SUSE-SU-2026:0298-1: important: Security update for go1.25-openssl
SUSE-SU-2026:0299-1: moderate: Security update for python311
openSUSE-SU-2026:20112-1: important: Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16)
openSUSE-SU-2026:20110-1: moderate: Security update for avahi
openSUSE-SU-2026:20113-1: moderate: Security update for php8
openSUSE-SU-2026:20108-1: important: Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 16)
openSUSE-SU-2026:10089-1: moderate: gio-branding-upstream-2.86.3-2.1 on GA media
openSUSE-SU-2026:10096-1: moderate: python311-urllib3_1-1.26.20-5.1 on GA media
openSUSE-SU-2026:10097-1: moderate: qemu-10.2.0-2.1 on GA media
openSUSE-SU-2026:10092-1: moderate: java-17-openjdk-17.0.18.0-1.1 on GA media
openSUSE-SU-2026:10093-1: moderate: java-21-openjdk-21.0.10.0-1.1 on GA media
openSUSE-SU-2026:10094-1: moderate: libmatio-devel-1.5.30-1.1 on GA media
openSUSE-SU-2026:10090-1: moderate: google-osconfig-agent-20260119.00-1.1 on GA media
openSUSE-SU-2026:10088-1: moderate: cups-2.4.16-1.1 on GA media
openSUSE-SU-2026:10091-1: moderate: java-11-openjdk-11.0.30.0-1.1 on GA media
openSUSE-SU-2026:10095-1: moderate: libopenjp2-7-2.5.4-2.1 on GA media
SUSE-SU-2026:0298-1: important: Security update for go1.25-openssl
# Security update for go1.25-openssl
Announcement ID: SUSE-SU-2026:0298-1
Release Date: 2026-01-26T16:11:13Z
Rating: important
References:
* bsc#1244485
* bsc#1245878
* bsc#1246118
* bsc#1247719
* bsc#1247720
* bsc#1247816
* bsc#1248082
* bsc#1249141
* bsc#1249985
* bsc#1251253
* bsc#1251254
* bsc#1251255
* bsc#1251256
* bsc#1251257
* bsc#1251258
* bsc#1251259
* bsc#1251260
* bsc#1251261
* bsc#1251262
* bsc#1254227
* bsc#1254430
* bsc#1254431
* bsc#1256816
* bsc#1256817
* bsc#1256818
* bsc#1256819
* bsc#1256820
* bsc#1256821
* jsc#SLE-18320
Cross-References:
* CVE-2025-4674
* CVE-2025-47906
* CVE-2025-47907
* CVE-2025-47910
* CVE-2025-47912
* CVE-2025-58183
* CVE-2025-58185
* CVE-2025-58186
* CVE-2025-58187
* CVE-2025-58188
* CVE-2025-58189
* CVE-2025-61723
* CVE-2025-61724
* CVE-2025-61725
* CVE-2025-61726
* CVE-2025-61727
* CVE-2025-61728
* CVE-2025-61729
* CVE-2025-61730
* CVE-2025-61731
* CVE-2025-68119
* CVE-2025-68121
CVSS scores:
* CVE-2025-4674 ( SUSE ): 9.3
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-4674 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2025-4674 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2025-47906 ( SUSE ): 2.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-47906 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-47906 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2025-47907 ( SUSE ): 2.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-47907 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
* CVE-2025-47907 ( NVD ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L
* CVE-2025-47910 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-47910 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-47912 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-47912 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-47912 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-58183 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58183 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-58183 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-58185 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58185 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58185 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58186 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58186 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58186 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58187 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58187 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58187 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-58188 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-58188 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-58188 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-58189 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
* CVE-2025-58189 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2025-58189 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-61723 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-61723 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-61723 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61724 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-61724 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-61724 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-61725 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61725 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61725 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61726 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61726 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61727 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-61728 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61729 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61729 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61729 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61730 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-61730 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-61731 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61731 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68119 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68119 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68121 ( SUSE ): 7.6
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected Products:
* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves 22 vulnerabilities, contains one feature and has six
security fixes can now be installed.
## Description:
This update for go1.25-openssl fixes the following issues:
Update to version 1.25.6 (released 2026-01-15) (jsc#SLE-18320, bsc#1244485):
Security fixes:
* CVE-2025-4674 cmd/go: disable support for multiple vcs in one module
(bsc#1246118).
* CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of "", "." and
".." in some PATH configurations (bsc#1247719).
* CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan
(bsc#1247720).
* CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not
limited to exact matches (bsc#1249141).
* CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames
(bsc#1251257).
* CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map
(bsc#1251261).
* CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload
can cause memory exhaustion (bsc#1251258).
* CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory
exhaustion (bsc#1251259).
* CVE-2025-58187 crypto/x509: quadratic complexity when checking name
constraints (bsc#1251254).
* CVE-2025-58188 crypto/x509: panic when validating certificates with DSA
public keys (bsc#1251260).
* CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker
controlled information (bsc#1251255).
* CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid
inputs (bsc#1251256).
* CVE-2025-61724 net/textproto: excessive CPU consumption in
Reader.ReadResponse (bsc#1251262).
* CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress
(bsc#1251253).
* CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm
(bsc#1256817).
* CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn't preclude
wildcard SAN (bsc#1254430).
* CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP
archives (bsc#1256816).
* CVE-2025-61729 crypto/x509: excessive resource consumption in printing error
string for host certificate validation (bsc#1254431).
* CVE-2025-61730 crypto/tls: handshake messages may be processed at the
incorrect encryption level (bsc#1256821).
* CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary
code execution (bsc#1256819).
* CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain
(bsc#1256820).
* CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated
session ticket keys, session resumption does not account for the expiration
of full certificate chain (bsc#1256818).
