SUSE 5612 Published by

SUSE-SU-2026:1203-1: important: Security update for ImageMagick
SUSE-SU-2026:1206-1: important: Security update for python
SUSE-SU-2026:1205-1: important: Security update for govulncheck-vulndb
SUSE-SU-2026:1192-1: important: Security update for python-pyOpenSSL
SUSE-SU-2026:1193-1: important: Security update for gimp
SUSE-SU-2026:1194-1: important: Security update for google-cloud-sap-agent




SUSE-SU-2026:1203-1: important: Security update for ImageMagick


# Security update for ImageMagick

Announcement ID: SUSE-SU-2026:1203-1
Release Date: 2026-04-07T12:25:00Z
Rating: important
References:

* bsc#1259446
* bsc#1259447
* bsc#1259448
* bsc#1259450
* bsc#1259451
* bsc#1259452
* bsc#1259455
* bsc#1259456
* bsc#1259457
* bsc#1259463
* bsc#1259464
* bsc#1259466
* bsc#1259467
* bsc#1259468
* bsc#1259497
* bsc#1259528
* bsc#1259612
* bsc#1259872
* bsc#1260874
* bsc#1260879

Cross-References:

* CVE-2026-28493
* CVE-2026-28494
* CVE-2026-28686
* CVE-2026-28687
* CVE-2026-28688
* CVE-2026-28689
* CVE-2026-28690
* CVE-2026-28691
* CVE-2026-28692
* CVE-2026-28693
* CVE-2026-30883
* CVE-2026-30929
* CVE-2026-30935
* CVE-2026-30936
* CVE-2026-30937
* CVE-2026-31853
* CVE-2026-32259
* CVE-2026-32636
* CVE-2026-33535
* CVE-2026-33536

CVSS scores:

* CVE-2026-28493 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28493 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-28493 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-28494 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28494 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-28494 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
* CVE-2026-28686 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28686 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-28686 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-28687 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28687 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28687 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-28688 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28688 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28688 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-28688 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-28689 ( SUSE ): 7.2
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-28689 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-28689 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-28690 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28690 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-28690 ( NVD ): 6.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
* CVE-2026-28690 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H
* CVE-2026-28691 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28691 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28691 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28692 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28692 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-28692 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-28693 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28693 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-28693 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-30883 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-30883 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-30883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-30883 ( NVD ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-30929 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-30929 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-30929 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-30929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-30935 ( SUSE ): 4.8
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-30935 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
* CVE-2026-30935 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
* CVE-2026-30936 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-30936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-30936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-30937 ( SUSE ): 7.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-30937 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-30937 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-30937 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-31853 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31853 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-31853 ( NVD ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-31853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-32259 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-32259 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-32259 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-32636 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-32636 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-32636 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-32636 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33535 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33535 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33535 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33536 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33536 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-33536 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33536 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves 20 vulnerabilities can now be installed.

## Description:

This update for ImageMagick fixes the following issues:

