3.26.0-6.1 on GA media
openSUSE-SU-2026:10591-1: moderate: kissfft-131.2.0-2.1 on GA media
openSUSE-SU-2026:10585-1: moderate: GraphicsMagick-1.3.46-6.1 on GA media




openSUSE-SU-2026:20590-1: moderate: Security update for gnome-remote-desktop


openSUSE security update: security update for gnome-remote-desktop
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20590-1
Rating: moderate
References:

* bsc#1244053

Cross-References:

* CVE-2025-5024

CVSS scores:

* CVE-2025-5024 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H
* CVE-2025-5024 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for gnome-remote-desktop fixes the following issues:

Update to version 48.3.

Security issues fixed:

- CVE-2025-5024: an unauthenticated attacker can exhaust system resources (bsc#1244053).

Other updates and bugfixes:

- Version update to 48.3:

+ Fix image corruption on some NVIDIA GPUs.

- Version upadte to 48.2:

+ Handle Vulkan dma-buf format compatibility issues.

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-600=1

Package List:

- openSUSE Leap 16.0:

gnome-remote-desktop-48.3-160000.1.1
gnome-remote-desktop-lang-48.3-160000.1.1

References:

* https://www.suse.com/security/cve/CVE-2025-5024.html



openSUSE-SU-2026:20598-1: moderate: Security update for python-PyPDF2


openSUSE security update: security update for python-pypdf2
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20598-1
Rating: moderate
References:

* bsc#1262284

Cross-References:

* CVE-2026-40260

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for python-PyPDF2 fixes the following issues:

Changes in python-PyPDF2:

- CVE-2026-40260: crafted PDF can lead to large memory usage (bsc#1262284)

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-packagehub-208=1

Package List:

- openSUSE Leap 16.0:

python313-PyPDF2-2.11.1-bp160.6.1

References:

* https://www.suse.com/security/cve/CVE-2026-40260.html



SUSE-SU-2026:1541-1: important: Security update for flatpak


# Security update for flatpak

Announcement ID: SUSE-SU-2026:1541-1
Release Date: 2026-04-22T07:22:36Z
Rating: important
References:

* bsc#1261769
* bsc#1261770

Cross-References:

* CVE-2026-34078
* CVE-2026-34079

CVSS scores:

* CVE-2026-34078 ( SUSE ): 6.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
* CVE-2026-34078 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-34078 ( NVD ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34079 ( SUSE ): 4.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N
* CVE-2026-34079 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:L
* CVE-2026-34079 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34079 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-34079 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves two vulnerabilities can now be installed.

## Description:

This update for flatpak fixes the following issues:

* CVE-2026-34078: improper processing of app-controlled symlinks by sandbox-
expose can lead to sandbox escape, host file access and code execution in
the host context (bsc#1261769).
* CVE-2026-34079: improper removal of outdated cache files allows for
arbitrary file deletion on the host filesystem (bsc#1261770).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1541=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1541=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1541=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1541=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1541=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libflatpak0-1.16.0-150500.3.18.1
* flatpak-debuginfo-1.16.0-150500.3.18.1
* flatpak-debugsource-1.16.0-150500.3.18.1
* flatpak-devel-1.16.0-150500.3.18.1
* flatpak-1.16.0-150500.3.18.1
* libflatpak0-debuginfo-1.16.0-150500.3.18.1
* typelib-1_0-Flatpak-1_0-1.16.0-150500.3.18.1
* openSUSE Leap 15.5 (noarch)
* flatpak-zsh-completion-1.16.0-150500.3.18.1
* flatpak-remote-flathub-1.16.0-150500.3.18.1
* system-user-flatpak-1.16.0-150500.3.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libflatpak0-1.16.0-150500.3.18.1
* flatpak-debuginfo-1.16.0-150500.3.18.1
* flatpak-debugsource-1.16.0-150500.3.18.1
* flatpak-devel-1.16.0-150500.3.18.1
* flatpak-1.16.0-150500.3.18.1
* libflatpak0-debuginfo-1.16.0-150500.3.18.1
* typelib-1_0-Flatpak-1_0-1.16.0-150500.3.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* flatpak-zsh-completion-1.16.0-150500.3.18.1
* flatpak-remote-flathub-1.16.0-150500.3.18.1
* system-user-flatpak-1.16.0-150500.3.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libflatpak0-1.16.0-150500.3.18.1
* flatpak-debuginfo-1.16.0-150500.3.18.1
* flatpak-debugsource-1.16.0-150500.3.18.1
* flatpak-devel-1.16.0-150500.3.18.1
* flatpak-1.16.0-150500.3.18.1
* libflatpak0-debuginfo-1.16.0-150500.3.18.1
* typelib-1_0-Flatpak-1_0-1.16.0-150500.3.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* flatpak-zsh-completion-1.16.0-150500.3.18.1
* flatpak-remote-flathub-1.16.0-150500.3.18.1
* system-user-flatpak-1.16.0-150500.3.18.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libflatpak0-1.16.0-150500.3.18.1
* flatpak-debuginfo-1.16.0-150500.3.18.1
* flatpak-debugsource-1.16.0-150500.3.18.1
* flatpak-devel-1.16.0-150500.3.18.1
* flatpak-1.16.0-150500.3.18.1
* libflatpak0-debuginfo-1.16.0-150500.3.18.1
* typelib-1_0-Flatpak-1_0-1.16.0-150500.3.18.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* flatpak-zsh-completion-1.16.0-150500.3.18.1
* flatpak-remote-flathub-1.16.0-150500.3.18.1
* system-user-flatpak-1.16.0-150500.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libflatpak0-1.16.0-150500.3.18.1
* flatpak-debuginfo-1.16.0-150500.3.18.1
* flatpak-debugsource-1.16.0-150500.3.18.1
* flatpak-devel-1.16.0-150500.3.18.1
* flatpak-1.16.0-150500.3.18.1
* libflatpak0-debuginfo-1.16.0-150500.3.18.1
* typelib-1_0-Flatpak-1_0-1.16.0-150500.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* flatpak-zsh-completion-1.16.0-150500.3.18.1
* flatpak-remote-flathub-1.16.0-150500.3.18.1
* system-user-flatpak-1.16.0-150500.3.18.1