Other fixes:
* go#74822 cmd/go: "get toolchain@latest" should ignore release candidates
* go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination
addresses on IPv4 UDP sockets
* go#75008 os/exec: TestLookPath fails on plan9 after CL 685755
* go#75021 testing/synctest: bubble not terminating
* go#75083 os: File.Seek doesn't set the correct offset with Windows
overlapped handles
* go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when
calling ReadAt
* go#75116 os: Root.MkdirAll can return "file exists" when called concurrently
on the same path
* go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original
root
* go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
* go#75255 cmd/compile: export to DWARF types only referenced through
interfaces
* go#75347 testing/synctest: test timeout with no runnable goroutines
* go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails
on plan9
* go#75480 cmd/link: linker panic and relocation errors with complex generics
inlining
* go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail
* go#75537 context: Err can return non-nil before Done channel is closed
* go#75539 net/http: internal error: connCount underflow
* go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on
github.com/leodido/go-urn
* go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return
value
* go#75669 runtime: debug.decoratemappings don't work as expected
* go#75775 runtime: build fails when run via QEMU for linux/amd64 running on
linux/arm64
* go#75777 spec: Go1.25 spec should be dated closer to actual release date
* go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on
MIPS
* go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square
brackets
* go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot
* go#75952 encoding/pem: regression when decoding blocks with leading garbage
* go#75989 os: on windows RemoveAll removing directories containing read-only
files errors with unlinkat ... Access is denied
* go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should
* go#76029 pem/encoding: malformed line endings can cause panics
* go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24
to 1.25
* go#76360 os: on windows RemoveAll removing directories containing read-only
files errors with unlinkat ... Access is denied, ReOpenFile error handling
followup
* go#76392 os: package initialization hangs is Stdin is blocked
* go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH
enabled
* go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes
* go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4
windows 386
* go#76776 runtime: race detector crash on ppc64le
* go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while
compiling : runtime error: index out of range
* go#76973 errors: errors.Join behavior changed in 1.25
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-298=1 openSUSE-SLE-15.6-2026-298=1
* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-298=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-298=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-298=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* go1.25-openssl-debuginfo-1.25.6-150600.13.9.1
* go1.25-openssl-1.25.6-150600.13.9.1
* go1.25-openssl-doc-1.25.6-150600.13.9.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.25-openssl-race-1.25.6-150600.13.9.1
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* go1.25-openssl-debuginfo-1.25.6-150600.13.9.1
* go1.25-openssl-1.25.6-150600.13.9.1
* go1.25-openssl-doc-1.25.6-150600.13.9.1
* go1.25-openssl-race-1.25.6-150600.13.9.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* go1.25-openssl-debuginfo-1.25.6-150600.13.9.1
* go1.25-openssl-1.25.6-150600.13.9.1
* go1.25-openssl-doc-1.25.6-150600.13.9.1
* go1.25-openssl-race-1.25.6-150600.13.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* go1.25-openssl-debuginfo-1.25.6-150600.13.9.1
* go1.25-openssl-1.25.6-150600.13.9.1
* go1.25-openssl-doc-1.25.6-150600.13.9.1
* go1.25-openssl-race-1.25.6-150600.13.9.1
## References:
* https://www.suse.com/security/cve/CVE-2025-4674.html
* https://www.suse.com/security/cve/CVE-2025-47906.html
* https://www.suse.com/security/cve/CVE-2025-47907.html
* https://www.suse.com/security/cve/CVE-2025-47910.html
* https://www.suse.com/security/cve/CVE-2025-47912.html
* https://www.suse.com/security/cve/CVE-2025-58183.html
* https://www.suse.com/security/cve/CVE-2025-58185.html
* https://www.suse.com/security/cve/CVE-2025-58186.html
* https://www.suse.com/security/cve/CVE-2025-58187.html
* https://www.suse.com/security/cve/CVE-2025-58188.html
* https://www.suse.com/security/cve/CVE-2025-58189.html
* https://www.suse.com/security/cve/CVE-2025-61723.html
* https://www.suse.com/security/cve/CVE-2025-61724.html
* https://www.suse.com/security/cve/CVE-2025-61725.html
* https://www.suse.com/security/cve/CVE-2025-61726.html
* https://www.suse.com/security/cve/CVE-2025-61727.html
* https://www.suse.com/security/cve/CVE-2025-61728.html
* https://www.suse.com/security/cve/CVE-2025-61729.html
* https://www.suse.com/security/cve/CVE-2025-61730.html
* https://www.suse.com/security/cve/CVE-2025-61731.html
* https://www.suse.com/security/cve/CVE-2025-68119.html
* https://www.suse.com/security/cve/CVE-2025-68121.html
* https://bugzilla.suse.com/show_bug.cgi?id=1244485
* https://bugzilla.suse.com/show_bug.cgi?id=1245878
* https://bugzilla.suse.com/show_bug.cgi?id=1246118
* https://bugzilla.suse.com/show_bug.cgi?id=1247719
* https://bugzilla.suse.com/show_bug.cgi?id=1247720
* https://bugzilla.suse.com/show_bug.cgi?id=1247816
* https://bugzilla.suse.com/show_bug.cgi?id=1248082
* https://bugzilla.suse.com/show_bug.cgi?id=1249141
* https://bugzilla.suse.com/show_bug.cgi?id=1249985
* https://bugzilla.suse.com/show_bug.cgi?id=1251253
* https://bugzilla.suse.com/show_bug.cgi?id=1251254
* https://bugzilla.suse.com/show_bug.cgi?id=1251255
* https://bugzilla.suse.com/show_bug.cgi?id=1251256
* https://bugzilla.suse.com/show_bug.cgi?id=1251257
* https://bugzilla.suse.com/show_bug.cgi?id=1251258
* https://bugzilla.suse.com/show_bug.cgi?id=1251259
* https://bugzilla.suse.com/show_bug.cgi?id=1251260
* https://bugzilla.suse.com/show_bug.cgi?id=1251261
* https://bugzilla.suse.com/show_bug.cgi?id=1251262
* https://bugzilla.suse.com/show_bug.cgi?id=1254227
* https://bugzilla.suse.com/show_bug.cgi?id=1254430
* https://bugzilla.suse.com/show_bug.cgi?id=1254431
* https://bugzilla.suse.com/show_bug.cgi?id=1256816
* https://bugzilla.suse.com/show_bug.cgi?id=1256817
* https://bugzilla.suse.com/show_bug.cgi?id=1256818
* https://bugzilla.suse.com/show_bug.cgi?id=1256819
* https://bugzilla.suse.com/show_bug.cgi?id=1256820
* https://bugzilla.suse.com/show_bug.cgi?id=1256821
* https://jira.suse.com/browse/SLE-18320
SUSE-SU-2026:0299-1: moderate: Security update for python311
# Security update for python311
Announcement ID: SUSE-SU-2026:0299-1
Release Date: 2026-01-26T16:39:25Z
Rating: moderate
References:
* bsc#1254400
* bsc#1254401
* bsc#1254997
Cross-References:
* CVE-2025-12084
* CVE-2025-13836
* CVE-2025-13837
CVSS scores:
* CVE-2025-12084 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-12084 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-12084 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-12084 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-13836 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13836 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-13836 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13836 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-13837 ( SUSE ): 2.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13837 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-13837 ( NVD ): 2.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* Public Cloud Module 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves three vulnerabilities can now be installed.