* CVE-2026-28493: integer overflow in the SIXEL decoder leads to out-of-bounds
write (bsc#1259446).
* CVE-2026-28494: missing bounds checks in the morphology kernel parsing
functions can lead to a stack buffer overflow (bsc#1259447).
* CVE-2026-28686: undersized output buffer allocation in the PCL encoder can
lead to a heap buffer overflow (bsc#1259448).
* CVE-2026-28687: heap use-after-free vulnerability in the MSL decoder via a
crafted MSL file (bsc#1259450).
* CVE-2026-28688: heap use-after-free in the MSL encoder when a cloned image
is destroyed twice (bsc#1259451).
* CVE-2026-28689: `domain="path"` authorization is checked before
final file open/use and allows for read/write bypass via symlink swaps
(bsc#1259452).
* CVE-2026-28690: missing bounds check in the MNG encoder can lead to a stack
buffer overflow (bsc#1259456).
* CVE-2026-28691: missing check in the JBIG decoder can lead to an
uninitialized pointer dereference (bsc#1259455).
* CVE-2026-28692: 32-bit integer overflow in MAT decoder can lead to a heap
buffer over-read (bsc#1259457).
* CVE-2026-28693: integer overflow in the DIB coder can lead to an out-of-
bounds read or write (bsc#1259466).
* CVE-2026-30883: missing bounds check when encoding a PNG image can lead to a
heap buffer over-write (bsc#1259467).
* CVE-2026-30929: improper use of fixed-size stack buffer in `MagnifyImage`can
lead to a stack buffer overflow (bsc#1259468).
* CVE-2026-30935: heap-based buffer over-read in BilateralBlurImage
(bsc#1259497).
* CVE-2026-30936: Heap Buffer Overflow in WaveletDenoiseImage (bsc#1259464).
* CVE-2026-30937: Heap buffer overflow in XWD encoder due to CARD32 arithmetic
overflow (bsc#1259463).
* CVE-2026-31853: heap buffer overflow leads to crash in the SFW decoder of
32-bit systems when processing extremely large images (bsc#1259528).
* CVE-2026-32259: memory allocation fails can lead to out of bound write
(bsc#1259612).
* CVE-2026-32636: Denial of Service via out-of-bounds write in NewXMLTree
method (bsc#1259872).
* CVE-2026-33535: Out-of-Bounds write of a zero byte in X11 display
interaction (bsc#1260874).
* CVE-2026-33536: Denial of Service via out-of-bounds write (bsc#1260879).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1203=1 openSUSE-SLE-15.6-2026-1203=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1203=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1203=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* perl-PerlMagick-debuginfo-7.1.1.21-150600.3.50.1
* perl-PerlMagick-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.50.1
* ImageMagick-devel-7.1.1.21-150600.3.50.1
* ImageMagick-debuginfo-7.1.1.21-150600.3.50.1
* ImageMagick-extra-7.1.1.21-150600.3.50.1
* libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.50.1
* libMagick++-devel-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.50.1
* ImageMagick-extra-debuginfo-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-SUSE-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.50.1
* libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.50.1
* libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.50.1
* libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.50.1
* ImageMagick-debugsource-7.1.1.21-150600.3.50.1
* ImageMagick-7.1.1.21-150600.3.50.1
* libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.50.1
* libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.50.1
* openSUSE Leap 15.6 (x86_64)
* libMagickWand-7_Q16HDRI10-32bit-debuginfo-7.1.1.21-150600.3.50.1
* ImageMagick-devel-32bit-7.1.1.21-150600.3.50.1
* libMagickCore-7_Q16HDRI10-32bit-debuginfo-7.1.1.21-150600.3.50.1
* libMagick++-7_Q16HDRI5-32bit-debuginfo-7.1.1.21-150600.3.50.1
* libMagick++-devel-32bit-7.1.1.21-150600.3.50.1
* libMagick++-7_Q16HDRI5-32bit-7.1.1.21-150600.3.50.1
* libMagickCore-7_Q16HDRI10-32bit-7.1.1.21-150600.3.50.1
* libMagickWand-7_Q16HDRI10-32bit-7.1.1.21-150600.3.50.1
* openSUSE Leap 15.6 (noarch)
* ImageMagick-doc-7.1.1.21-150600.3.50.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libMagick++-7_Q16HDRI5-64bit-7.1.1.21-150600.3.50.1
* libMagickWand-7_Q16HDRI10-64bit-debuginfo-7.1.1.21-150600.3.50.1
* libMagick++-devel-64bit-7.1.1.21-150600.3.50.1
* libMagickWand-7_Q16HDRI10-64bit-7.1.1.21-150600.3.50.1
* libMagickCore-7_Q16HDRI10-64bit-debuginfo-7.1.1.21-150600.3.50.1
* libMagickCore-7_Q16HDRI10-64bit-7.1.1.21-150600.3.50.1
* libMagick++-7_Q16HDRI5-64bit-debuginfo-7.1.1.21-150600.3.50.1
* ImageMagick-devel-64bit-7.1.1.21-150600.3.50.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* perl-PerlMagick-debuginfo-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.50.1
* ImageMagick-devel-7.1.1.21-150600.3.50.1
* ImageMagick-debuginfo-7.1.1.21-150600.3.50.1
* libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.50.1
* perl-PerlMagick-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.50.1
* libMagick++-devel-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.50.1
* libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-SUSE-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.50.1
* libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.50.1
* libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.50.1
* ImageMagick-debugsource-7.1.1.21-150600.3.50.1
* ImageMagick-7.1.1.21-150600.3.50.1
* libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.50.1
* libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.50.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* perl-PerlMagick-debuginfo-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.50.1
* ImageMagick-devel-7.1.1.21-150600.3.50.1
* ImageMagick-debuginfo-7.1.1.21-150600.3.50.1
* libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.50.1
* perl-PerlMagick-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.50.1
* libMagick++-devel-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.50.1
* libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-SUSE-7.1.1.21-150600.3.50.1
* ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.50.1
* libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.50.1
* libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.50.1
* ImageMagick-debugsource-7.1.1.21-150600.3.50.1
* ImageMagick-7.1.1.21-150600.3.50.1
* libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.50.1
* libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.50.1

