openSUSE-SU-2026:20590-1: moderate: Security update for gnome-remote-desktop
openSUSE-SU-2026:20598-1: moderate: Security update for python-PyPDF2
SUSE-SU-2026:1541-1: important: Security update for flatpak
SUSE-SU-2026:1540-1: important: Security update for podman
SUSE-SU-2026:1539-1: important: Security update for gdk-pixbuf
SUSE-SU-2026:1544-1: moderate: Security update for python-python-multipart
SUSE-SU-2026:1548-1: important: Security update for kea
SUSE-SU-2026:1550-1: moderate: Security update for openssl-1_1
openSUSE-SU-2026:10593-1: moderate: openCryptoki-3.26.0-6.1 on GA media
openSUSE-SU-2026:10591-1: moderate: kissfft-131.2.0-2.1 on GA media
openSUSE-SU-2026:10585-1: moderate: GraphicsMagick-1.3.46-6.1 on GA media
openSUSE-SU-2026:20590-1: moderate: Security update for gnome-remote-desktop
openSUSE security update: security update for gnome-remote-desktop
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20590-1
Rating: moderate
References:
* bsc#1244053
Cross-References:
* CVE-2025-5024
CVSS scores:
* CVE-2025-5024 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H
* CVE-2025-5024 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for gnome-remote-desktop fixes the following issues:
Update to version 48.3.
Security issues fixed:
- CVE-2025-5024: an unauthenticated attacker can exhaust system resources (bsc#1244053).
Other updates and bugfixes:
- Version update to 48.3:
+ Fix image corruption on some NVIDIA GPUs.
- Version upadte to 48.2:
+ Handle Vulkan dma-buf format compatibility issues.
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-600=1
Package List:
- openSUSE Leap 16.0:
gnome-remote-desktop-48.3-160000.1.1
gnome-remote-desktop-lang-48.3-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2025-5024.html
openSUSE-SU-2026:20598-1: moderate: Security update for python-PyPDF2
openSUSE security update: security update for python-pypdf2
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20598-1
Rating: moderate
References:
* bsc#1262284
Cross-References:
* CVE-2026-40260
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for python-PyPDF2 fixes the following issues:
Changes in python-PyPDF2:
- CVE-2026-40260: crafted PDF can lead to large memory usage (bsc#1262284)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-packagehub-208=1
Package List:
- openSUSE Leap 16.0:
python313-PyPDF2-2.11.1-bp160.6.1
References:
* https://www.suse.com/security/cve/CVE-2026-40260.html
SUSE-SU-2026:1541-1: important: Security update for flatpak
# Security update for flatpak
Announcement ID: SUSE-SU-2026:1541-1
Release Date: 2026-04-22T07:22:36Z
Rating: important
References:
* bsc#1261769
* bsc#1261770
Cross-References:
* CVE-2026-34078
* CVE-2026-34079
CVSS scores:
* CVE-2026-34078 ( SUSE ): 6.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
* CVE-2026-34078 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-34078 ( NVD ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34079 ( SUSE ): 4.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N
* CVE-2026-34079 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:L
* CVE-2026-34079 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34079 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-34079 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for flatpak fixes the following issues:
* CVE-2026-34078: improper processing of app-controlled symlinks by sandbox-
expose can lead to sandbox escape, host file access and code execution in
the host context (bsc#1261769).