## Description:
This update for python311 fixes the following issues:
* CVE-2025-12084: prevent quadratic behavior in node ID cache clearing
(bsc#1254997).
* CVE-2025-13836: prevent reading an HTTP response from a server, if no read
amount is specified, with using Content-Length per default as the length
(bsc#1254400).
* CVE-2025-13837: protect against OOM when loading malicious content
(bsc#1254401).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-299=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-299=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-299=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-299=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-299=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-299=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-299=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-299=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-299=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-299=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python311-tools-3.11.14-150400.9.72.1
* python311-idle-3.11.14-150400.9.72.1
* python311-testsuite-3.11.14-150400.9.72.1
* python311-base-3.11.14-150400.9.72.1
* python311-tk-3.11.14-150400.9.72.1
* python311-tk-debuginfo-3.11.14-150400.9.72.1
* python311-3.11.14-150400.9.72.1
* python311-testsuite-debuginfo-3.11.14-150400.9.72.1
* python311-base-debuginfo-3.11.14-150400.9.72.1
* python311-core-debugsource-3.11.14-150400.9.72.1
* python311-debuginfo-3.11.14-150400.9.72.1
* python311-curses-3.11.14-150400.9.72.1
* python311-doc-devhelp-3.11.14-150400.9.72.1
* libpython3_11-1_0-3.11.14-150400.9.72.1
* python311-curses-debuginfo-3.11.14-150400.9.72.1
* python311-devel-3.11.14-150400.9.72.1
* python311-dbm-debuginfo-3.11.14-150400.9.72.1
* python311-debugsource-3.11.14-150400.9.72.1
* python311-doc-3.11.14-150400.9.72.1
* python311-dbm-3.11.14-150400.9.72.1
* libpython3_11-1_0-debuginfo-3.11.14-150400.9.72.1
* openSUSE Leap 15.4 (x86_64)
* python311-base-32bit-3.11.14-150400.9.72.1
* python311-32bit-3.11.14-150400.9.72.1
* libpython3_11-1_0-32bit-3.11.14-150400.9.72.1
* libpython3_11-1_0-32bit-debuginfo-3.11.14-150400.9.72.1
* python311-32bit-debuginfo-3.11.14-150400.9.72.1
* python311-base-32bit-debuginfo-3.11.14-150400.9.72.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* python311-64bit-3.11.14-150400.9.72.1
* libpython3_11-1_0-64bit-debuginfo-3.11.14-150400.9.72.1
* libpython3_11-1_0-64bit-3.11.14-150400.9.72.1
* python311-base-64bit-3.11.14-150400.9.72.1
* python311-base-64bit-debuginfo-3.11.14-150400.9.72.1
* python311-64bit-debuginfo-3.11.14-150400.9.72.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* libpython3_11-1_0-3.11.14-150400.9.72.1
* python311-3.11.14-150400.9.72.1
* python311-base-3.11.14-150400.9.72.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* python311-tools-3.11.14-150400.9.72.1
* python311-doc-3.11.14-150400.9.72.1
* python311-dbm-3.11.14-150400.9.72.1
* python311-debuginfo-3.11.14-150400.9.72.1
* python311-idle-3.11.14-150400.9.72.1
* python311-tk-debuginfo-3.11.14-150400.9.72.1
* libpython3_11-1_0-debuginfo-3.11.14-150400.9.72.1
* python311-3.11.14-150400.9.72.1
* python311-curses-3.11.14-150400.9.72.1
* python311-doc-devhelp-3.11.14-150400.9.72.1
* libpython3_11-1_0-3.11.14-150400.9.72.1
* python311-base-3.11.14-150400.9.72.1
* python311-dbm-debuginfo-3.11.14-150400.9.72.1
* python311-curses-debuginfo-3.11.14-150400.9.72.1
* python311-base-debuginfo-3.11.14-150400.9.72.1
* python311-tk-3.11.14-150400.9.72.1
* python311-devel-3.11.14-150400.9.72.1
* python311-core-debugsource-3.11.14-150400.9.72.1
* python311-debugsource-3.11.14-150400.9.72.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* python311-tools-3.11.14-150400.9.72.1
* python311-doc-3.11.14-150400.9.72.1
* python311-dbm-3.11.14-150400.9.72.1
* python311-debuginfo-3.11.14-150400.9.72.1
* python311-idle-3.11.14-150400.9.72.1
* python311-tk-debuginfo-3.11.14-150400.9.72.1
* libpython3_11-1_0-debuginfo-3.11.14-150400.9.72.1
* python311-3.11.14-150400.9.72.1
* python311-curses-3.11.14-150400.9.72.1
* python311-doc-devhelp-3.11.14-150400.9.72.1
* libpython3_11-1_0-3.11.14-150400.9.72.1
* python311-base-3.11.14-150400.9.72.1
* python311-dbm-debuginfo-3.11.14-150400.9.72.1
* python311-curses-debuginfo-3.11.14-150400.9.72.1
* python311-base-debuginfo-3.11.14-150400.9.72.1
* python311-tk-3.11.14-150400.9.72.1
* python311-devel-3.11.14-150400.9.72.1
* python311-core-debugsource-3.11.14-150400.9.72.1
* python311-debugsource-3.11.14-150400.9.72.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* python311-tools-3.11.14-150400.9.72.1
* python311-doc-3.11.14-150400.9.72.1
* python311-dbm-3.11.14-150400.9.72.1
* python311-debuginfo-3.11.14-150400.9.72.1
* python311-idle-3.11.14-150400.9.72.1