## References:

* https://www.suse.com/security/cve/CVE-2026-28493.html
* https://www.suse.com/security/cve/CVE-2026-28494.html
* https://www.suse.com/security/cve/CVE-2026-28686.html
* https://www.suse.com/security/cve/CVE-2026-28687.html
* https://www.suse.com/security/cve/CVE-2026-28688.html
* https://www.suse.com/security/cve/CVE-2026-28689.html
* https://www.suse.com/security/cve/CVE-2026-28690.html
* https://www.suse.com/security/cve/CVE-2026-28691.html
* https://www.suse.com/security/cve/CVE-2026-28692.html
* https://www.suse.com/security/cve/CVE-2026-28693.html
* https://www.suse.com/security/cve/CVE-2026-30883.html
* https://www.suse.com/security/cve/CVE-2026-30929.html
* https://www.suse.com/security/cve/CVE-2026-30935.html
* https://www.suse.com/security/cve/CVE-2026-30936.html
* https://www.suse.com/security/cve/CVE-2026-30937.html
* https://www.suse.com/security/cve/CVE-2026-31853.html
* https://www.suse.com/security/cve/CVE-2026-32259.html
* https://www.suse.com/security/cve/CVE-2026-32636.html
* https://www.suse.com/security/cve/CVE-2026-33535.html
* https://www.suse.com/security/cve/CVE-2026-33536.html
* https://bugzilla.suse.com/show_bug.cgi?id=1259446
* https://bugzilla.suse.com/show_bug.cgi?id=1259447
* https://bugzilla.suse.com/show_bug.cgi?id=1259448
* https://bugzilla.suse.com/show_bug.cgi?id=1259450
* https://bugzilla.suse.com/show_bug.cgi?id=1259451
* https://bugzilla.suse.com/show_bug.cgi?id=1259452
* https://bugzilla.suse.com/show_bug.cgi?id=1259455
* https://bugzilla.suse.com/show_bug.cgi?id=1259456
* https://bugzilla.suse.com/show_bug.cgi?id=1259457
* https://bugzilla.suse.com/show_bug.cgi?id=1259463
* https://bugzilla.suse.com/show_bug.cgi?id=1259464
* https://bugzilla.suse.com/show_bug.cgi?id=1259466
* https://bugzilla.suse.com/show_bug.cgi?id=1259467
* https://bugzilla.suse.com/show_bug.cgi?id=1259468
* https://bugzilla.suse.com/show_bug.cgi?id=1259497
* https://bugzilla.suse.com/show_bug.cgi?id=1259528
* https://bugzilla.suse.com/show_bug.cgi?id=1259612
* https://bugzilla.suse.com/show_bug.cgi?id=1259872
* https://bugzilla.suse.com/show_bug.cgi?id=1260874
* https://bugzilla.suse.com/show_bug.cgi?id=1260879



SUSE-SU-2026:1206-1: important: Security update for python


# Security update for python

Announcement ID: SUSE-SU-2026:1206-1
Release Date: 2026-04-07T14:19:01Z
Rating: important
References:

* bsc#1259611
* bsc#1259734
* bsc#1259735
* bsc#1260026

Cross-References:

* CVE-2025-13462
* CVE-2026-3644
* CVE-2026-4224
* CVE-2026-4519

CVSS scores:

* CVE-2025-13462 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-13462 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-13462 ( NVD ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-3644 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-3644 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-3644 ( NVD ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-4224 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-4224 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-4224 ( NVD ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-4519 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N
* CVE-2026-4519 ( SUSE ): 6.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N
* CVE-2026-4519 ( NVD ): 7.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves four vulnerabilities can now be installed.

## Description:

This update for python fixes the following issues:

* CVE-2025-13462: incorrect parsing of TarInfo when GNU long name and type
AREGTYPE are combined can lead to misinterpretation of tar archives
(bsc#1259611).
* CVE-2026-3644: incomplete control character validation in http.cookies can
lead to input validation bypass (bsc#1259734).
* CVE-2026-4224: parsing XML with deeply nested DTD content models can lead to
C stack overflow (bsc#1259735).
* CVE-2026-4519: failure to sanitize leading dashes in URLs in the
`webbrowser.open()` API can lead to web browser command line option
injection (bsc#1260026).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1206=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-1206=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python-base-debugsource-2.7.18-150000.111.1
* python-curses-2.7.18-150000.111.1
* python-tk-2.7.18-150000.111.1
* python-debugsource-2.7.18-150000.111.1
* python-devel-2.7.18-150000.111.1
* python-tk-debuginfo-2.7.18-150000.111.1
* libpython2_7-1_0-debuginfo-2.7.18-150000.111.1
* python-debuginfo-2.7.18-150000.111.1
* python-gdbm-debuginfo-2.7.18-150000.111.1
* python-xml-debuginfo-2.7.18-150000.111.1
* python-base-debuginfo-2.7.18-150000.111.1
* python-base-2.7.18-150000.111.1
* python-curses-debuginfo-2.7.18-150000.111.1
* python-2.7.18-150000.111.1
* python-demo-2.7.18-150000.111.1
* libpython2_7-1_0-2.7.18-150000.111.1
* python-gdbm-2.7.18-150000.111.1
* python-idle-2.7.18-150000.111.1
* python-xml-2.7.18-150000.111.1
* openSUSE Leap 15.6 (x86_64)
* python-32bit-debuginfo-2.7.18-150000.111.1
* python-32bit-2.7.18-150000.111.1
* libpython2_7-1_0-32bit-2.7.18-150000.111.1
* python-base-32bit-2.7.18-150000.111.1
* python-base-32bit-debuginfo-2.7.18-150000.111.1
* libpython2_7-1_0-32bit-debuginfo-2.7.18-150000.111.1
* openSUSE Leap 15.6 (noarch)
* python-doc-pdf-2.7.18-150000.111.1
* python-doc-2.7.18-150000.111.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
* python-base-debugsource-2.7.18-150000.111.1
* python-curses-2.7.18-150000.111.1
* python-debugsource-2.7.18-150000.111.1
* libpython2_7-1_0-debuginfo-2.7.18-150000.111.1
* python-debuginfo-2.7.18-150000.111.1
* python-gdbm-debuginfo-2.7.18-150000.111.1
* python-xml-debuginfo-2.7.18-150000.111.1
* python-base-debuginfo-2.7.18-150000.111.1
* python-base-2.7.18-150000.111.1
* python-curses-debuginfo-2.7.18-150000.111.1
* python-2.7.18-150000.111.1
* python-gdbm-2.7.18-150000.111.1
* libpython2_7-1_0-2.7.18-150000.111.1
* python-xml-2.7.18-150000.111.1

## References:

* https://www.suse.com/security/cve/CVE-2025-13462.html
* https://www.suse.com/security/cve/CVE-2026-3644.html
* https://www.suse.com/security/cve/CVE-2026-4224.html
* https://www.suse.com/security/cve/CVE-2026-4519.html
* https://bugzilla.suse.com/show_bug.cgi?id=1259611
* https://bugzilla.suse.com/show_bug.cgi?id=1259734
* https://bugzilla.suse.com/show_bug.cgi?id=1259735
* https://bugzilla.suse.com/show_bug.cgi?id=1260026



SUSE-SU-2026:1205-1: important: Security update for govulncheck-vulndb


# Security update for govulncheck-vulndb

Announcement ID: SUSE-SU-2026:1205-1
Release Date: 2026-04-07T14:18:21Z
Rating: important
References:

* jsc#PED-11136

Cross-References:

* CVE-2026-26060
* CVE-2026-26061
* CVE-2026-26233
* CVE-2026-27018
* CVE-2026-29180
* CVE-2026-32241
* CVE-2026-32286
* CVE-2026-32695
* CVE-2026-33026
* CVE-2026-33027
* CVE-2026-33028
* CVE-2026-33029
* CVE-2026-33030
* CVE-2026-33032
* CVE-2026-33186
* CVE-2026-33433
* CVE-2026-33487
* CVE-2026-33634
* CVE-2026-33747
* CVE-2026-33748
* CVE-2026-33903
* CVE-2026-33904
* CVE-2026-33906
* CVE-2026-33907
* CVE-2026-33990
* CVE-2026-33997
* CVE-2026-34040
* CVE-2026-34041
* CVE-2026-34042
* CVE-2026-34204
* CVE-2026-34385
* CVE-2026-34386
* CVE-2026-34388
* CVE-2026-34389

CVSS scores:

* CVE-2026-26060 ( NVD ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-26060 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-26061 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-26061 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-26233 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-26233 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-27018 ( NVD ): 7.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-29180 ( NVD ): 4.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-29180 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-32241 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-32286 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-32286 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-32286 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-32695 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32695 ( NVD ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2026-33026 ( NVD ): 9.4
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33026 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-33027 ( NVD ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33027 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33028 ( NVD ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33028 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33029 ( NVD ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33029 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33029 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33030 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-33030 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-33032 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33186 ( SUSE ): 8.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-33186 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33186 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33433 ( SUSE ): 5.1
CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N
* CVE-2026-33433 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
* CVE-2026-33433 ( NVD ): 5.1
CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33433 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33487 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-33634 ( SUSE ): 9.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2026-33634 ( SUSE ): 9.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-33634 ( NVD ): 9.4
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33634 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33747 ( SUSE ): 8.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33747 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33747 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33747 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33748 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-33748 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-33748 ( NVD ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33903 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33904 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33906 ( NVD ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33907 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33990 ( NVD ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33990 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33997 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2026-33997 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2026-34040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-34040 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-34041 ( NVD ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34041 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-34042 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
* CVE-2026-34204 ( NVD ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34204 ( NVD ): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-34385 ( NVD ): 6.2
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34386 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34386 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-34388 ( NVD ): 6.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34388 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-34389 ( NVD ): 4.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34389 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Affected Products:

* openSUSE Leap 15.6

An update that solves 34 vulnerabilities and contains one feature can now be
installed.

## Description:

This update for govulncheck-vulndb fixes the following issues:

Update to version 0.0.20260402T184258 2026-04-02T18:42:58Z (jsc#PED-11136).

Go CVE Numbering Authority IDs added or updated with aliases:

* GO-2026-4518 CVE-2026-32286 GHSA-jqcq-xjh3-6g23
* GO-2026-4753 CVE-2026-33487 GHSA-479m-364c-43vc
* GO-2026-4760 GHSA-hwqm-qvj9-4jr2
* GO-2026-4762 CVE-2026-33186 GHSA-p77j-4mvh-x3m3
* GO-2026-4764 GHSA-pcgw-qcv5-h8ch
* GO-2026-4858 CVE-2026-33747 GHSA-4c29-8rgm-jvjj
* GO-2026-4859 CVE-2026-33748 GHSA-4vrq-3vrq-g6gg
* GO-2026-4863 GHSA-g9ww-x58f-9g6m
* GO-2026-4872 CVE-2026-33907 GHSA-55q8-2gwx-29pc
* GO-2026-4873 CVE-2026-33906 GHSA-87j9-m7x6-hvw2
* GO-2026-4874 CVE-2026-33904 GHSA-9h59-p45g-445h
* GO-2026-4875 CVE-2026-33903 GHSA-f2f3-9cx3-wcmf
* GO-2026-4876 GHSA-prh4-vhfh-24mj
* GO-2026-4880 CVE-2026-32695 GHSA-67jx-r9pv-98rj
* GO-2026-4883 CVE-2026-33997 GHSA-pxq6-2prw-chj9
* GO-2026-4887 CVE-2026-34040 GHSA-x744-4wpc-v9h2
* GO-2026-4888 CVE-2026-26060 GHSA-3458-r943-hmx4
* GO-2026-4889 CVE-2026-26061 GHSA-99hj-44vg-hfcp
* GO-2026-4890 CVE-2026-34042 GHSA-x34h-54cw-9825
* GO-2026-4891 CVE-2026-34041 GHSA-xmgr-9pqc-h5vw
* GO-2026-4892 CVE-2026-29180 GHSA-m2h6-4xpq-qw3m
* GO-2026-4893 CVE-2026-33433 GHSA-qr99-7898-vr7c
* GO-2026-4894 CVE-2026-32241 GHSA-vchx-5pr6-ffx2
* GO-2026-4896 CVE-2026-34204 GHSA-3rh2-v3gr-35p9
* GO-2026-4897 GHSA-46wh-3698-f2cx
* GO-2026-4899 GHSA-c279-989m-238f
* GO-2026-4901 CVE-2026-33030 GHSA-5hf2-vhj6-gj9m
* GO-2026-4902 CVE-2026-33029 GHSA-cp8r-8jvw-v3qg
* GO-2026-4903 CVE-2026-33026 GHSA-fhh2-gg7w-gwpq
* GO-2026-4904 CVE-2026-33032 GHSA-h6c2-x2m2-mwhf
* GO-2026-4905 CVE-2026-27018 GHSA-jjwv-57xh-xr6r
* GO-2026-4906 CVE-2026-33028 GHSA-m468-xcm6-fxg4
* GO-2026-4907 CVE-2026-33027 GHSA-m8p8-53vf-8357
* GO-2026-4911 CVE-2026-33990 GHSA-x2f5-332j-9xwq
* GO-2026-4912 CVE-2026-34389 GHSA-4f9r-x588-pp2h
* GO-2026-4913 CVE-2026-34386 GHSA-9p23-p2m4-2r4m
* GO-2026-4914 CVE-2026-34385 GHSA-v895-833r-8c45
* GO-2026-4915 CVE-2026-34388 GHSA-w254-4hp5-7cvv
* GO-2026-4916 CVE-2026-26233 GHSA-247x-7qw8-fp98
* GO-2026-4919 CVE-2026-33634 GHSA-69fq-xp46-6x23