## References:

* https://www.suse.com/security/cve/CVE-2026-34078.html
* https://www.suse.com/security/cve/CVE-2026-34079.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261769
* https://bugzilla.suse.com/show_bug.cgi?id=1261770



SUSE-SU-2026:1540-1: important: Security update for podman


# Security update for podman

Announcement ID: SUSE-SU-2026:1540-1
Release Date: 2026-04-22T07:22:19Z
Rating: important
References:

Affected Products:

* Containers Module 15-SP7
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that can now be installed.

## Description:

This update for podman rebuilds it against the current go 1.25 security release.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1540=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1540=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1540=1

* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-1540=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1540=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1540=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1540=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1540=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1540=1

## Package List:

* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* podman-docker-4.9.5-150500.3.67.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* openSUSE Leap 15.5 (noarch)
* podman-docker-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* podman-docker-4.9.5-150500.3.67.1
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* Containers Module 15-SP7 (noarch)
* podman-docker-4.9.5-150500.3.67.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* podman-docker-4.9.5-150500.3.67.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* podman-docker-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* podman-docker-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* podman-docker-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* podman-docker-4.9.5-150500.3.67.1



SUSE-SU-2026:1539-1: important: Security update for gdk-pixbuf


# Security update for gdk-pixbuf

Announcement ID: SUSE-SU-2026:1539-1
Release Date: 2026-04-22T07:20:58Z
Rating: important
References:

* bsc#1261210

Cross-References:

* CVE-2026-5201

CVSS scores:

* CVE-2026-5201 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-5201 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-5201 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for gdk-pixbuf fixes the following issue:

* CVE-2026-5201: Denial of Service via heap-based buffer overflow when
processing a specially crafted JPEG image (bsc#1261210).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1539=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1539=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1539=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1539=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1539=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1539=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1539=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1539=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1539=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1539=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1539=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1539=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1539=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1539=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* openSUSE Leap 15.4 (x86_64)
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-32bit-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* openSUSE Leap 15.4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* gdk-pixbuf-devel-64bit-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-64bit-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-64bit-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-64bit-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-64bit-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-64bit-debuginfo-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1

## References:

* https://www.suse.com/security/cve/CVE-2026-5201.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261210



SUSE-SU-2026:1544-1: moderate: Security update for python-python-multipart


# Security update for python-python-multipart

Announcement ID: SUSE-SU-2026:1544-1
Release Date: 2026-04-22T07:22:55Z
Rating: moderate
References:

* bsc#1262403

Cross-References:

* CVE-2026-40347

CVSS scores:

* CVE-2026-40347 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-40347 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-40347 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.6

An update that solves one vulnerability can now be installed.