* CVE-2026-34079: improper removal of outdated cache files allows for
arbitrary file deletion on the host filesystem (bsc#1261770).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1541=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1541=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1541=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1541=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1541=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libflatpak0-1.16.0-150500.3.18.1
* flatpak-debuginfo-1.16.0-150500.3.18.1
* flatpak-debugsource-1.16.0-150500.3.18.1
* flatpak-devel-1.16.0-150500.3.18.1
* flatpak-1.16.0-150500.3.18.1
* libflatpak0-debuginfo-1.16.0-150500.3.18.1
* typelib-1_0-Flatpak-1_0-1.16.0-150500.3.18.1
* openSUSE Leap 15.5 (noarch)
* flatpak-zsh-completion-1.16.0-150500.3.18.1
* flatpak-remote-flathub-1.16.0-150500.3.18.1
* system-user-flatpak-1.16.0-150500.3.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libflatpak0-1.16.0-150500.3.18.1
* flatpak-debuginfo-1.16.0-150500.3.18.1
* flatpak-debugsource-1.16.0-150500.3.18.1
* flatpak-devel-1.16.0-150500.3.18.1
* flatpak-1.16.0-150500.3.18.1
* libflatpak0-debuginfo-1.16.0-150500.3.18.1
* typelib-1_0-Flatpak-1_0-1.16.0-150500.3.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* flatpak-zsh-completion-1.16.0-150500.3.18.1
* flatpak-remote-flathub-1.16.0-150500.3.18.1
* system-user-flatpak-1.16.0-150500.3.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libflatpak0-1.16.0-150500.3.18.1
* flatpak-debuginfo-1.16.0-150500.3.18.1
* flatpak-debugsource-1.16.0-150500.3.18.1
* flatpak-devel-1.16.0-150500.3.18.1
* flatpak-1.16.0-150500.3.18.1
* libflatpak0-debuginfo-1.16.0-150500.3.18.1
* typelib-1_0-Flatpak-1_0-1.16.0-150500.3.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* flatpak-zsh-completion-1.16.0-150500.3.18.1
* flatpak-remote-flathub-1.16.0-150500.3.18.1
* system-user-flatpak-1.16.0-150500.3.18.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libflatpak0-1.16.0-150500.3.18.1
* flatpak-debuginfo-1.16.0-150500.3.18.1
* flatpak-debugsource-1.16.0-150500.3.18.1
* flatpak-devel-1.16.0-150500.3.18.1
* flatpak-1.16.0-150500.3.18.1
* libflatpak0-debuginfo-1.16.0-150500.3.18.1
* typelib-1_0-Flatpak-1_0-1.16.0-150500.3.18.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* flatpak-zsh-completion-1.16.0-150500.3.18.1
* flatpak-remote-flathub-1.16.0-150500.3.18.1
* system-user-flatpak-1.16.0-150500.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libflatpak0-1.16.0-150500.3.18.1
* flatpak-debuginfo-1.16.0-150500.3.18.1
* flatpak-debugsource-1.16.0-150500.3.18.1
* flatpak-devel-1.16.0-150500.3.18.1
* flatpak-1.16.0-150500.3.18.1
* libflatpak0-debuginfo-1.16.0-150500.3.18.1
* typelib-1_0-Flatpak-1_0-1.16.0-150500.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* flatpak-zsh-completion-1.16.0-150500.3.18.1
* flatpak-remote-flathub-1.16.0-150500.3.18.1
* system-user-flatpak-1.16.0-150500.3.18.1
## References:
* https://www.suse.com/security/cve/CVE-2026-34078.html
* https://www.suse.com/security/cve/CVE-2026-34079.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261769
* https://bugzilla.suse.com/show_bug.cgi?id=1261770
SUSE-SU-2026:1540-1: important: Security update for podman
# Security update for podman
Announcement ID: SUSE-SU-2026:1540-1
Release Date: 2026-04-22T07:22:19Z
Rating: important
References:
Affected Products:
* Containers Module 15-SP7
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that can now be installed.