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1205=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* govulncheck-vulndb-0.0.20260402T184258-150000.1.158.1

## References:

* https://www.suse.com/security/cve/CVE-2026-26060.html
* https://www.suse.com/security/cve/CVE-2026-26061.html
* https://www.suse.com/security/cve/CVE-2026-26233.html
* https://www.suse.com/security/cve/CVE-2026-27018.html
* https://www.suse.com/security/cve/CVE-2026-29180.html
* https://www.suse.com/security/cve/CVE-2026-32241.html
* https://www.suse.com/security/cve/CVE-2026-32286.html
* https://www.suse.com/security/cve/CVE-2026-32695.html
* https://www.suse.com/security/cve/CVE-2026-33026.html
* https://www.suse.com/security/cve/CVE-2026-33027.html
* https://www.suse.com/security/cve/CVE-2026-33028.html
* https://www.suse.com/security/cve/CVE-2026-33029.html
* https://www.suse.com/security/cve/CVE-2026-33030.html
* https://www.suse.com/security/cve/CVE-2026-33032.html
* https://www.suse.com/security/cve/CVE-2026-33186.html
* https://www.suse.com/security/cve/CVE-2026-33433.html
* https://www.suse.com/security/cve/CVE-2026-33487.html
* https://www.suse.com/security/cve/CVE-2026-33634.html
* https://www.suse.com/security/cve/CVE-2026-33747.html
* https://www.suse.com/security/cve/CVE-2026-33748.html
* https://www.suse.com/security/cve/CVE-2026-33903.html
* https://www.suse.com/security/cve/CVE-2026-33904.html
* https://www.suse.com/security/cve/CVE-2026-33906.html
* https://www.suse.com/security/cve/CVE-2026-33907.html
* https://www.suse.com/security/cve/CVE-2026-33990.html
* https://www.suse.com/security/cve/CVE-2026-33997.html
* https://www.suse.com/security/cve/CVE-2026-34040.html
* https://www.suse.com/security/cve/CVE-2026-34041.html
* https://www.suse.com/security/cve/CVE-2026-34042.html
* https://www.suse.com/security/cve/CVE-2026-34204.html
* https://www.suse.com/security/cve/CVE-2026-34385.html
* https://www.suse.com/security/cve/CVE-2026-34386.html
* https://www.suse.com/security/cve/CVE-2026-34388.html
* https://www.suse.com/security/cve/CVE-2026-34389.html
* https://jira.suse.com/browse/PED-11136



SUSE-SU-2026:1192-1: important: Security update for python-pyOpenSSL


# Security update for python-pyOpenSSL

Announcement ID: SUSE-SU-2026:1192-1
Release Date: 2026-04-07T08:40:00Z
Rating: important
References:

* bsc#1259804
* bsc#1259808

Cross-References:

* CVE-2026-27448
* CVE-2026-27459

CVSS scores:

* CVE-2026-27448 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-27448 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-27448 ( NVD ): 1.7
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-27448 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-27459 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-27459 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-27459 ( NVD ): 7.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-27459 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves two vulnerabilities can now be installed.

## Description:

This update for python-pyOpenSSL fixes the following issues:

* CVE-2026-27448: unhandled exception can result in connection not being
cancelled (bsc#1259804).
* CVE-2026-27459: large cookie value can lead to a buffer overflow
(bsc#1259808).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1192=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1192=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1192=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1192=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1192=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1192=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1192=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1192=1

* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-1192=1

* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-1192=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1192=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1192=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1192=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1192=1