## Description:

This update for python-python-multipart fixes the following issue:

* CVE-2026-40347: crafted `multipart/form-data` can cause a denial of service
(bsc#1262403).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1544=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* python311-python-multipart-0.0.9-150600.3.9.1

## References:

* https://www.suse.com/security/cve/CVE-2026-40347.html
* https://bugzilla.suse.com/show_bug.cgi?id=1262403



SUSE-SU-2026:1548-1: important: Security update for kea


# Security update for kea

Announcement ID: SUSE-SU-2026:1548-1
Release Date: 2026-04-22T09:40:51Z
Rating: important
References:

* bsc#1260380

Cross-References:

* CVE-2026-3608

CVSS scores:

* CVE-2026-3608 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-3608 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-3608 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for kea fixes the following issues:

Update to release 2.6.5.

Security issues fixed:

* CVE-2026-3608: stack overflow error via specially crafted message to the
kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, or kea-dhcp6 daemons(bsc#1260380).

Other updates and bugfixes:

* A null dereference is now no longer possible when configuring the Control
Agent with a socket that lacks the mandatory socket-name entry.
* UNIX sockets are now created as group-writable.
* Corrected an issue in logging configuration when parsing "syslog:".
* Fixed crash when handling misconfigured global reservations.
* Support for recent versions of Sphinx has been added.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1548=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1548=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1548=1