* python311-tk-debuginfo-3.11.14-150400.9.72.1
* libpython3_11-1_0-debuginfo-3.11.14-150400.9.72.1
* python311-3.11.14-150400.9.72.1
* python311-curses-3.11.14-150400.9.72.1
* python311-doc-devhelp-3.11.14-150400.9.72.1
* libpython3_11-1_0-3.11.14-150400.9.72.1
* python311-base-3.11.14-150400.9.72.1
* python311-dbm-debuginfo-3.11.14-150400.9.72.1
* python311-curses-debuginfo-3.11.14-150400.9.72.1
* python311-base-debuginfo-3.11.14-150400.9.72.1
* python311-tk-3.11.14-150400.9.72.1
* python311-devel-3.11.14-150400.9.72.1
* python311-core-debugsource-3.11.14-150400.9.72.1
* python311-debugsource-3.11.14-150400.9.72.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* python311-tools-3.11.14-150400.9.72.1
* python311-doc-3.11.14-150400.9.72.1
* python311-dbm-3.11.14-150400.9.72.1
* python311-debuginfo-3.11.14-150400.9.72.1
* python311-idle-3.11.14-150400.9.72.1
* python311-tk-debuginfo-3.11.14-150400.9.72.1
* libpython3_11-1_0-debuginfo-3.11.14-150400.9.72.1
* python311-3.11.14-150400.9.72.1
* python311-curses-3.11.14-150400.9.72.1
* python311-doc-devhelp-3.11.14-150400.9.72.1
* libpython3_11-1_0-3.11.14-150400.9.72.1
* python311-base-3.11.14-150400.9.72.1
* python311-dbm-debuginfo-3.11.14-150400.9.72.1
* python311-curses-debuginfo-3.11.14-150400.9.72.1
* python311-base-debuginfo-3.11.14-150400.9.72.1
* python311-tk-3.11.14-150400.9.72.1
* python311-devel-3.11.14-150400.9.72.1
* python311-core-debugsource-3.11.14-150400.9.72.1
* python311-debugsource-3.11.14-150400.9.72.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* python311-tools-3.11.14-150400.9.72.1
* python311-doc-3.11.14-150400.9.72.1
* python311-dbm-3.11.14-150400.9.72.1
* python311-debuginfo-3.11.14-150400.9.72.1
* python311-idle-3.11.14-150400.9.72.1
* python311-tk-debuginfo-3.11.14-150400.9.72.1
* libpython3_11-1_0-debuginfo-3.11.14-150400.9.72.1
* python311-3.11.14-150400.9.72.1
* python311-curses-3.11.14-150400.9.72.1
* python311-doc-devhelp-3.11.14-150400.9.72.1
* libpython3_11-1_0-3.11.14-150400.9.72.1
* python311-base-3.11.14-150400.9.72.1
* python311-dbm-debuginfo-3.11.14-150400.9.72.1
* python311-curses-debuginfo-3.11.14-150400.9.72.1
* python311-base-debuginfo-3.11.14-150400.9.72.1
* python311-tk-3.11.14-150400.9.72.1
* python311-devel-3.11.14-150400.9.72.1
* python311-core-debugsource-3.11.14-150400.9.72.1
* python311-debugsource-3.11.14-150400.9.72.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* python311-tools-3.11.14-150400.9.72.1
* python311-doc-3.11.14-150400.9.72.1
* python311-dbm-3.11.14-150400.9.72.1
* python311-debuginfo-3.11.14-150400.9.72.1
* python311-idle-3.11.14-150400.9.72.1
* python311-tk-debuginfo-3.11.14-150400.9.72.1
* libpython3_11-1_0-debuginfo-3.11.14-150400.9.72.1
* python311-3.11.14-150400.9.72.1
* python311-curses-3.11.14-150400.9.72.1
* python311-doc-devhelp-3.11.14-150400.9.72.1
* libpython3_11-1_0-3.11.14-150400.9.72.1
* python311-base-3.11.14-150400.9.72.1
* python311-dbm-debuginfo-3.11.14-150400.9.72.1
* python311-curses-debuginfo-3.11.14-150400.9.72.1
* python311-base-debuginfo-3.11.14-150400.9.72.1
* python311-tk-3.11.14-150400.9.72.1
* python311-devel-3.11.14-150400.9.72.1
* python311-core-debugsource-3.11.14-150400.9.72.1
* python311-debugsource-3.11.14-150400.9.72.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* python311-tools-3.11.14-150400.9.72.1
* python311-doc-3.11.14-150400.9.72.1
* python311-dbm-3.11.14-150400.9.72.1
* python311-debuginfo-3.11.14-150400.9.72.1
* python311-idle-3.11.14-150400.9.72.1
* python311-tk-debuginfo-3.11.14-150400.9.72.1
* libpython3_11-1_0-debuginfo-3.11.14-150400.9.72.1
* python311-3.11.14-150400.9.72.1
* python311-curses-3.11.14-150400.9.72.1
* python311-doc-devhelp-3.11.14-150400.9.72.1
* libpython3_11-1_0-3.11.14-150400.9.72.1
* python311-base-3.11.14-150400.9.72.1
* python311-dbm-debuginfo-3.11.14-150400.9.72.1
* python311-curses-debuginfo-3.11.14-150400.9.72.1
* python311-base-debuginfo-3.11.14-150400.9.72.1
* python311-tk-3.11.14-150400.9.72.1
* python311-devel-3.11.14-150400.9.72.1
* python311-core-debugsource-3.11.14-150400.9.72.1
* python311-debugsource-3.11.14-150400.9.72.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* python311-tools-3.11.14-150400.9.72.1
* python311-doc-3.11.14-150400.9.72.1
* python311-dbm-3.11.14-150400.9.72.1
* python311-debuginfo-3.11.14-150400.9.72.1
* python311-idle-3.11.14-150400.9.72.1
* python311-tk-debuginfo-3.11.14-150400.9.72.1
* libpython3_11-1_0-debuginfo-3.11.14-150400.9.72.1
* python311-3.11.14-150400.9.72.1
* python311-curses-3.11.14-150400.9.72.1
* python311-doc-devhelp-3.11.14-150400.9.72.1
* libpython3_11-1_0-3.11.14-150400.9.72.1
* python311-base-3.11.14-150400.9.72.1
* python311-dbm-debuginfo-3.11.14-150400.9.72.1
* python311-curses-debuginfo-3.11.14-150400.9.72.1