## Description:
This update for podman rebuilds it against the current go 1.25 security release.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1540=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1540=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1540=1
* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-1540=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1540=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1540=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1540=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1540=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1540=1
## Package List:
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* podman-docker-4.9.5-150500.3.67.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* openSUSE Leap 15.5 (noarch)
* podman-docker-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* podman-docker-4.9.5-150500.3.67.1
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* Containers Module 15-SP7 (noarch)
* podman-docker-4.9.5-150500.3.67.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* podman-docker-4.9.5-150500.3.67.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* podman-docker-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* podman-docker-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* podman-docker-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* podman-remote-4.9.5-150500.3.67.1
* podman-debuginfo-4.9.5-150500.3.67.1
* podman-remote-debuginfo-4.9.5-150500.3.67.1
* podman-4.9.5-150500.3.67.1
* podmansh-4.9.5-150500.3.67.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* podman-docker-4.9.5-150500.3.67.1
SUSE-SU-2026:1539-1: important: Security update for gdk-pixbuf
# Security update for gdk-pixbuf
Announcement ID: SUSE-SU-2026:1539-1
Release Date: 2026-04-22T07:20:58Z
Rating: important
References:
* bsc#1261210
Cross-References:
* CVE-2026-5201
CVSS scores:
* CVE-2026-5201 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-5201 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-5201 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for gdk-pixbuf fixes the following issue:
* CVE-2026-5201: Denial of Service via heap-based buffer overflow when
processing a specially crafted JPEG image (bsc#1261210).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1539=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1539=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1539=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1539=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1539=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1539=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1539=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1539=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1539=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1539=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1539=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1539=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1539=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1539=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* openSUSE Leap 15.4 (x86_64)
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-32bit-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* openSUSE Leap 15.4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* gdk-pixbuf-devel-64bit-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-64bit-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-64bit-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-64bit-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-64bit-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-64bit-debuginfo-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-2.42.12-150400.5.17.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.17.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.17.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.17.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.17.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.17.1
## References:
* https://www.suse.com/security/cve/CVE-2026-5201.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261210
SUSE-SU-2026:1544-1: moderate: Security update for python-python-multipart
# Security update for python-python-multipart
Announcement ID: SUSE-SU-2026:1544-1
Release Date: 2026-04-22T07:22:55Z
Rating: moderate
References:
* bsc#1262403
Cross-References:
* CVE-2026-40347
CVSS scores:
* CVE-2026-40347 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-40347 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-40347 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.6
An update that solves one vulnerability can now be installed.
## Description:
This update for python-python-multipart fixes the following issue:
* CVE-2026-40347: crafted `multipart/form-data` can cause a denial of service
(bsc#1262403).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1544=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* python311-python-multipart-0.0.9-150600.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2026-40347.html
* https://bugzilla.suse.com/show_bug.cgi?id=1262403
SUSE-SU-2026:1548-1: important: Security update for kea
# Security update for kea
Announcement ID: SUSE-SU-2026:1548-1
Release Date: 2026-04-22T09:40:51Z
Rating: important
References:
* bsc#1260380
Cross-References:
* CVE-2026-3608
CVSS scores:
* CVE-2026-3608 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-3608 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-3608 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for kea fixes the following issues:
Update to release 2.6.5.
Security issues fixed:
* CVE-2026-3608: stack overflow error via specially crafted message to the
kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, or kea-dhcp6 daemons(bsc#1260380).
Other updates and bugfixes:
* A null dereference is now no longer possible when configuring the Control
Agent with a socket that lacks the mandatory socket-name entry.
* UNIX sockets are now created as group-writable.
* Corrected an issue in logging configuration when parsing "syslog:".
* Fixed crash when handling misconfigured global reservations.