## Package List:

* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libkea-log61-2.6.5-150600.13.9.1
* libkea-pgsql71-debuginfo-2.6.5-150600.13.9.1
* libkea-asiodns49-2.6.5-150600.13.9.1
* libkea-pgsql71-2.6.5-150600.13.9.1
* libkea-hooks102-2.6.5-150600.13.9.1
* kea-devel-2.6.5-150600.13.9.1
* kea-hooks-debuginfo-2.6.5-150600.13.9.1
* libkea-cryptolink50-2.6.5-150600.13.9.1
* libkea-cc69-debuginfo-2.6.5-150600.13.9.1
* libkea-http72-2.6.5-150600.13.9.1
* kea-debuginfo-2.6.5-150600.13.9.1
* libkea-d2srv47-2.6.5-150600.13.9.1
* libkea-http72-debuginfo-2.6.5-150600.13.9.1
* libkea-stats41-debuginfo-2.6.5-150600.13.9.1
* libkea-eval69-2.6.5-150600.13.9.1
* libkea-exceptions33-2.6.5-150600.13.9.1
* python3-kea-2.6.5-150600.13.9.1
* libkea-exceptions33-debuginfo-2.6.5-150600.13.9.1
* libkea-asiodns49-debuginfo-2.6.5-150600.13.9.1
* libkea-cfgclient67-2.6.5-150600.13.9.1
* libkea-database62-debuginfo-2.6.5-150600.13.9.1
* libkea-tcp19-debuginfo-2.6.5-150600.13.9.1
* libkea-util87-debuginfo-2.6.5-150600.13.9.1
* libkea-dhcpsrv112-debuginfo-2.6.5-150600.13.9.1
* libkea-hooks102-debuginfo-2.6.5-150600.13.9.1
* libkea-asiolink72-2.6.5-150600.13.9.1
* libkea-dhcp_ddns57-debuginfo-2.6.5-150600.13.9.1
* libkea-util-io0-2.6.5-150600.13.9.1
* libkea-dns++57-debuginfo-2.6.5-150600.13.9.1
* libkea-mysql71-2.6.5-150600.13.9.1
* libkea-mysql71-debuginfo-2.6.5-150600.13.9.1
* kea-2.6.5-150600.13.9.1
* libkea-eval69-debuginfo-2.6.5-150600.13.9.1
* libkea-util-io0-debuginfo-2.6.5-150600.13.9.1
* libkea-database62-2.6.5-150600.13.9.1
* libkea-d2srv47-debuginfo-2.6.5-150600.13.9.1
* libkea-stats41-2.6.5-150600.13.9.1
* libkea-dns++57-2.6.5-150600.13.9.1
* libkea-process76-debuginfo-2.6.5-150600.13.9.1
* libkea-tcp19-2.6.5-150600.13.9.1
* libkea-dhcp_ddns57-2.6.5-150600.13.9.1
* libkea-util87-2.6.5-150600.13.9.1
* libkea-log61-debuginfo-2.6.5-150600.13.9.1
* libkea-cryptolink50-debuginfo-2.6.5-150600.13.9.1
* libkea-asiolink72-debuginfo-2.6.5-150600.13.9.1
* kea-debugsource-2.6.5-150600.13.9.1
* libkea-dhcpsrv112-2.6.5-150600.13.9.1
* libkea-dhcp++92-2.6.5-150600.13.9.1
* kea-hooks-2.6.5-150600.13.9.1
* libkea-cc69-2.6.5-150600.13.9.1
* libkea-cfgclient67-debuginfo-2.6.5-150600.13.9.1
* libkea-process76-2.6.5-150600.13.9.1
* libkea-dhcp++92-debuginfo-2.6.5-150600.13.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* kea-doc-2.6.5-150600.13.9.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libkea-log61-2.6.5-150600.13.9.1
* libkea-pgsql71-debuginfo-2.6.5-150600.13.9.1
* libkea-asiodns49-2.6.5-150600.13.9.1
* libkea-pgsql71-2.6.5-150600.13.9.1
* libkea-hooks102-2.6.5-150600.13.9.1
* kea-devel-2.6.5-150600.13.9.1
* kea-hooks-debuginfo-2.6.5-150600.13.9.1
* libkea-cryptolink50-2.6.5-150600.13.9.1
* libkea-cc69-debuginfo-2.6.5-150600.13.9.1
* libkea-http72-2.6.5-150600.13.9.1
* kea-debuginfo-2.6.5-150600.13.9.1
* libkea-d2srv47-2.6.5-150600.13.9.1
* libkea-http72-debuginfo-2.6.5-150600.13.9.1
* libkea-stats41-debuginfo-2.6.5-150600.13.9.1
* libkea-eval69-2.6.5-150600.13.9.1
* libkea-exceptions33-2.6.5-150600.13.9.1
* python3-kea-2.6.5-150600.13.9.1
* libkea-exceptions33-debuginfo-2.6.5-150600.13.9.1
* libkea-asiodns49-debuginfo-2.6.5-150600.13.9.1
* libkea-cfgclient67-2.6.5-150600.13.9.1
* libkea-database62-debuginfo-2.6.5-150600.13.9.1
* libkea-tcp19-debuginfo-2.6.5-150600.13.9.1
* libkea-util87-debuginfo-2.6.5-150600.13.9.1
* libkea-dhcpsrv112-debuginfo-2.6.5-150600.13.9.1
* libkea-hooks102-debuginfo-2.6.5-150600.13.9.1
* libkea-asiolink72-2.6.5-150600.13.9.1
