SUSE-SU-2026:0142-1: moderate: Security update for govulncheck-vulndb
openSUSE-SU-2026:0022-1: moderate: Security update for chromium
openSUSE-SU-2026:0021-1: moderate: Security update for chromium
openSUSE-SU-2026:10064-1: moderate: go1.25-1.25.6-1.1 on GA media
openSUSE-SU-2026:10065-1: moderate: harfbuzz-devel-12.3.0-2.1 on GA media
openSUSE-SU-2026:10063-1: moderate: go1.24-1.24.12-1.1 on GA media
SUSE-SU-2026:0153-1: critical: Security update for MozillaThunderbird
SUSE-SU-2026:0166-1: important: Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0163-1: important: Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0142-1: moderate: Security update for govulncheck-vulndb
# Security update for govulncheck-vulndb
Announcement ID: SUSE-SU-2026:0142-1
Release Date: 2026-01-17T07:33:52Z
Rating: moderate
References:
* jsc#PED-11136
Affected Products:
* openSUSE Leap 15.6
An update that contains one feature can now be installed.
## Description:
This update for govulncheck-vulndb fixes the following issues:
* Update to version 0.0.20260114T191543 2026-01-14T19:15:43Z (jsc#PED-11136).
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2025-4248 CVE-2025-62690 GHSA-q66g-q98c-q454
* GO-2025-4251 CVE-2025-63389 GHSA-f6mr-38g8-39rg
* GO-2026-4273 CVE-2025-14987 GHSA-hmhp-gh8m-c8xp
* Update to version 0.0.20260113T164240 2026-01-13T16:42:40Z (jsc#PED-11136).
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2025-4269 CVE-2025-15107 GHSA-43h9-hc38-qph5
* GO-2025-4272 CVE-2025-14986 GHSA-p2gr-hm8g-q772
* GO-2026-4274 CVE-2025-69413 GHSA-pc73-rj2c-wvf9
* GO-2026-4275 CVE-2025-14273 GHSA-qvmc-92vg-6r35
* GO-2026-4277 CVE-2026-21483 GHSA-jmr4-p576-v565
* GO-2026-4278 CVE-2024-6717 GHSA-5mqx-rpxv-mvxj
* GO-2026-4279 GHSA-4c5f-9mj4-m247
* GO-2026-4280 GHSA-hjr9-wj7v-7hv8
* GO-2026-4281 CVE-2025-62877 GHSA-6g8q-hp2j-gvwv
* GO-2026-4283 CVE-2025-68954 GHSA-8c39-xppg-479c
* GO-2026-4284 CVE-2026-21859 GHSA-8v65-47jx-7mfr
* GO-2026-4285 GHSA-gg4x-fgg2-h9w9
* GO-2026-4286 CVE-2026-0650 GHSA-rwp9-5g7q-73q3
* GO-2026-4287 CVE-2026-21885 GHSA-xwh2-742g-w3wp
* GO-2026-4289 CVE-2025-68151 GHSA-527x-5wrf-22m2
* GO-2026-4290 CVE-2026-22253 GHSA-6jm8-x3g6-r33j
* GO-2026-4292 CVE-2026-22688 GHSA-78h3-63c4-5fqc
* GO-2026-4293 CVE-2026-22687 GHSA-pcwc-3fw3-8cqv
* GO-2026-4295 CVE-2017-18895 GHSA-h742-xx59-r9pq
* GO-2026-4296 CVE-2017-18893 GHSA-887v-xh2x-47cm
* GO-2026-4297 CVE-2017-18894 GHSA-gg42-mwr6-p82c
* GO-2026-4298 CVE-2017-18891 GHSA-vrh2-rprg-rgc6
* GO-2026-4299 CVE-2017-18896 GHSA-63wg-qmrv-7q66
* GO-2026-4300 CVE-2017-18898 GHSA-9589-mq83-f749
* GO-2026-4301 CVE-2017-18897 GHSA-f7c3-7vp3-44p6
* GO-2026-4302 CVE-2017-18904 GHSA-8pff-p3gx-w4jf
* GO-2026-4303 CVE-2017-18900 GHSA-8q4v-35v6-g8wr
* GO-2026-4304 CVE-2017-18901 GHSA-c253-8hr4-r8v9
* GO-2026-4306 CVE-2017-18905 GHSA-g24c-fx4v-xg9w
* GO-2026-4308 CVE-2025-60538 GHSA-mw8h-g64c-rxv4
* GO-2026-4309 CVE-2026-22703 GHSA-whqx-f9j3-ch6m
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-142=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* govulncheck-vulndb-0.0.20260114T191543-150000.1.137.1
## References:
* https://jira.suse.com/browse/PED-11136
openSUSE-SU-2026:0022-1: moderate: Security update for chromium
openSUSE Security Update: Security update for chromium
_______________________________
Announcement ID: openSUSE-SU-2026:0022-1
Rating: moderate
References: #1256614
Cross-References: CVE-2026-0899 CVE-2026-0900 CVE-2026-0901
CVE-2026-0902 CVE-2026-0903 CVE-2026-0904
CVE-2026-0905 CVE-2026-0906 CVE-2026-0907
CVE-2026-0908
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that fixes 10 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
- Chromium 144.0.7559.59 (boo#1256614)
* CVE-2026-0899: Out of bounds memory access in V8
* CVE-2026-0900: Inappropriate implementation in V8
* CVE-2026-0901: Inappropriate implementation in Blink
* CVE-2026-0902: Inappropriate implementation in V8
* CVE-2026-0903: Insufficient validation of untrusted input in Downloads