## Package List:

* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* python311-pyOpenSSL-23.2.0-150400.3.13.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* python311-pyOpenSSL-23.2.0-150400.3.13.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* python311-pyOpenSSL-23.2.0-150400.3.13.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* python311-pyOpenSSL-23.2.0-150400.3.13.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* python311-pyOpenSSL-23.2.0-150400.3.13.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* python311-pyOpenSSL-23.2.0-150400.3.13.1
* openSUSE Leap 15.4 (noarch)
* python311-pyOpenSSL-23.2.0-150400.3.13.1
* openSUSE Leap 15.6 (noarch)
* python311-pyOpenSSL-23.2.0-150400.3.13.1
* Public Cloud Module 15-SP4 (noarch)
* python311-pyOpenSSL-23.2.0-150400.3.13.1
* Python 3 Module 15-SP7 (noarch)
* python311-pyOpenSSL-23.2.0-150400.3.13.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python311-pyOpenSSL-23.2.0-150400.3.13.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python311-pyOpenSSL-23.2.0-150400.3.13.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* python311-pyOpenSSL-23.2.0-150400.3.13.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* python311-pyOpenSSL-23.2.0-150400.3.13.1

## References:

* https://www.suse.com/security/cve/CVE-2026-27448.html
* https://www.suse.com/security/cve/CVE-2026-27459.html
* https://bugzilla.suse.com/show_bug.cgi?id=1259804
* https://bugzilla.suse.com/show_bug.cgi?id=1259808



SUSE-SU-2026:1193-1: important: Security update for gimp


# Security update for gimp

Announcement ID: SUSE-SU-2026:1193-1
Release Date: 2026-04-07T08:40:22Z
Rating: important
References:

* bsc#1259979
* bsc#1259984
* bsc#1259986

Cross-References:

* CVE-2026-4150
* CVE-2026-4153
* CVE-2026-4154

CVSS scores:

* CVE-2026-4150 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-4150 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4153 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-4153 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4154 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-4154 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Linux Enterprise Workstation Extension 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves three vulnerabilities can now be installed.

## Description:

This update for gimp fixes the following issues:

* CVE-2026-4150: PSD File Parsing Integer Overflow Remote Code Execution
Vulnerability (bsc#1259979).
* CVE-2026-4153: PSP File Parsing Heap-based Buffer Overflow Remote Code
Execution Vulnerability (bsc#1259984).
* CVE-2026-4154: XPM File Parsing Integer Overflow Remote Code Execution
Vulnerability (bsc#1259986).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-1193=1

* SUSE Linux Enterprise Workstation Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-1193=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1193=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1193=1

## Package List:

* SUSE Package Hub 15 15-SP7 (aarch64)
* gimp-devel-debuginfo-2.10.30-150400.3.50.1
* gimp-2.10.30-150400.3.50.1
* gimp-devel-2.10.30-150400.3.50.1
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.50.1
* gimp-plugin-aa-2.10.30-150400.3.50.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.50.1
* gimp-debuginfo-2.10.30-150400.3.50.1
* libgimp-2_0-0-2.10.30-150400.3.50.1
* gimp-debugsource-2.10.30-150400.3.50.1
* libgimpui-2_0-0-2.10.30-150400.3.50.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.50.1
* SUSE Package Hub 15 15-SP7 (noarch)
* gimp-lang-2.10.30-150400.3.50.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
* gimp-devel-debuginfo-2.10.30-150400.3.50.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.50.1
* gimp-2.10.30-150400.3.50.1
* gimp-devel-2.10.30-150400.3.50.1
* gimp-debuginfo-2.10.30-150400.3.50.1
* libgimp-2_0-0-2.10.30-150400.3.50.1
* gimp-debugsource-2.10.30-150400.3.50.1
* libgimpui-2_0-0-2.10.30-150400.3.50.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.50.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch)
* gimp-lang-2.10.30-150400.3.50.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* gimp-devel-debuginfo-2.10.30-150400.3.50.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.50.1
* gimp-2.10.30-150400.3.50.1
* gimp-devel-2.10.30-150400.3.50.1
* gimp-debuginfo-2.10.30-150400.3.50.1
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.50.1
* libgimp-2_0-0-2.10.30-150400.3.50.1
* gimp-debugsource-2.10.30-150400.3.50.1
* libgimpui-2_0-0-2.10.30-150400.3.50.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.50.1
* gimp-plugin-aa-2.10.30-150400.3.50.1
* openSUSE Leap 15.4 (noarch)
* gimp-lang-2.10.30-150400.3.50.1
* openSUSE Leap 15.4 (x86_64)
* libgimpui-2_0-0-32bit-2.10.30-150400.3.50.1
* libgimpui-2_0-0-32bit-debuginfo-2.10.30-150400.3.50.1
* libgimp-2_0-0-32bit-debuginfo-2.10.30-150400.3.50.1
* libgimp-2_0-0-32bit-2.10.30-150400.3.50.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libgimp-2_0-0-64bit-2.10.30-150400.3.50.1
* libgimpui-2_0-0-64bit-2.10.30-150400.3.50.1
* libgimp-2_0-0-64bit-debuginfo-2.10.30-150400.3.50.1
* libgimpui-2_0-0-64bit-debuginfo-2.10.30-150400.3.50.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* gimp-devel-debuginfo-2.10.30-150400.3.50.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.50.1
* gimp-2.10.30-150400.3.50.1
* gimp-devel-2.10.30-150400.3.50.1
* gimp-debuginfo-2.10.30-150400.3.50.1
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.50.1
* libgimp-2_0-0-2.10.30-150400.3.50.1
* gimp-debugsource-2.10.30-150400.3.50.1
* libgimpui-2_0-0-2.10.30-150400.3.50.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.50.1
* gimp-plugin-aa-2.10.30-150400.3.50.1
* openSUSE Leap 15.6 (noarch)
* gimp-lang-2.10.30-150400.3.50.1
* openSUSE Leap 15.6 (x86_64)
* libgimpui-2_0-0-32bit-2.10.30-150400.3.50.1
* libgimpui-2_0-0-32bit-debuginfo-2.10.30-150400.3.50.1
* libgimp-2_0-0-32bit-debuginfo-2.10.30-150400.3.50.1
* libgimp-2_0-0-32bit-2.10.30-150400.3.50.1