* libkea-dhcp_ddns57-debuginfo-2.6.5-150600.13.9.1
* libkea-util-io0-2.6.5-150600.13.9.1
* libkea-dns++57-debuginfo-2.6.5-150600.13.9.1
* libkea-mysql71-2.6.5-150600.13.9.1
* libkea-mysql71-debuginfo-2.6.5-150600.13.9.1
* kea-2.6.5-150600.13.9.1
* libkea-eval69-debuginfo-2.6.5-150600.13.9.1
* libkea-util-io0-debuginfo-2.6.5-150600.13.9.1
* libkea-database62-2.6.5-150600.13.9.1
* libkea-d2srv47-debuginfo-2.6.5-150600.13.9.1
* libkea-stats41-2.6.5-150600.13.9.1
* libkea-dns++57-2.6.5-150600.13.9.1
* libkea-process76-debuginfo-2.6.5-150600.13.9.1
* libkea-tcp19-2.6.5-150600.13.9.1
* libkea-dhcp_ddns57-2.6.5-150600.13.9.1
* libkea-util87-2.6.5-150600.13.9.1
* libkea-log61-debuginfo-2.6.5-150600.13.9.1
* libkea-cryptolink50-debuginfo-2.6.5-150600.13.9.1
* libkea-asiolink72-debuginfo-2.6.5-150600.13.9.1
* kea-debugsource-2.6.5-150600.13.9.1
* libkea-dhcpsrv112-2.6.5-150600.13.9.1
* libkea-dhcp++92-2.6.5-150600.13.9.1
* kea-hooks-2.6.5-150600.13.9.1
* libkea-cc69-2.6.5-150600.13.9.1
* libkea-cfgclient67-debuginfo-2.6.5-150600.13.9.1
* libkea-process76-2.6.5-150600.13.9.1
* libkea-dhcp++92-debuginfo-2.6.5-150600.13.9.1
* openSUSE Leap 15.6 (noarch)
* kea-doc-2.6.5-150600.13.9.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libkea-log61-2.6.5-150600.13.9.1
* libkea-pgsql71-debuginfo-2.6.5-150600.13.9.1
* libkea-asiodns49-2.6.5-150600.13.9.1
* libkea-pgsql71-2.6.5-150600.13.9.1
* libkea-hooks102-2.6.5-150600.13.9.1
* kea-devel-2.6.5-150600.13.9.1
* kea-hooks-debuginfo-2.6.5-150600.13.9.1
* libkea-cryptolink50-2.6.5-150600.13.9.1
* libkea-cc69-debuginfo-2.6.5-150600.13.9.1
* libkea-http72-2.6.5-150600.13.9.1
* kea-debuginfo-2.6.5-150600.13.9.1
* libkea-d2srv47-2.6.5-150600.13.9.1
* libkea-http72-debuginfo-2.6.5-150600.13.9.1
* libkea-stats41-debuginfo-2.6.5-150600.13.9.1
* libkea-eval69-2.6.5-150600.13.9.1
* libkea-exceptions33-2.6.5-150600.13.9.1
* python3-kea-2.6.5-150600.13.9.1
* libkea-exceptions33-debuginfo-2.6.5-150600.13.9.1
* libkea-asiodns49-debuginfo-2.6.5-150600.13.9.1
* libkea-cfgclient67-2.6.5-150600.13.9.1
* libkea-database62-debuginfo-2.6.5-150600.13.9.1
* libkea-tcp19-debuginfo-2.6.5-150600.13.9.1
* libkea-util87-debuginfo-2.6.5-150600.13.9.1
* libkea-dhcpsrv112-debuginfo-2.6.5-150600.13.9.1
* libkea-hooks102-debuginfo-2.6.5-150600.13.9.1
* libkea-asiolink72-2.6.5-150600.13.9.1
* libkea-dhcp_ddns57-debuginfo-2.6.5-150600.13.9.1
* libkea-util-io0-2.6.5-150600.13.9.1
* libkea-dns++57-debuginfo-2.6.5-150600.13.9.1
* libkea-mysql71-2.6.5-150600.13.9.1
* libkea-mysql71-debuginfo-2.6.5-150600.13.9.1
* kea-2.6.5-150600.13.9.1
* libkea-eval69-debuginfo-2.6.5-150600.13.9.1
* libkea-util-io0-debuginfo-2.6.5-150600.13.9.1
* libkea-database62-2.6.5-150600.13.9.1
* libkea-d2srv47-debuginfo-2.6.5-150600.13.9.1
* libkea-stats41-2.6.5-150600.13.9.1
* libkea-dns++57-2.6.5-150600.13.9.1
* libkea-process76-debuginfo-2.6.5-150600.13.9.1
* libkea-tcp19-2.6.5-150600.13.9.1
* libkea-dhcp_ddns57-2.6.5-150600.13.9.1
* libkea-util87-2.6.5-150600.13.9.1
* libkea-log61-debuginfo-2.6.5-150600.13.9.1
* libkea-cryptolink50-debuginfo-2.6.5-150600.13.9.1
* libkea-asiolink72-debuginfo-2.6.5-150600.13.9.1
* kea-debugsource-2.6.5-150600.13.9.1
* libkea-dhcpsrv112-2.6.5-150600.13.9.1
* libkea-dhcp++92-2.6.5-150600.13.9.1
* kea-hooks-2.6.5-150600.13.9.1
* libkea-cc69-2.6.5-150600.13.9.1
* libkea-cfgclient67-debuginfo-2.6.5-150600.13.9.1
* libkea-process76-2.6.5-150600.13.9.1
* libkea-dhcp++92-debuginfo-2.6.5-150600.13.9.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* kea-doc-2.6.5-150600.13.9.1

