SUSE 5622 Published by

SUSE has released a batch of security patches addressing multiple vulnerabilities across its Linux distributions and enterprise software packages. The updates range from low to important severity ratings and fix critical issues like denial of service attacks, memory corruption flaws, and improper certificate handling in tools such as NetworkManager, openssl-3, and bind. Administrators can apply these fixes using standard zypper commands or the YaST interface on affected systems including openSUSE Leap, SUSE Linux Enterprise Server, and Tumbleweed. Prompt installation is recommended to mitigate risks associated with CVEs affecting widely used networking, cryptographic, and development libraries.

SUSE-SU-2026:1418-1: low: Security update for iproute2
SUSE-SU-2026:1421-1: moderate: Security update for python-CairoSVG
SUSE-SU-2026:1422-1: moderate: Security update for smc-tools
SUSE-SU-2026:1436-1: moderate: Security update for python-ecdsa
SUSE-SU-2026:1440-1: moderate: Security update for openvswitch3
SUSE-SU-2026:1441-1: moderate: Security update for avahi
SUSE-SU-2026:1443-1: moderate: Security update for NetworkManager
SUSE-SU-2026:1423-1: important: Security update for podman
SUSE-SU-2026:1424-1: moderate: Security update for polkit
SUSE-SU-2026:1429-1: moderate: Security update for openssl-3
SUSE-SU-2026:1432-1: important: Security update for libcap
SUSE-SU-2026:1428-1: important: Security update for bind
SUSE-SU-2026:1427-1: moderate: Security update for NetworkManager
openSUSE-SU-2026:10565-1: moderate: libraw-devel-0.22.1-1.1 on GA media
openSUSE-SU-2026:10560-1: moderate: blender-5.1-5.1.1-1.1 on GA media
openSUSE-SU-2026:10567-1: moderate: python311-Django-5.2.13-1.1 on GA media
openSUSE-SU-2026:10562-1: moderate: flannel-0.28.4-1.1 on GA media
openSUSE-SU-2026:10566-1: moderate: liblog4cxx-devel-1.7.0-2.1 on GA media
openSUSE-SU-2026:10559-1: moderate: ImageMagick-7.1.2.19-1.1 on GA media
openSUSE-SU-2026:10558-1: moderate: GraphicsMagick-1.3.46-5.1 on GA media
openSUSE-SU-2026:10564-1: moderate: libpng16-16-1.6.57-1.1 on GA media
openSUSE-SU-2026:10563-1: moderate: leancrypto-devel-1.7.2-1.1 on GA media




SUSE-SU-2026:1418-1: low: Security update for iproute2


# Security update for iproute2

Announcement ID: SUSE-SU-2026:1418-1
Release Date: 2026-04-16T16:43:07Z
Rating: low
References:

* bsc#1254324

Cross-References:

* CVE-2024-58251

CVSS scores:

* CVE-2024-58251 ( SUSE ): 2.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-58251 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-58251 ( NVD ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for iproute2 fixes the following issue:

* CVE-2024-58251: denial of service via terminal escape sequences
(bsc#1254324).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1418=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1418=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* iproute2-arpd-debuginfo-6.4-150600.7.12.1
* libnetlink-devel-6.4-150600.7.12.1
* iproute2-6.4-150600.7.12.1
* iproute2-debugsource-6.4-150600.7.12.1
* iproute2-bash-completion-6.4-150600.7.12.1
* iproute2-debuginfo-6.4-150600.7.12.1
* iproute2-arpd-6.4-150600.7.12.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* iproute2-arpd-debuginfo-6.4-150600.7.12.1
* libnetlink-devel-6.4-150600.7.12.1
* iproute2-6.4-150600.7.12.1
* iproute2-debugsource-6.4-150600.7.12.1
* iproute2-bash-completion-6.4-150600.7.12.1
* iproute2-debuginfo-6.4-150600.7.12.1
* iproute2-arpd-6.4-150600.7.12.1

## References:

* https://www.suse.com/security/cve/CVE-2024-58251.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254324



SUSE-SU-2026:1421-1: moderate: Security update for python-CairoSVG


# Security update for python-CairoSVG

Announcement ID: SUSE-SU-2026:1421-1
Release Date: 2026-04-17T06:46:50Z
Rating: moderate
References:

* bsc#1259690

Cross-References:

* CVE-2026-31899

CVSS scores:

* CVE-2026-31899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-31899 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for python-CairoSVG fixes the following issue:

* CVE-2026-31899: denial of service via recursive element amplification
(bsc#1259690).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1421=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1421=1

* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-1421=1

## Package List:

* openSUSE Leap 15.4 (noarch)
* python311-CairoSVG-2.7.1-150400.9.6.1
* openSUSE Leap 15.6 (noarch)
* python311-CairoSVG-2.7.1-150400.9.6.1
* Python 3 Module 15-SP7 (noarch)
* python311-CairoSVG-2.7.1-150400.9.6.1

## References:

* https://www.suse.com/security/cve/CVE-2026-31899.html
* https://bugzilla.suse.com/show_bug.cgi?id=1259690



SUSE-SU-2026:1422-1: moderate: Security update for smc-tools


# Security update for smc-tools

Announcement ID: SUSE-SU-2026:1422-1
Release Date: 2026-04-17T07:21:34Z
Rating: moderate
References:

* bsc#1230052

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS

An update that has one security fix can now be installed.

## Description:

This update for smc-tools fixes the following issue:

Update to smc-tools v1.8.7:

* predictable /tmp file allows for local denial of service (bsc#1230052).

Changelog:

Update to v1.8.7:

* smc_rnics: fix regression when PFT not available
* smcd/smcr: prevent DoS on statistics workfile present in /tmp/

Update to v1.8.6:

* man pages: Update man page for smc_pnet
* smc-tools: Display sndbuf/RMB stats only if supported by the kernel

Update to v1.8.5:

* smc_rnics: Add support for Network Express RNIC in smc_rnics
* smc_rnics: Add PFT and VF columns to smc_rnics output
* libnetlink..: Fix function declaration to use a void prototype
* smc_rnics: Update smc_chk to extract PNetID from column 9
* man pages: Update man page for --rawids option and PFT and VF columns
* smc_rnics: Fix missing PPrt values in smc_rnics -r output

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1422=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1422=1 openSUSE-SLE-15.6-2026-1422=1

## Package List:

* SUSE Linux Enterprise Server 15 SP6 LTSS (s390x)
* smc-tools-debuginfo-1.8.7-150600.3.6.1
* smc-tools-debugsource-1.8.7-150600.3.6.1
* smc-tools-completion-1.8.7-150600.3.6.1
* smc-tools-1.8.7-150600.3.6.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* smc-tools-debuginfo-1.8.7-150600.3.6.1
* smc-tools-debugsource-1.8.7-150600.3.6.1
* smc-tools-completion-1.8.7-150600.3.6.1
* smc-tools-1.8.7-150600.3.6.1

## References:

* https://bugzilla.suse.com/show_bug.cgi?id=1230052



SUSE-SU-2026:1436-1: moderate: Security update for python-ecdsa


# Security update for python-ecdsa

Announcement ID: SUSE-SU-2026:1436-1
Release Date: 2026-04-17T12:51:37Z
Rating: moderate
References:

* bsc#1261009

Cross-References:

* CVE-2026-33936

CVSS scores:

* CVE-2026-33936 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-33936 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33936 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for python-ecdsa fixes the following issues:

* CVE-2026-33936: issue in the low-level DER parsing functions can cause
unexpected exceptions to be raised from the public API functions
(bsc#1261009).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1436=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1436=1

* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-1436=1

## Package List:

* openSUSE Leap 15.4 (noarch)
* python311-ecdsa-0.18.0-150400.12.6.1
* openSUSE Leap 15.6 (noarch)
* python311-ecdsa-0.18.0-150400.12.6.1
* Python 3 Module 15-SP7 (noarch)
* python311-ecdsa-0.18.0-150400.12.6.1

## References:

* https://www.suse.com/security/cve/CVE-2026-33936.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261009



SUSE-SU-2026:1440-1: moderate: Security update for openvswitch3


# Security update for openvswitch3

Announcement ID: SUSE-SU-2026:1440-1
Release Date: 2026-04-17T13:44:11Z
Rating: moderate
References:

* bsc#1261273

Cross-References:

* CVE-2026-34956

CVSS scores:

* CVE-2026-34956 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34956 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise Micro 5.5

An update that solves one vulnerability can now be installed.