* Support for recent versions of Sphinx has been added.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1548=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1548=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1548=1
## Package List:
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libkea-log61-2.6.5-150600.13.9.1
* libkea-pgsql71-debuginfo-2.6.5-150600.13.9.1
* libkea-asiodns49-2.6.5-150600.13.9.1
* libkea-pgsql71-2.6.5-150600.13.9.1
* libkea-hooks102-2.6.5-150600.13.9.1
* kea-devel-2.6.5-150600.13.9.1
* kea-hooks-debuginfo-2.6.5-150600.13.9.1
* libkea-cryptolink50-2.6.5-150600.13.9.1
* libkea-cc69-debuginfo-2.6.5-150600.13.9.1
* libkea-http72-2.6.5-150600.13.9.1
* kea-debuginfo-2.6.5-150600.13.9.1
* libkea-d2srv47-2.6.5-150600.13.9.1
* libkea-http72-debuginfo-2.6.5-150600.13.9.1
* libkea-stats41-debuginfo-2.6.5-150600.13.9.1
* libkea-eval69-2.6.5-150600.13.9.1
* libkea-exceptions33-2.6.5-150600.13.9.1
* python3-kea-2.6.5-150600.13.9.1
* libkea-exceptions33-debuginfo-2.6.5-150600.13.9.1
* libkea-asiodns49-debuginfo-2.6.5-150600.13.9.1
* libkea-cfgclient67-2.6.5-150600.13.9.1
* libkea-database62-debuginfo-2.6.5-150600.13.9.1
* libkea-tcp19-debuginfo-2.6.5-150600.13.9.1
* libkea-util87-debuginfo-2.6.5-150600.13.9.1
* libkea-dhcpsrv112-debuginfo-2.6.5-150600.13.9.1
* libkea-hooks102-debuginfo-2.6.5-150600.13.9.1
* libkea-asiolink72-2.6.5-150600.13.9.1
* libkea-dhcp_ddns57-debuginfo-2.6.5-150600.13.9.1
* libkea-util-io0-2.6.5-150600.13.9.1
* libkea-dns++57-debuginfo-2.6.5-150600.13.9.1
* libkea-mysql71-2.6.5-150600.13.9.1
* libkea-mysql71-debuginfo-2.6.5-150600.13.9.1
* kea-2.6.5-150600.13.9.1
* libkea-eval69-debuginfo-2.6.5-150600.13.9.1
* libkea-util-io0-debuginfo-2.6.5-150600.13.9.1
* libkea-database62-2.6.5-150600.13.9.1
* libkea-d2srv47-debuginfo-2.6.5-150600.13.9.1
* libkea-stats41-2.6.5-150600.13.9.1
* libkea-dns++57-2.6.5-150600.13.9.1
* libkea-process76-debuginfo-2.6.5-150600.13.9.1
* libkea-tcp19-2.6.5-150600.13.9.1
* libkea-dhcp_ddns57-2.6.5-150600.13.9.1
* libkea-util87-2.6.5-150600.13.9.1
* libkea-log61-debuginfo-2.6.5-150600.13.9.1
* libkea-cryptolink50-debuginfo-2.6.5-150600.13.9.1
* libkea-asiolink72-debuginfo-2.6.5-150600.13.9.1
* kea-debugsource-2.6.5-150600.13.9.1
* libkea-dhcpsrv112-2.6.5-150600.13.9.1
* libkea-dhcp++92-2.6.5-150600.13.9.1
* kea-hooks-2.6.5-150600.13.9.1
* libkea-cc69-2.6.5-150600.13.9.1
* libkea-cfgclient67-debuginfo-2.6.5-150600.13.9.1
* libkea-process76-2.6.5-150600.13.9.1
* libkea-dhcp++92-debuginfo-2.6.5-150600.13.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* kea-doc-2.6.5-150600.13.9.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libkea-log61-2.6.5-150600.13.9.1
* libkea-pgsql71-debuginfo-2.6.5-150600.13.9.1
* libkea-asiodns49-2.6.5-150600.13.9.1
* libkea-pgsql71-2.6.5-150600.13.9.1
* libkea-hooks102-2.6.5-150600.13.9.1
* kea-devel-2.6.5-150600.13.9.1
* kea-hooks-debuginfo-2.6.5-150600.13.9.1
* libkea-cryptolink50-2.6.5-150600.13.9.1
* libkea-cc69-debuginfo-2.6.5-150600.13.9.1
* libkea-http72-2.6.5-150600.13.9.1
* kea-debuginfo-2.6.5-150600.13.9.1
* libkea-d2srv47-2.6.5-150600.13.9.1
* libkea-http72-debuginfo-2.6.5-150600.13.9.1
* libkea-stats41-debuginfo-2.6.5-150600.13.9.1