## References:

* https://www.suse.com/security/cve/CVE-2026-3608.html
* https://bugzilla.suse.com/show_bug.cgi?id=1260380



SUSE-SU-2026:1550-1: moderate: Security update for openssl-1_1


# Security update for openssl-1_1

Announcement ID: SUSE-SU-2026:1550-1
Release Date: 2026-04-22T09:41:29Z
Rating: moderate
References:

* bsc#1261678

Cross-References:

* CVE-2026-28390

CVSS scores:

* CVE-2026-28390 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28390 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28390 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for openssl-1_1 fixes the following issues:

* CVE-2026-28390: NULL pointer dereference during processing of a crafted CMS
EnvelopedData message with KeyTransportRecipientInfo (bsc#1261678).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1550=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1550=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1550=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1550=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1550=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1550=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl-1_1-devel-1.1.1l-150500.17.54.1
* openssl-1_1-debugsource-1.1.1l-150500.17.54.1
* libopenssl1_1-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-1.1.1l-150500.17.54.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-1.1.1l-150500.17.54.1
* openSUSE Leap 15.5 (x86_64)
* libopenssl1_1-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-32bit-1.1.1l-150500.17.54.1
* libopenssl-1_1-devel-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.54.1
* openSUSE Leap 15.5 (noarch)
* openssl-1_1-doc-1.1.1l-150500.17.54.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libopenssl1_1-hmac-64bit-1.1.1l-150500.17.54.1
* libopenssl1_1-64bit-debuginfo-1.1.1l-150500.17.54.1
* libopenssl1_1-64bit-1.1.1l-150500.17.54.1
* libopenssl-1_1-devel-64bit-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libopenssl-1_1-devel-1.1.1l-150500.17.54.1
* openssl-1_1-debugsource-1.1.1l-150500.17.54.1
* libopenssl1_1-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-1.1.1l-150500.17.54.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libopenssl-1_1-devel-1.1.1l-150500.17.54.1
* openssl-1_1-debugsource-1.1.1l-150500.17.54.1
* libopenssl1_1-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-1.1.1l-150500.17.54.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64)
* libopenssl1_1-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libopenssl-1_1-devel-1.1.1l-150500.17.54.1
* openssl-1_1-debugsource-1.1.1l-150500.17.54.1
* libopenssl1_1-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-1.1.1l-150500.17.54.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64)
* libopenssl1_1-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libopenssl-1_1-devel-1.1.1l-150500.17.54.1
* openssl-1_1-debugsource-1.1.1l-150500.17.54.1
* libopenssl1_1-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-1.1.1l-150500.17.54.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* libopenssl1_1-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libopenssl-1_1-devel-1.1.1l-150500.17.54.1
* openssl-1_1-debugsource-1.1.1l-150500.17.54.1
* libopenssl1_1-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-1.1.1l-150500.17.54.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* libopenssl1_1-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.54.1

## References:

* https://www.suse.com/security/cve/CVE-2026-28390.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261678



openSUSE-SU-2026:10593-1: moderate: openCryptoki-3.26.0-6.1 on GA media


# openCryptoki-3.26.0-6.1 on GA media

Announcement ID: openSUSE-SU-2026:10593-1
Rating: moderate

Cross-References:

* CVE-2026-40253

CVSS scores:

* CVE-2026-40253 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-40253 ( SUSE ): 7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the openCryptoki-3.26.0-6.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* openCryptoki 3.26.0-6.1
* openCryptoki-64bit 3.26.0-6.1
* openCryptoki-devel 3.26.0-6.1

## References:

* https://www.suse.com/security/cve/CVE-2026-40253.html



openSUSE-SU-2026:10591-1: moderate: kissfft-131.2.0-2.1 on GA media


# kissfft-131.2.0-2.1 on GA media

Announcement ID: openSUSE-SU-2026:10591-1
Rating: moderate

Cross-References:

* CVE-2026-41445

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the kissfft-131.2.0-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* kissfft 131.2.0-2.1
* kissfft-devel 131.2.0-2.1
* libkissfft-float131 131.2.0-2.1

## References:

* https://www.suse.com/security/cve/CVE-2026-41445.html



openSUSE-SU-2026:10585-1: moderate: GraphicsMagick-1.3.46-6.1 on GA media


# GraphicsMagick-1.3.46-6.1 on GA media

Announcement ID: openSUSE-SU-2026:10585-1
Rating: moderate

Cross-References:

* CVE-2026-33535

CVSS scores:

* CVE-2026-33535 ( SUSE ): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the GraphicsMagick-1.3.46-6.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* GraphicsMagick 1.3.46-6.1
* GraphicsMagick-devel 1.3.46-6.1
* libGraphicsMagick++-Q16-12 1.3.46-6.1
* libGraphicsMagick++-devel 1.3.46-6.1
* libGraphicsMagick-Q16-3 1.3.46-6.1
* libGraphicsMagick3-config 1.3.46-6.1
* libGraphicsMagickWand-Q16-2 1.3.46-6.1
* perl-GraphicsMagick 1.3.46-6.1

## References:

* https://www.suse.com/security/cve/CVE-2026-33535.html