## References:

* https://www.suse.com/security/cve/CVE-2026-4150.html
* https://www.suse.com/security/cve/CVE-2026-4153.html
* https://www.suse.com/security/cve/CVE-2026-4154.html
* https://bugzilla.suse.com/show_bug.cgi?id=1259979
* https://bugzilla.suse.com/show_bug.cgi?id=1259984
* https://bugzilla.suse.com/show_bug.cgi?id=1259986



SUSE-SU-2026:1194-1: important: Security update for google-cloud-sap-agent


# Security update for google-cloud-sap-agent

Announcement ID: SUSE-SU-2026:1194-1
Release Date: 2026-04-07T09:25:15Z
Rating: important
References:

* bsc#1259816
* bsc#1260265

Cross-References:

* CVE-2026-33186

CVSS scores:

* CVE-2026-33186 ( SUSE ): 8.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-33186 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33186 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Affected Products:

* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Public Cloud Module 15-SP6
* Public Cloud Module 15-SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability and has one security fix can now be
installed.

## Description:

This update for google-cloud-sap-agent fixes the following issue:

Update to google-cloud-sap-agent 3.12 (bsc#1259816):

* CVE-2026-33186: google.golang.org/grpc: authorization bypass due to improper
validation of the HTTP/2: path pseudo- header (bsc#1260265).

Changelog:

* Collect WLM metric `saphanasr_angi_installed` for all OS types.
* Failure handling: Remove attached disks from CG
* OTE Status checks for Parameter Manager (SAP Agent)
* Log command-line arguments in configureinstance.
* Minor multiple reliability checks and fixes
* Support custom names for restored disks in hanadiskrestore
* Add newAttachedDisks to Restorer and detach them on restore failure.
* Improve unit test coverage for hanadiskbackup and hanadiskrestore
* Add support for refresh point tests.
* Refactor HANA disk backup user validation and physical path parsing.
* Auto updated compiled protocol buffers
* Parameter Manager integration to SAP Agent
* Modify collection logic for SAP HANA configuration files.
* Update workloadagentplatform version and hash.
* Update WLM Validation metrics to support SAPHanaSR-angi setups.
* Increment agent version to 3.12.
* SAP HANA Pacemaker failover settings can come from `SAPHanaController`.
* Update collection for WLM metric `ha_sr_hook_configured`.
* Refactor CheckTopology to accept instance number.
* Use constant backoff with max retries for snapshot group operations.
* Update workloadagentplatform dependency

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1194=1

* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-1194=1

* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2026-1194=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2026-1194=1

* Public Cloud Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2026-1194=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.12-150100.3.63.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.12-150100.3.63.1
* Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.12-150100.3.63.1
* Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.12-150100.3.63.1
* Public Cloud Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.12-150100.3.63.1

## References:

* https://www.suse.com/security/cve/CVE-2026-33186.html
* https://bugzilla.suse.com/show_bug.cgi?id=1259816
* https://bugzilla.suse.com/show_bug.cgi?id=1260265