* python311-base-debuginfo-3.11.14-150400.9.72.1
* python311-tk-3.11.14-150400.9.72.1
* python311-devel-3.11.14-150400.9.72.1
* python311-core-debugsource-3.11.14-150400.9.72.1
* python311-debugsource-3.11.14-150400.9.72.1
## References:
* https://www.suse.com/security/cve/CVE-2025-12084.html
* https://www.suse.com/security/cve/CVE-2025-13836.html
* https://www.suse.com/security/cve/CVE-2025-13837.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254400
* https://bugzilla.suse.com/show_bug.cgi?id=1254401
* https://bugzilla.suse.com/show_bug.cgi?id=1254997
openSUSE-SU-2026:20112-1: important: Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16)
openSUSE security update: security update for the linux kernel rt (live patch 1 for suse linux enterprise 16)
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20112-1
Rating: important
References:
* bsc#1251982
* bsc#1253437
* bsc#1254196
Cross-References:
* CVE-2025-39963
* CVE-2025-40204
* CVE-2025-40212
CVSS scores:
* CVE-2025-39963 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39963 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40212 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40212 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 3 vulnerabilities and has 3 bug fixes can now be installed.
Description:
This update for the SUSE Linux Enterprise kernel 6.12.0-160000.6.1 fixes various security issues
The following security issues were fixed:
- CVE-2025-39963: io_uring: fix incorrect io_kiocb reference in io_link_skb (bsc#1251982).
- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).
- CVE-2025-40212: nfsd: fix refcount leak in nfsd_set_fh_dentry() (bsc#1254196).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-195=1
Package List:
- openSUSE Leap 16.0:
kernel-livepatch-6_12_0-160000_6-rt-3-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2025-39963.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://www.suse.com/security/cve/CVE-2025-40212.html
openSUSE-SU-2026:20110-1: moderate: Security update for avahi
openSUSE security update: security update for avahi
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20110-1
Rating: moderate
References:
* bsc#1256498
* bsc#1256499
* bsc#1256500
Cross-References:
* CVE-2025-68276
* CVE-2025-68468
* CVE-2025-68471
CVSS scores:
* CVE-2025-68276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68468 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-68468 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68471 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-68471 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 3 vulnerabilities and has 3 bug fixes can now be installed.
Description:
This update for avahi fixes the following issues:
- CVE-2025-68276: Fixed refuse to create wide-area record browsers when
wide-area is off (bsc#1256498)
- CVE-2025-68471: Fixed DoS bug by changing assert to return (bsc#1256500)
- CVE-2025-68468: Fixed DoS bug by removing incorrect assertion (bsc#1256499)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-193=1
Package List:
- openSUSE Leap 16.0:
avahi-0.8-160000.4.1
avahi-autoipd-0.8-160000.4.1
avahi-compat-howl-devel-0.8-160000.4.1
avahi-compat-mDNSResponder-devel-0.8-160000.4.1
avahi-lang-0.8-160000.4.1
avahi-utils-0.8-160000.4.1
avahi-utils-gtk-0.8-160000.4.1
libavahi-client3-0.8-160000.4.1
libavahi-common3-0.8-160000.4.1
libavahi-core7-0.8-160000.4.1
libavahi-devel-0.8-160000.4.1
libavahi-glib-devel-0.8-160000.4.1
libavahi-glib1-0.8-160000.4.1
libavahi-gobject-devel-0.8-160000.4.1
libavahi-gobject0-0.8-160000.4.1
libavahi-libevent1-0.8-160000.4.1
libavahi-qt6-1-0.8-160000.4.1
libavahi-qt6-devel-0.8-160000.4.1
libavahi-ui-gtk3-0-0.8-160000.4.1
libdns_sd-0.8-160000.4.1
libhowl0-0.8-160000.4.1
python3-avahi-gtk-0.8-160000.4.1
python313-avahi-0.8-160000.4.1
typelib-1_0-Avahi-0_6-0.8-160000.4.1
References:
* https://www.suse.com/security/cve/CVE-2025-68276.html
* https://www.suse.com/security/cve/CVE-2025-68468.html
* https://www.suse.com/security/cve/CVE-2025-68471.html
openSUSE-SU-2026:20113-1: moderate: Security update for php8
openSUSE security update: security update for php8
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20113-1
Rating: moderate
References:
* bsc#1255043
* bsc#1255710
* bsc#1255711
* bsc#1255712
Cross-References:
* CVE-2025-14177
* CVE-2025-14178
* CVE-2025-14180
CVSS scores:
* CVE-2025-14177 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-14177 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N
* CVE-2025-14178 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-14178 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14180 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-14180 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 3 vulnerabilities and has 4 bug fixes can now be installed.