* libkea-eval69-2.6.5-150600.13.9.1
* libkea-exceptions33-2.6.5-150600.13.9.1
* python3-kea-2.6.5-150600.13.9.1
* libkea-exceptions33-debuginfo-2.6.5-150600.13.9.1
* libkea-asiodns49-debuginfo-2.6.5-150600.13.9.1
* libkea-cfgclient67-2.6.5-150600.13.9.1
* libkea-database62-debuginfo-2.6.5-150600.13.9.1
* libkea-tcp19-debuginfo-2.6.5-150600.13.9.1
* libkea-util87-debuginfo-2.6.5-150600.13.9.1
* libkea-dhcpsrv112-debuginfo-2.6.5-150600.13.9.1
* libkea-hooks102-debuginfo-2.6.5-150600.13.9.1
* libkea-asiolink72-2.6.5-150600.13.9.1
* libkea-dhcp_ddns57-debuginfo-2.6.5-150600.13.9.1
* libkea-util-io0-2.6.5-150600.13.9.1
* libkea-dns++57-debuginfo-2.6.5-150600.13.9.1
* libkea-mysql71-2.6.5-150600.13.9.1
* libkea-mysql71-debuginfo-2.6.5-150600.13.9.1
* kea-2.6.5-150600.13.9.1
* libkea-eval69-debuginfo-2.6.5-150600.13.9.1
* libkea-util-io0-debuginfo-2.6.5-150600.13.9.1
* libkea-database62-2.6.5-150600.13.9.1
* libkea-d2srv47-debuginfo-2.6.5-150600.13.9.1
* libkea-stats41-2.6.5-150600.13.9.1
* libkea-dns++57-2.6.5-150600.13.9.1
* libkea-process76-debuginfo-2.6.5-150600.13.9.1
* libkea-tcp19-2.6.5-150600.13.9.1
* libkea-dhcp_ddns57-2.6.5-150600.13.9.1
* libkea-util87-2.6.5-150600.13.9.1
* libkea-log61-debuginfo-2.6.5-150600.13.9.1
* libkea-cryptolink50-debuginfo-2.6.5-150600.13.9.1
* libkea-asiolink72-debuginfo-2.6.5-150600.13.9.1
* kea-debugsource-2.6.5-150600.13.9.1
* libkea-dhcpsrv112-2.6.5-150600.13.9.1
* libkea-dhcp++92-2.6.5-150600.13.9.1
* kea-hooks-2.6.5-150600.13.9.1
* libkea-cc69-2.6.5-150600.13.9.1
* libkea-cfgclient67-debuginfo-2.6.5-150600.13.9.1
* libkea-process76-2.6.5-150600.13.9.1
* libkea-dhcp++92-debuginfo-2.6.5-150600.13.9.1
* openSUSE Leap 15.6 (noarch)
* kea-doc-2.6.5-150600.13.9.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libkea-log61-2.6.5-150600.13.9.1
* libkea-pgsql71-debuginfo-2.6.5-150600.13.9.1
* libkea-asiodns49-2.6.5-150600.13.9.1
* libkea-pgsql71-2.6.5-150600.13.9.1
* libkea-hooks102-2.6.5-150600.13.9.1
* kea-devel-2.6.5-150600.13.9.1
* kea-hooks-debuginfo-2.6.5-150600.13.9.1
* libkea-cryptolink50-2.6.5-150600.13.9.1
* libkea-cc69-debuginfo-2.6.5-150600.13.9.1
* libkea-http72-2.6.5-150600.13.9.1
* kea-debuginfo-2.6.5-150600.13.9.1
* libkea-d2srv47-2.6.5-150600.13.9.1
* libkea-http72-debuginfo-2.6.5-150600.13.9.1
* libkea-stats41-debuginfo-2.6.5-150600.13.9.1
* libkea-eval69-2.6.5-150600.13.9.1
* libkea-exceptions33-2.6.5-150600.13.9.1
* python3-kea-2.6.5-150600.13.9.1
* libkea-exceptions33-debuginfo-2.6.5-150600.13.9.1
* libkea-asiodns49-debuginfo-2.6.5-150600.13.9.1
* libkea-cfgclient67-2.6.5-150600.13.9.1
* libkea-database62-debuginfo-2.6.5-150600.13.9.1
* libkea-tcp19-debuginfo-2.6.5-150600.13.9.1
* libkea-util87-debuginfo-2.6.5-150600.13.9.1
* libkea-dhcpsrv112-debuginfo-2.6.5-150600.13.9.1
* libkea-hooks102-debuginfo-2.6.5-150600.13.9.1
* libkea-asiolink72-2.6.5-150600.13.9.1
* libkea-dhcp_ddns57-debuginfo-2.6.5-150600.13.9.1
* libkea-util-io0-2.6.5-150600.13.9.1
* libkea-dns++57-debuginfo-2.6.5-150600.13.9.1
* libkea-mysql71-2.6.5-150600.13.9.1
* libkea-mysql71-debuginfo-2.6.5-150600.13.9.1
* kea-2.6.5-150600.13.9.1
* libkea-eval69-debuginfo-2.6.5-150600.13.9.1
* libkea-util-io0-debuginfo-2.6.5-150600.13.9.1