* CVE-2026-0904: Incorrect security UI in Digital Credentials
* CVE-2026-0905: Insufficient policy enforcement in Network
* CVE-2026-0906: Incorrect security UI
* CVE-2026-0907: Incorrect security UI in Split View
* CVE-2026-0908: Use after free in ANGLE
- use noopenh264 where available
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-22=1
Package List:
- openSUSE Backports SLE-15-SP7 (aarch64 ppc64le x86_64):
chromedriver-144.0.7559.59-bp157.2.100.1
chromium-144.0.7559.59-bp157.2.100.1
References:
https://www.suse.com/security/cve/CVE-2026-0899.html
https://www.suse.com/security/cve/CVE-2026-0900.html
https://www.suse.com/security/cve/CVE-2026-0901.html
https://www.suse.com/security/cve/CVE-2026-0902.html
https://www.suse.com/security/cve/CVE-2026-0903.html
https://www.suse.com/security/cve/CVE-2026-0904.html
https://www.suse.com/security/cve/CVE-2026-0905.html
https://www.suse.com/security/cve/CVE-2026-0906.html
https://www.suse.com/security/cve/CVE-2026-0907.html
https://www.suse.com/security/cve/CVE-2026-0908.html
https://bugzilla.suse.com/1256614
openSUSE-SU-2026:0021-1: moderate: Security update for chromium
openSUSE Security Update: Security update for chromium
_______________________________
Announcement ID: openSUSE-SU-2026:0021-1
Rating: moderate
References: #1256614
Cross-References: CVE-2026-0899 CVE-2026-0900 CVE-2026-0901
CVE-2026-0902 CVE-2026-0903 CVE-2026-0904
CVE-2026-0905 CVE-2026-0906 CVE-2026-0907
CVE-2026-0908
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________
An update that fixes 10 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
- Chromium 144.0.7559.59 (boo#1256614)
* CVE-2026-0899: Out of bounds memory access in V8
* CVE-2026-0900: Inappropriate implementation in V8
* CVE-2026-0901: Inappropriate implementation in Blink
* CVE-2026-0902: Inappropriate implementation in V8
* CVE-2026-0903: Insufficient validation of untrusted input in Downloads
* CVE-2026-0904: Incorrect security UI in Digital Credentials
* CVE-2026-0905: Insufficient policy enforcement in Network
* CVE-2026-0906: Incorrect security UI
* CVE-2026-0907: Incorrect security UI in Split View
* CVE-2026-0908: Use after free in ANGLE
- use noopenh264 where available
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2026-21=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le x86_64):
chromedriver-144.0.7559.59-bp156.2.215.1
chromium-144.0.7559.59-bp156.2.215.1
References:
https://www.suse.com/security/cve/CVE-2026-0899.html
https://www.suse.com/security/cve/CVE-2026-0900.html
https://www.suse.com/security/cve/CVE-2026-0901.html
https://www.suse.com/security/cve/CVE-2026-0902.html
https://www.suse.com/security/cve/CVE-2026-0903.html
https://www.suse.com/security/cve/CVE-2026-0904.html
https://www.suse.com/security/cve/CVE-2026-0905.html
https://www.suse.com/security/cve/CVE-2026-0906.html
https://www.suse.com/security/cve/CVE-2026-0907.html
https://www.suse.com/security/cve/CVE-2026-0908.html
https://bugzilla.suse.com/1256614
openSUSE-SU-2026:10064-1: moderate: go1.25-1.25.6-1.1 on GA media
# go1.25-1.25.6-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10064-1
Rating: moderate
Cross-References:
* CVE-2025-61726
* CVE-2025-61728
* CVE-2025-61730
* CVE-2025-61731
* CVE-2025-68119
* CVE-2025-68121
CVSS scores:
* CVE-2025-61726 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61726 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61728 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61730 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2025-61730 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-61731 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-61731 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68119 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68119 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68121 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2025-68121 ( SUSE ): 7.2 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 6 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the go1.25-1.25.6-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* go1.25 1.25.6-1.1