Description:
This update for php8 fixes the following issues:
Version update to 8.4.16:
Security fixes:
- CVE-2025-14177: getimagesize() function may leak uninitialized heap memory into the APPn segments when reading images in multi-chunk mode (bsc#1255710).
- CVE-2025-14178: heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE (bsc#1255711).
- CVE-2025-14180: null pointer dereference in pdo_parse_params() function when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled (bsc#1255712).
Other fixes:
- php8 contains Directories owned by wwwrun but does not require User. (bsc#1255043)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-198=1
Package List:
- openSUSE Leap 16.0:
apache2-mod_php8-8.4.16-160000.1.1
php8-8.4.16-160000.1.1
php8-bcmath-8.4.16-160000.1.1
php8-bz2-8.4.16-160000.1.1
php8-calendar-8.4.16-160000.1.1
php8-cli-8.4.16-160000.1.1
php8-ctype-8.4.16-160000.1.1
php8-curl-8.4.16-160000.1.1
php8-dba-8.4.16-160000.1.1
php8-devel-8.4.16-160000.1.1
php8-dom-8.4.16-160000.1.1
php8-embed-8.4.16-160000.1.1
php8-enchant-8.4.16-160000.1.1
php8-exif-8.4.16-160000.1.1
php8-fastcgi-8.4.16-160000.1.1
php8-ffi-8.4.16-160000.1.1
php8-fileinfo-8.4.16-160000.1.1
php8-fpm-8.4.16-160000.1.1
php8-fpm-apache-8.4.16-160000.1.1
php8-ftp-8.4.16-160000.1.1
php8-gd-8.4.16-160000.1.1
php8-gettext-8.4.16-160000.1.1
php8-gmp-8.4.16-160000.1.1
php8-iconv-8.4.16-160000.1.1
php8-intl-8.4.16-160000.1.1
php8-ldap-8.4.16-160000.1.1
php8-mbstring-8.4.16-160000.1.1
php8-mysql-8.4.16-160000.1.1
php8-odbc-8.4.16-160000.1.1
php8-opcache-8.4.16-160000.1.1
php8-openssl-8.4.16-160000.1.1
php8-pcntl-8.4.16-160000.1.1
php8-pdo-8.4.16-160000.1.1
php8-pgsql-8.4.16-160000.1.1
php8-phar-8.4.16-160000.1.1
php8-posix-8.4.16-160000.1.1
php8-readline-8.4.16-160000.1.1
php8-shmop-8.4.16-160000.1.1
php8-snmp-8.4.16-160000.1.1
php8-soap-8.4.16-160000.1.1
php8-sockets-8.4.16-160000.1.1
php8-sodium-8.4.16-160000.1.1
php8-sqlite-8.4.16-160000.1.1
php8-sysvmsg-8.4.16-160000.1.1
php8-sysvsem-8.4.16-160000.1.1
php8-sysvshm-8.4.16-160000.1.1
php8-test-8.4.16-160000.1.1
php8-tidy-8.4.16-160000.1.1
php8-tokenizer-8.4.16-160000.1.1
php8-xmlreader-8.4.16-160000.1.1
php8-xmlwriter-8.4.16-160000.1.1
php8-xsl-8.4.16-160000.1.1
php8-zip-8.4.16-160000.1.1
php8-zlib-8.4.16-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2025-14177.html
* https://www.suse.com/security/cve/CVE-2025-14178.html
* https://www.suse.com/security/cve/CVE-2025-14180.html
openSUSE-SU-2026:20108-1: important: Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 16)
openSUSE security update: security update for the linux kernel rt (live patch 2 for suse linux enterprise 16)
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20108-1
Rating: important
References:
* bsc#1254196
Cross-References:
* CVE-2025-40212
CVSS scores:
* CVE-2025-40212 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40212 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for the SUSE Linux Enterprise kernel 6.12.0-160000.7.1 fixes one security issue
The following security issue was fixed:
- CVE-2025-40212: nfsd: fix refcount leak in nfsd_set_fh_dentry() (bsc#1254196).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-191=1
Package List:
- openSUSE Leap 16.0:
kernel-livepatch-6_12_0-160000_7-rt-2-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2025-40212.html
openSUSE-SU-2026:10089-1: moderate: gio-branding-upstream-2.86.3-2.1 on GA media
# gio-branding-upstream-2.86.3-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10089-1
Rating: moderate
Cross-References:
* CVE-2026-0988
CVSS scores:
* CVE-2026-0988 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-0988 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the gio-branding-upstream-2.86.3-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* gio-branding-upstream 2.86.3-2.1
* glib2-devel 2.86.3-2.1
* glib2-devel-32bit 2.86.3-2.1
* glib2-devel-static 2.86.3-2.1
* glib2-lang 2.86.3-2.1
* glib2-tests-devel 2.86.3-2.1
* glib2-tools 2.86.3-2.1
* glib2-tools-32bit 2.86.3-2.1
* libgio-2_0-0 2.86.3-2.1
* libgio-2_0-0-32bit 2.86.3-2.1
* libgirepository-2_0-0 2.86.3-2.1
* libglib-2_0-0 2.86.3-2.1
* libglib-2_0-0-32bit 2.86.3-2.1
* libgmodule-2_0-0 2.86.3-2.1
* libgmodule-2_0-0-32bit 2.86.3-2.1
* libgobject-2_0-0 2.86.3-2.1
* libgobject-2_0-0-32bit 2.86.3-2.1
* libgthread-2_0-0 2.86.3-2.1
* libgthread-2_0-0-32bit 2.86.3-2.1
* typelib-1_0-GIRepository-3_0 2.86.3-2.1
* typelib-1_0-GLib-2_0 2.86.3-2.1
* typelib-1_0-GLibUnix-2_0 2.86.3-2.1
* typelib-1_0-GModule-2_0 2.86.3-2.1
* typelib-1_0-GObject-2_0 2.86.3-2.1
* typelib-1_0-Gio-2_0 2.86.3-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-0988.html