* libkea-database62-2.6.5-150600.13.9.1
* libkea-d2srv47-debuginfo-2.6.5-150600.13.9.1
* libkea-stats41-2.6.5-150600.13.9.1
* libkea-dns++57-2.6.5-150600.13.9.1
* libkea-process76-debuginfo-2.6.5-150600.13.9.1
* libkea-tcp19-2.6.5-150600.13.9.1
* libkea-dhcp_ddns57-2.6.5-150600.13.9.1
* libkea-util87-2.6.5-150600.13.9.1
* libkea-log61-debuginfo-2.6.5-150600.13.9.1
* libkea-cryptolink50-debuginfo-2.6.5-150600.13.9.1
* libkea-asiolink72-debuginfo-2.6.5-150600.13.9.1
* kea-debugsource-2.6.5-150600.13.9.1
* libkea-dhcpsrv112-2.6.5-150600.13.9.1
* libkea-dhcp++92-2.6.5-150600.13.9.1
* kea-hooks-2.6.5-150600.13.9.1
* libkea-cc69-2.6.5-150600.13.9.1
* libkea-cfgclient67-debuginfo-2.6.5-150600.13.9.1
* libkea-process76-2.6.5-150600.13.9.1
* libkea-dhcp++92-debuginfo-2.6.5-150600.13.9.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* kea-doc-2.6.5-150600.13.9.1
## References:
* https://www.suse.com/security/cve/CVE-2026-3608.html
* https://bugzilla.suse.com/show_bug.cgi?id=1260380
SUSE-SU-2026:1550-1: moderate: Security update for openssl-1_1
# Security update for openssl-1_1
Announcement ID: SUSE-SU-2026:1550-1
Release Date: 2026-04-22T09:41:29Z
Rating: moderate
References:
* bsc#1261678
Cross-References:
* CVE-2026-28390
CVSS scores:
* CVE-2026-28390 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28390 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28390 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-1_1 fixes the following issues:
* CVE-2026-28390: NULL pointer dereference during processing of a crafted CMS
EnvelopedData message with KeyTransportRecipientInfo (bsc#1261678).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1550=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1550=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1550=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1550=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1550=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1550=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl-1_1-devel-1.1.1l-150500.17.54.1
* openssl-1_1-debugsource-1.1.1l-150500.17.54.1
* libopenssl1_1-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-1.1.1l-150500.17.54.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-1.1.1l-150500.17.54.1
* openSUSE Leap 15.5 (x86_64)
* libopenssl1_1-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-32bit-1.1.1l-150500.17.54.1
* libopenssl-1_1-devel-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.54.1
* openSUSE Leap 15.5 (noarch)
* openssl-1_1-doc-1.1.1l-150500.17.54.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libopenssl1_1-hmac-64bit-1.1.1l-150500.17.54.1
* libopenssl1_1-64bit-debuginfo-1.1.1l-150500.17.54.1
* libopenssl1_1-64bit-1.1.1l-150500.17.54.1
* libopenssl-1_1-devel-64bit-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libopenssl-1_1-devel-1.1.1l-150500.17.54.1
* openssl-1_1-debugsource-1.1.1l-150500.17.54.1
* libopenssl1_1-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-1.1.1l-150500.17.54.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libopenssl-1_1-devel-1.1.1l-150500.17.54.1
* openssl-1_1-debugsource-1.1.1l-150500.17.54.1