* go1.25-doc 1.25.6-1.1
* go1.25-libstd 1.25.6-1.1
* go1.25-race 1.25.6-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-61726.html
* https://www.suse.com/security/cve/CVE-2025-61728.html
* https://www.suse.com/security/cve/CVE-2025-61730.html
* https://www.suse.com/security/cve/CVE-2025-61731.html
* https://www.suse.com/security/cve/CVE-2025-68119.html
* https://www.suse.com/security/cve/CVE-2025-68121.html
openSUSE-SU-2026:10065-1: moderate: harfbuzz-devel-12.3.0-2.1 on GA media
# harfbuzz-devel-12.3.0-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10065-1
Rating: moderate
Cross-References:
* CVE-2026-22693
CVSS scores:
* CVE-2026-22693 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22693 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the harfbuzz-devel-12.3.0-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* harfbuzz-devel 12.3.0-2.1
* harfbuzz-tools 12.3.0-2.1
* libharfbuzz-cairo0 12.3.0-2.1
* libharfbuzz-cairo0-32bit 12.3.0-2.1
* libharfbuzz-gobject0 12.3.0-2.1
* libharfbuzz-gobject0-32bit 12.3.0-2.1
* libharfbuzz-icu0 12.3.0-2.1
* libharfbuzz-icu0-32bit 12.3.0-2.1
* libharfbuzz-subset0 12.3.0-2.1
* libharfbuzz-subset0-32bit 12.3.0-2.1
* libharfbuzz0 12.3.0-2.1
* libharfbuzz0-32bit 12.3.0-2.1
* typelib-1_0-HarfBuzz-0_0 12.3.0-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-22693.html
openSUSE-SU-2026:10063-1: moderate: go1.24-1.24.12-1.1 on GA media
# go1.24-1.24.12-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10063-1
Rating: moderate
Cross-References:
* CVE-2025-61726
* CVE-2025-61728
* CVE-2025-61730
* CVE-2025-61731
* CVE-2025-68119
* CVE-2025-68121
CVSS scores:
* CVE-2025-61726 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61726 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61728 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61730 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2025-61730 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-61731 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-61731 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68119 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68119 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68121 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2025-68121 ( SUSE ): 7.2 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 6 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the go1.24-1.24.12-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* go1.24 1.24.12-1.1
* go1.24-doc 1.24.12-1.1
* go1.24-libstd 1.24.12-1.1
* go1.24-race 1.24.12-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-61726.html
* https://www.suse.com/security/cve/CVE-2025-61728.html
* https://www.suse.com/security/cve/CVE-2025-61730.html
* https://www.suse.com/security/cve/CVE-2025-61731.html
* https://www.suse.com/security/cve/CVE-2025-68119.html
* https://www.suse.com/security/cve/CVE-2025-68121.html
SUSE-SU-2026:0153-1: critical: Security update for MozillaThunderbird
# Security update for MozillaThunderbird
Announcement ID: SUSE-SU-2026:0153-1
Release Date: 2026-01-19T11:14:05Z
Rating: critical
References:
* bsc#1256340
Cross-References:
* CVE-2025-14327
* CVE-2026-0877
* CVE-2026-0878
* CVE-2026-0879
* CVE-2026-0880
* CVE-2026-0882
* CVE-2026-0883
* CVE-2026-0884
* CVE-2026-0885
* CVE-2026-0886
* CVE-2026-0887
* CVE-2026-0890
* CVE-2026-0891
CVSS scores:
* CVE-2025-14327 ( SUSE ): 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-14327 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2025-14327 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-14327 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-0877 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2026-0878 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