openSUSE-SU-2026:10096-1: moderate: python311-urllib3_1-1.26.20-5.1 on GA media
# python311-urllib3_1-1.26.20-5.1 on GA media
Announcement ID: openSUSE-SU-2026:10096-1
Rating: moderate
Cross-References:
* CVE-2025-66418
* CVE-2025-66471
* CVE-2026-21441
CVSS scores:
* CVE-2025-66418 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-66418 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-66471 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-66471 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-21441 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-21441 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 3 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the python311-urllib3_1-1.26.20-5.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python311-urllib3_1 1.26.20-5.1
* python312-urllib3_1 1.26.20-5.1
* python313-urllib3_1 1.26.20-5.1
## References:
* https://www.suse.com/security/cve/CVE-2025-66418.html
* https://www.suse.com/security/cve/CVE-2025-66471.html
* https://www.suse.com/security/cve/CVE-2026-21441.html
openSUSE-SU-2026:10097-1: moderate: qemu-10.2.0-2.1 on GA media
# qemu-10.2.0-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10097-1
Rating: moderate
Cross-References:
* CVE-2026-0665
CVSS scores:
* CVE-2026-0665 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-0665 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the qemu-10.2.0-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* qemu 10.2.0-2.1
* qemu-SLOF 10.2.0-2.1
* qemu-accel-qtest 10.2.0-2.1
* qemu-arm 10.2.0-2.1
* qemu-audio-alsa 10.2.0-2.1
* qemu-audio-dbus 10.2.0-2.1
* qemu-audio-jack 10.2.0-2.1
* qemu-audio-oss 10.2.0-2.1
* qemu-audio-pa 10.2.0-2.1
* qemu-audio-pipewire 10.2.0-2.1
* qemu-audio-sdl 10.2.0-2.1
* qemu-audio-spice 10.2.0-2.1
* qemu-block-curl 10.2.0-2.1
* qemu-block-dmg 10.2.0-2.1
* qemu-block-iscsi 10.2.0-2.1
* qemu-block-nfs 10.2.0-2.1
* qemu-block-rbd 10.2.0-2.1
* qemu-block-ssh 10.2.0-2.1
* qemu-chardev-baum 10.2.0-2.1
* qemu-chardev-spice 10.2.0-2.1
* qemu-doc 10.2.0-2.1
* qemu-extra 10.2.0-2.1
* qemu-guest-agent 10.2.0-2.1
* qemu-headless 10.2.0-2.1
* qemu-hw-display-qxl 10.2.0-2.1
* qemu-hw-display-virtio-gpu 10.2.0-2.1
* qemu-hw-display-virtio-gpu-pci 10.2.0-2.1
* qemu-hw-display-virtio-vga 10.2.0-2.1
* qemu-hw-s390x-virtio-gpu-ccw 10.2.0-2.1
* qemu-hw-usb-host 10.2.0-2.1
* qemu-hw-usb-redirect 10.2.0-2.1
* qemu-hw-usb-smartcard 10.2.0-2.1
* qemu-img 10.2.0-2.1
* qemu-ipxe 10.2.0-2.1
* qemu-ivshmem-tools 10.2.0-2.1
* qemu-ksm 10.2.0-2.1
* qemu-lang 10.2.0-2.1
* qemu-microvm 10.2.0-2.1
* qemu-ppc 10.2.0-2.1
* qemu-pr-helper 10.2.0-2.1
* qemu-s390x 10.2.0-2.1
* qemu-seabios 10.2.01.17.0_1_g4f253b9b-2.1
* qemu-skiboot 10.2.0-2.1
* qemu-spice 10.2.0-2.1
* qemu-tools 10.2.0-2.1
* qemu-ui-curses 10.2.0-2.1
* qemu-ui-dbus 10.2.0-2.1
* qemu-ui-gtk 10.2.0-2.1
* qemu-ui-opengl 10.2.0-2.1
* qemu-ui-sdl 10.2.0-2.1
* qemu-ui-spice-app 10.2.0-2.1
* qemu-ui-spice-core 10.2.0-2.1
* qemu-vgabios 10.2.01.17.0_1_g4f253b9b-2.1
* qemu-vhost-user-gpu 10.2.0-2.1
* qemu-vmsr-helper 10.2.0-2.1
* qemu-x86 10.2.0-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-0665.html
openSUSE-SU-2026:10092-1: moderate: java-17-openjdk-17.0.18.0-1.1 on GA media
# java-17-openjdk-17.0.18.0-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10092-1
Rating: moderate
Cross-References:
* CVE-2026-21925
* CVE-2026-21932
* CVE-2026-21933
* CVE-2026-21945
CVSS scores:
* CVE-2026-21925 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21932 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
* CVE-2026-21933 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-21945 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves 4 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the java-17-openjdk-17.0.18.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* java-17-openjdk 17.0.18.0-1.1
* java-17-openjdk-demo 17.0.18.0-1.1
* java-17-openjdk-devel 17.0.18.0-1.1
* java-17-openjdk-headless 17.0.18.0-1.1
* java-17-openjdk-javadoc 17.0.18.0-1.1
* java-17-openjdk-jmods 17.0.18.0-1.1
* java-17-openjdk-src 17.0.18.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-21925.html
* https://www.suse.com/security/cve/CVE-2026-21932.html
* https://www.suse.com/security/cve/CVE-2026-21933.html
* https://www.suse.com/security/cve/CVE-2026-21945.html
openSUSE-SU-2026:10093-1: moderate: java-21-openjdk-21.0.10.0-1.1 on GA media
# java-21-openjdk-21.0.10.0-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10093-1
Rating: moderate
Cross-References:
* CVE-2026-21925
* CVE-2026-21932
* CVE-2026-21933
* CVE-2026-21945
CVSS scores:
* CVE-2026-21925 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21932 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
* CVE-2026-21933 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-21945 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves 4 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the java-21-openjdk-21.0.10.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* java-21-openjdk 21.0.10.0-1.1
* java-21-openjdk-demo 21.0.10.0-1.1
* java-21-openjdk-devel 21.0.10.0-1.1
* java-21-openjdk-headless 21.0.10.0-1.1
* java-21-openjdk-javadoc 21.0.10.0-1.1
* java-21-openjdk-jmods 21.0.10.0-1.1
* java-21-openjdk-src 21.0.10.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-21925.html
* https://www.suse.com/security/cve/CVE-2026-21932.html
* https://www.suse.com/security/cve/CVE-2026-21933.html
* https://www.suse.com/security/cve/CVE-2026-21945.html
openSUSE-SU-2026:10094-1: moderate: libmatio-devel-1.5.30-1.1 on GA media
# libmatio-devel-1.5.30-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10094-1
Rating: moderate
Cross-References:
* CVE-2025-50343
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the libmatio-devel-1.5.30-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libmatio-devel 1.5.30-1.1
* libmatio14 1.5.30-1.1
* matio-tools 1.5.30-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-50343.html
openSUSE-SU-2026:10090-1: moderate: google-osconfig-agent-20260119.00-1.1 on GA media
# google-osconfig-agent-20260119.00-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10090-1
Rating: moderate
Cross-References:
* CVE-2023-45288
CVSS scores:
* CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the google-osconfig-agent-20260119.00-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* google-osconfig-agent 20260119.00-1.1
## References:
* https://www.suse.com/security/cve/CVE-2023-45288.html
openSUSE-SU-2026:10088-1: moderate: cups-2.4.16-1.1 on GA media
# cups-2.4.16-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10088-1
Rating: moderate
Cross-References:
* CVE-2025-58436
* CVE-2025-61915
CVSS scores:
* CVE-2025-58436 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-58436 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61915 ( SUSE ): 6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
* CVE-2025-61915 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the cups-2.4.16-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* cups 2.4.16-1.1
* cups-client 2.4.16-1.1
* cups-config 2.4.16-1.1
* cups-ddk 2.4.16-1.1
* cups-devel 2.4.16-1.1
* cups-devel-32bit 2.4.16-1.1
* libcups2 2.4.16-1.1
* libcups2-32bit 2.4.16-1.1
* libcupsimage2 2.4.16-1.1
* libcupsimage2-32bit 2.4.16-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-58436.html
* https://www.suse.com/security/cve/CVE-2025-61915.html
openSUSE-SU-2026:10091-1: moderate: java-11-openjdk-11.0.30.0-1.1 on GA media
# java-11-openjdk-11.0.30.0-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10091-1
Rating: moderate
Cross-References:
* CVE-2026-21925
* CVE-2026-21932
* CVE-2026-21933
* CVE-2026-21945
CVSS scores:
* CVE-2026-21925 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21932 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
* CVE-2026-21933 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-21945 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves 4 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the java-11-openjdk-11.0.30.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* java-11-openjdk 11.0.30.0-1.1
* java-11-openjdk-demo 11.0.30.0-1.1
* java-11-openjdk-devel 11.0.30.0-1.1
* java-11-openjdk-headless 11.0.30.0-1.1
* java-11-openjdk-javadoc 11.0.30.0-1.1
* java-11-openjdk-jmods 11.0.30.0-1.1
* java-11-openjdk-src 11.0.30.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-21925.html
* https://www.suse.com/security/cve/CVE-2026-21932.html
* https://www.suse.com/security/cve/CVE-2026-21933.html
* https://www.suse.com/security/cve/CVE-2026-21945.html
openSUSE-SU-2026:10095-1: moderate: libopenjp2-7-2.5.4-2.1 on GA media
# libopenjp2-7-2.5.4-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10095-1
Rating: moderate
Cross-References:
* CVE-2023-39327
CVSS scores:
* CVE-2023-39327 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-39327 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the libopenjp2-7-2.5.4-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libopenjp2-7 2.5.4-2.1
* libopenjp2-7-32bit 2.5.4-2.1
* libopenjp2-7-x86-64-v3 2.5.4-2.1
* openjpeg2 2.5.4-2.1
* openjpeg2-devel 2.5.4-2.1
* openjpeg2-devel-doc 2.5.4-2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-39327.html