* libopenssl1_1-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-1.1.1l-150500.17.54.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64)
* libopenssl1_1-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libopenssl-1_1-devel-1.1.1l-150500.17.54.1
* openssl-1_1-debugsource-1.1.1l-150500.17.54.1
* libopenssl1_1-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-1.1.1l-150500.17.54.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64)
* libopenssl1_1-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libopenssl-1_1-devel-1.1.1l-150500.17.54.1
* openssl-1_1-debugsource-1.1.1l-150500.17.54.1
* libopenssl1_1-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-1.1.1l-150500.17.54.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* libopenssl1_1-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libopenssl-1_1-devel-1.1.1l-150500.17.54.1
* openssl-1_1-debugsource-1.1.1l-150500.17.54.1
* libopenssl1_1-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-1.1.1l-150500.17.54.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.54.1
* openssl-1_1-1.1.1l-150500.17.54.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* libopenssl1_1-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-hmac-32bit-1.1.1l-150500.17.54.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.54.1
## References:
* https://www.suse.com/security/cve/CVE-2026-28390.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261678
openSUSE-SU-2026:10593-1: moderate: openCryptoki-3.26.0-6.1 on GA media
# openCryptoki-3.26.0-6.1 on GA media
Announcement ID: openSUSE-SU-2026:10593-1
Rating: moderate
Cross-References:
* CVE-2026-40253
CVSS scores:
* CVE-2026-40253 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-40253 ( SUSE ): 7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the openCryptoki-3.26.0-6.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* openCryptoki 3.26.0-6.1
* openCryptoki-64bit 3.26.0-6.1
* openCryptoki-devel 3.26.0-6.1
## References:
* https://www.suse.com/security/cve/CVE-2026-40253.html
openSUSE-SU-2026:10591-1: moderate: kissfft-131.2.0-2.1 on GA media
# kissfft-131.2.0-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10591-1
Rating: moderate
Cross-References:
* CVE-2026-41445
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the kissfft-131.2.0-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* kissfft 131.2.0-2.1
* kissfft-devel 131.2.0-2.1
* libkissfft-float131 131.2.0-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-41445.html
openSUSE-SU-2026:10585-1: moderate: GraphicsMagick-1.3.46-6.1 on GA media
# GraphicsMagick-1.3.46-6.1 on GA media
Announcement ID: openSUSE-SU-2026:10585-1
Rating: moderate
Cross-References:
* CVE-2026-33535
CVSS scores:
* CVE-2026-33535 ( SUSE ): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the GraphicsMagick-1.3.46-6.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* GraphicsMagick 1.3.46-6.1
* GraphicsMagick-devel 1.3.46-6.1
* libGraphicsMagick++-Q16-12 1.3.46-6.1
* libGraphicsMagick++-devel 1.3.46-6.1
* libGraphicsMagick-Q16-3 1.3.46-6.1
* libGraphicsMagick3-config 1.3.46-6.1
* libGraphicsMagickWand-Q16-2 1.3.46-6.1
* perl-GraphicsMagick 1.3.46-6.1
## References:
* https://www.suse.com/security/cve/CVE-2026-33535.html