* CVE-2026-0879 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-0880 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-0882 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-0883 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-0884 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-0885 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-0886 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-0887 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-0890 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
* CVE-2026-0891 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Linux Enterprise Workstation Extension 15 SP7
* SUSE Package Hub 15 15-SP7
An update that solves 13 vulnerabilities can now be installed.
## Description:
This update for MozillaThunderbird fixes the following issues:
MFSA 2026-05 (bsc#1256340):
* CVE-2026-0877: Mitigation bypass in the DOM in Security component
* CVE-2026-0878: Sandbox escape due to incorrect boundary conditions in the
Graphics in CanvasWebGL component
* CVE-2026-0879: Sandbox escape due to incorrect boundary conditions in the
Graphics component
* CVE-2026-0880: Sandbox escape due to integer overflow in the Graphics
component
* CVE-2026-0882: Use-after-free in the IPC component
* CVE-2025-14327: Spoofing issue in the Downloads Panel component
* CVE-2026-0883: Information disclosure in the Networking component
* CVE-2026-0884: Use-after-free in the JavaScript Engine component
* CVE-2026-0885: Use-after-free in the JavaScript: GC component
* CVE-2026-0886: Incorrect boundary conditions in the Graphics component
* CVE-2026-0887: Clickjacking issue, information disclosure in the PDF Viewer
component
* CVE-2026-0890: Spoofing issue in the DOM in Copy & Paste and Drag & Drop
component
* CVE-2026-0891: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird
ESR 140.7, Firefox 147 and Thunderbird 147
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-153=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-153=1
* SUSE Linux Enterprise Workstation Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-153=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-translations-common-140.7.0-150200.8.251.1
* MozillaThunderbird-debuginfo-140.7.0-150200.8.251.1
* MozillaThunderbird-translations-other-140.7.0-150200.8.251.1
* MozillaThunderbird-140.7.0-150200.8.251.1
* MozillaThunderbird-debugsource-140.7.0-150200.8.251.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
* MozillaThunderbird-translations-common-140.7.0-150200.8.251.1
* MozillaThunderbird-debuginfo-140.7.0-150200.8.251.1
* MozillaThunderbird-translations-other-140.7.0-150200.8.251.1
* MozillaThunderbird-140.7.0-150200.8.251.1
* MozillaThunderbird-debugsource-140.7.0-150200.8.251.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
* MozillaThunderbird-translations-common-140.7.0-150200.8.251.1
* MozillaThunderbird-debuginfo-140.7.0-150200.8.251.1
* MozillaThunderbird-translations-other-140.7.0-150200.8.251.1
* MozillaThunderbird-140.7.0-150200.8.251.1
* MozillaThunderbird-debugsource-140.7.0-150200.8.251.1
## References:
* https://www.suse.com/security/cve/CVE-2025-14327.html
* https://www.suse.com/security/cve/CVE-2026-0877.html
* https://www.suse.com/security/cve/CVE-2026-0878.html
* https://www.suse.com/security/cve/CVE-2026-0879.html
* https://www.suse.com/security/cve/CVE-2026-0880.html
* https://www.suse.com/security/cve/CVE-2026-0882.html
* https://www.suse.com/security/cve/CVE-2026-0883.html
* https://www.suse.com/security/cve/CVE-2026-0884.html
* https://www.suse.com/security/cve/CVE-2026-0885.html
* https://www.suse.com/security/cve/CVE-2026-0886.html
* https://www.suse.com/security/cve/CVE-2026-0887.html
* https://www.suse.com/security/cve/CVE-2026-0890.html
* https://www.suse.com/security/cve/CVE-2026-0891.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256340
SUSE-SU-2026:0166-1: important: Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4)
# Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise
15 SP4)
Announcement ID: SUSE-SU-2026:0166-1
Release Date: 2026-01-19T15:05:22Z
Rating: important
References:
* bsc#1235815
* bsc#1248400
* bsc#1248615
* bsc#1248670
* bsc#1249242
* bsc#1250665
* bsc#1251165
* bsc#1251203
* bsc#1251787
* bsc#1253437
* bsc#1254451
Cross-References:
* CVE-2022-50233
* CVE-2022-50327
* CVE-2022-50409
* CVE-2022-50490
* CVE-2023-53676
* CVE-2024-57849
* CVE-2024-58239
* CVE-2025-38476
* CVE-2025-38572
* CVE-2025-38608
* CVE-2025-40204
CVSS scores:
* CVE-2022-50233 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50327 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50409 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50490 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53676 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57849 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58239 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38476 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38608 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves 11 vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.147 fixes
various security issues
The following security issues were fixed:
* CVE-2022-50233: bluetooth: device name can cause reading kernel memory by
not supplying terminal \0 (bsc#1249242).
* CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return
value (bsc#1254451).
* CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in
sk_stream_wait_memory (bsc#1250665).
* CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace
(bsc#1251165).
* CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in
lio_target_nacl_info_show() (bsc#1251787).
* CVE-2024-57849: s390/cpum_sf: handle CPU hotplug remove during sampling
(bsc#1235815).
* CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA
(bsc#1248615).
* CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline()
(bsc#1251203).
* CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment()
(bsc#1248400).
* CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data()
in ktls (bsc#1248670).
* CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-166=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-166=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_147-default-debuginfo-18-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_35-debugsource-18-150400.2.1
* kernel-livepatch-5_14_21-150400_24_147-default-18-150400.2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_147-default-debuginfo-18-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_35-debugsource-18-150400.2.1
* kernel-livepatch-5_14_21-150400_24_147-default-18-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50233.html
* https://www.suse.com/security/cve/CVE-2022-50327.html
* https://www.suse.com/security/cve/CVE-2022-50409.html
* https://www.suse.com/security/cve/CVE-2022-50490.html
* https://www.suse.com/security/cve/CVE-2023-53676.html
* https://www.suse.com/security/cve/CVE-2024-57849.html
* https://www.suse.com/security/cve/CVE-2024-58239.html
* https://www.suse.com/security/cve/CVE-2025-38476.html
* https://www.suse.com/security/cve/CVE-2025-38572.html
* https://www.suse.com/security/cve/CVE-2025-38608.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://bugzilla.suse.com/show_bug.cgi?id=1235815
* https://bugzilla.suse.com/show_bug.cgi?id=1248400
* https://bugzilla.suse.com/show_bug.cgi?id=1248615
* https://bugzilla.suse.com/show_bug.cgi?id=1248670
* https://bugzilla.suse.com/show_bug.cgi?id=1249242
* https://bugzilla.suse.com/show_bug.cgi?id=1250665
* https://bugzilla.suse.com/show_bug.cgi?id=1251165
* https://bugzilla.suse.com/show_bug.cgi?id=1251203
* https://bugzilla.suse.com/show_bug.cgi?id=1251787
* https://bugzilla.suse.com/show_bug.cgi?id=1253437
* https://bugzilla.suse.com/show_bug.cgi?id=1254451
SUSE-SU-2026:0163-1: important: Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4)
# Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise
15 SP4)
Announcement ID: SUSE-SU-2026:0163-1
Release Date: 2026-01-19T15:35:01Z
Rating: important
References:
* bsc#1248400
* bsc#1248615
* bsc#1248670
* bsc#1249242
* bsc#1250665
* bsc#1251165
* bsc#1251203
* bsc#1251787
* bsc#1253437
* bsc#1254451
Cross-References:
* CVE-2022-50233
* CVE-2022-50327
* CVE-2022-50409
* CVE-2022-50490
* CVE-2023-53676
* CVE-2024-58239
* CVE-2025-38476
* CVE-2025-38572
* CVE-2025-38608
* CVE-2025-40204
CVSS scores:
* CVE-2022-50233 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50327 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50409 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50490 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53676 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58239 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38476 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38608 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves 10 vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.170 fixes
various security issues
The following security issues were fixed:
* CVE-2022-50233: bluetooth: device name can cause reading kernel memory by
not supplying terminal \0 (bsc#1249242).
* CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return
value (bsc#1254451).
* CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in
sk_stream_wait_memory (bsc#1250665).
* CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace
(bsc#1251165).
* CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in
lio_target_nacl_info_show() (bsc#1251787).
* CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA
(bsc#1248615).
* CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline()
(bsc#1251203).
* CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment()
(bsc#1248400).
* CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data()
in ktls (bsc#1248670).
* CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-163=1 SUSE-2026-167=1 SUSE-2026-164=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-163=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2026-167=1 SUSE-SLE-Module-Live-
Patching-15-SP4-2026-164=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-13-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_41-debugsource-11-150400.2.1
* kernel-livepatch-5_14_21-150400_24_170-default-10-150400.2.1
* kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_42-debugsource-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_36-debugsource-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_167-default-11-150400.2.1
* kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-11-150400.2.1
* kernel-livepatch-5_14_21-150400_24_150-default-13-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-13-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_41-debugsource-11-150400.2.1
* kernel-livepatch-5_14_21-150400_24_170-default-10-150400.2.1
* kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_42-debugsource-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_36-debugsource-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_167-default-11-150400.2.1
* kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-11-150400.2.1
* kernel-livepatch-5_14_21-150400_24_150-default-13-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50233.html
* https://www.suse.com/security/cve/CVE-2022-50327.html
* https://www.suse.com/security/cve/CVE-2022-50409.html
* https://www.suse.com/security/cve/CVE-2022-50490.html
* https://www.suse.com/security/cve/CVE-2023-53676.html
* https://www.suse.com/security/cve/CVE-2024-58239.html
* https://www.suse.com/security/cve/CVE-2025-38476.html
* https://www.suse.com/security/cve/CVE-2025-38572.html
* https://www.suse.com/security/cve/CVE-2025-38608.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://bugzilla.suse.com/show_bug.cgi?id=1248400
* https://bugzilla.suse.com/show_bug.cgi?id=1248615
* https://bugzilla.suse.com/show_bug.cgi?id=1248670
* https://bugzilla.suse.com/show_bug.cgi?id=1249242
* https://bugzilla.suse.com/show_bug.cgi?id=1250665
* https://bugzilla.suse.com/show_bug.cgi?id=1251165
* https://bugzilla.suse.com/show_bug.cgi?id=1251203
* https://bugzilla.suse.com/show_bug.cgi?id=1251787
* https://bugzilla.suse.com/show_bug.cgi?id=1253437
* https://bugzilla.suse.com/show_bug.cgi?id=1254451