## Description:

This update for openvswitch3 fixes the following issues:

* CVE-2026-34956: invalid memory access via crafted FTP payloads in userspace
conntrack flows specifying the FTP alg handler (bsc#1261273).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1440=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1440=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* openvswitch3-pki-3.1.7-150500.3.28.1
* ovn3-host-debuginfo-23.03.3-150500.3.28.1
* openvswitch3-vtep-debuginfo-3.1.7-150500.3.28.1
* ovn3-devel-23.03.3-150500.3.28.1
* openvswitch3-test-debuginfo-3.1.7-150500.3.28.1
* openvswitch3-ipsec-3.1.7-150500.3.28.1
* ovn3-23.03.3-150500.3.28.1
* python3-ovs3-3.1.7-150500.3.28.1
* openvswitch3-debuginfo-3.1.7-150500.3.28.1
* ovn3-central-debuginfo-23.03.3-150500.3.28.1
* openvswitch3-test-3.1.7-150500.3.28.1
* ovn3-central-23.03.3-150500.3.28.1
* openvswitch3-3.1.7-150500.3.28.1
* openvswitch3-debugsource-3.1.7-150500.3.28.1
* libovn-23_03-0-debuginfo-23.03.3-150500.3.28.1
* ovn3-vtep-23.03.3-150500.3.28.1
* ovn3-vtep-debuginfo-23.03.3-150500.3.28.1
* libopenvswitch-3_1-0-3.1.7-150500.3.28.1
* openvswitch3-devel-3.1.7-150500.3.28.1
* openvswitch3-vtep-3.1.7-150500.3.28.1
* ovn3-docker-23.03.3-150500.3.28.1
* libovn-23_03-0-23.03.3-150500.3.28.1
* libopenvswitch-3_1-0-debuginfo-3.1.7-150500.3.28.1
* ovn3-host-23.03.3-150500.3.28.1
* ovn3-debuginfo-23.03.3-150500.3.28.1
* openSUSE Leap 15.5 (noarch)
* ovn3-doc-23.03.3-150500.3.28.1
* openvswitch3-doc-3.1.7-150500.3.28.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* openvswitch3-debuginfo-3.1.7-150500.3.28.1
* ovn3-central-debuginfo-23.03.3-150500.3.28.1
* openvswitch3-pki-3.1.7-150500.3.28.1
* libopenvswitch-3_1-0-3.1.7-150500.3.28.1
* ovn3-debuginfo-23.03.3-150500.3.28.1
* ovn3-docker-23.03.3-150500.3.28.1
* libovn-23_03-0-23.03.3-150500.3.28.1
* ovn3-vtep-23.03.3-150500.3.28.1
* python3-ovs3-3.1.7-150500.3.28.1
* ovn3-host-debuginfo-23.03.3-150500.3.28.1
* libopenvswitch-3_1-0-debuginfo-3.1.7-150500.3.28.1
* ovn3-central-23.03.3-150500.3.28.1
* ovn3-host-23.03.3-150500.3.28.1
* openvswitch3-vtep-debuginfo-3.1.7-150500.3.28.1
* openvswitch3-3.1.7-150500.3.28.1
* openvswitch3-debugsource-3.1.7-150500.3.28.1
* libovn-23_03-0-debuginfo-23.03.3-150500.3.28.1
* openvswitch3-vtep-3.1.7-150500.3.28.1
* ovn3-vtep-debuginfo-23.03.3-150500.3.28.1
* ovn3-23.03.3-150500.3.28.1

## References:

* https://www.suse.com/security/cve/CVE-2026-34956.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261273



SUSE-SU-2026:1441-1: moderate: Security update for avahi


# Security update for avahi

Announcement ID: SUSE-SU-2026:1441-1
Release Date: 2026-04-17T14:18:38Z
Rating: moderate
References:

* bsc#1257235

Cross-References:

* CVE-2026-24401

CVSS scores:

* CVE-2026-24401 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-24401 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-24401 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP7
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for avahi fixes the following issue:

* CVE-2026-24401: avahi-daemon can be crashed via a segmentation fault by
sending an unsolicited mDNS response containing a recursive CNAME record
(bsc#1257235).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1441=1 openSUSE-SLE-15.6-2026-1441=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1441=1

* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-1441=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-1441=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libavahi-glib-devel-0.8-150600.15.15.1
* avahi-qt5-debugsource-0.8-150600.15.15.1
* libavahi-common3-debuginfo-0.8-150600.15.15.1
* libavahi-glib1-debuginfo-0.8-150600.15.15.1
* python3-avahi-gtk-0.8-150600.15.15.1
* avahi-0.8-150600.15.15.1
* libdns_sd-0.8-150600.15.15.1
* avahi-utils-debuginfo-0.8-150600.15.15.1
* libavahi-qt5-1-0.8-150600.15.15.1
* libavahi-libevent1-debuginfo-0.8-150600.15.15.1
* avahi-utils-gtk-0.8-150600.15.15.1
* avahi-debugsource-0.8-150600.15.15.1
* libavahi-gobject0-0.8-150600.15.15.1
* avahi-compat-howl-devel-0.8-150600.15.15.1
* libhowl0-0.8-150600.15.15.1
* avahi-autoipd-0.8-150600.15.15.1
* python3-avahi-0.8-150600.15.15.1
* libavahi-libevent1-0.8-150600.15.15.1
* libavahi-qt5-1-debuginfo-0.8-150600.15.15.1
* libavahi-qt5-devel-0.8-150600.15.15.1
* libavahi-ui-gtk3-0-0.8-150600.15.15.1
* libavahi-common3-0.8-150600.15.15.1
* typelib-1_0-Avahi-0_6-0.8-150600.15.15.1
* libavahi-client3-0.8-150600.15.15.1
* avahi-utils-gtk-debuginfo-0.8-150600.15.15.1
* avahi-utils-0.8-150600.15.15.1
* libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.15.1
* avahi-autoipd-debuginfo-0.8-150600.15.15.1
* libdns_sd-debuginfo-0.8-150600.15.15.1
* libavahi-glib1-0.8-150600.15.15.1
* libavahi-gobject0-debuginfo-0.8-150600.15.15.1
* avahi-compat-mDNSResponder-devel-0.8-150600.15.15.1
* libavahi-core7-0.8-150600.15.15.1
* avahi-glib2-debugsource-0.8-150600.15.15.1
* libavahi-core7-debuginfo-0.8-150600.15.15.1
* libavahi-client3-debuginfo-0.8-150600.15.15.1
* libavahi-devel-0.8-150600.15.15.1
* libavahi-gobject-devel-0.8-150600.15.15.1
* libhowl0-debuginfo-0.8-150600.15.15.1
* avahi-debuginfo-0.8-150600.15.15.1
* openSUSE Leap 15.6 (x86_64)
* libavahi-glib1-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-common3-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-client3-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-client3-32bit-0.8-150600.15.15.1
* avahi-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-common3-32bit-0.8-150600.15.15.1
* libdns_sd-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-glib1-32bit-0.8-150600.15.15.1
* libdns_sd-32bit-0.8-150600.15.15.1
* openSUSE Leap 15.6 (noarch)
* avahi-lang-0.8-150600.15.15.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libavahi-glib1-64bit-0.8-150600.15.15.1
* avahi-64bit-debuginfo-0.8-150600.15.15.1
* libavahi-glib1-64bit-debuginfo-0.8-150600.15.15.1
* libavahi-client3-64bit-debuginfo-0.8-150600.15.15.1
* libavahi-client3-64bit-0.8-150600.15.15.1
* libdns_sd-64bit-0.8-150600.15.15.1
* libdns_sd-64bit-debuginfo-0.8-150600.15.15.1
* libavahi-common3-64bit-debuginfo-0.8-150600.15.15.1
* libavahi-common3-64bit-0.8-150600.15.15.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libavahi-glib-devel-0.8-150600.15.15.1
* libavahi-common3-debuginfo-0.8-150600.15.15.1
* libavahi-glib1-debuginfo-0.8-150600.15.15.1
* avahi-0.8-150600.15.15.1
* libdns_sd-0.8-150600.15.15.1
* avahi-utils-debuginfo-0.8-150600.15.15.1
* libavahi-libevent1-debuginfo-0.8-150600.15.15.1
* libavahi-gobject0-0.8-150600.15.15.1
* avahi-debugsource-0.8-150600.15.15.1
* avahi-compat-howl-devel-0.8-150600.15.15.1
* libhowl0-0.8-150600.15.15.1
* libavahi-libevent1-0.8-150600.15.15.1
* libavahi-ui-gtk3-0-0.8-150600.15.15.1
* libavahi-common3-0.8-150600.15.15.1
* typelib-1_0-Avahi-0_6-0.8-150600.15.15.1
* libavahi-client3-0.8-150600.15.15.1
* avahi-utils-0.8-150600.15.15.1
* libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.15.1
* libdns_sd-debuginfo-0.8-150600.15.15.1
* libavahi-glib1-0.8-150600.15.15.1
* libavahi-gobject0-debuginfo-0.8-150600.15.15.1
* avahi-compat-mDNSResponder-devel-0.8-150600.15.15.1
* libavahi-core7-0.8-150600.15.15.1
* avahi-glib2-debugsource-0.8-150600.15.15.1
* libavahi-core7-debuginfo-0.8-150600.15.15.1
* libavahi-client3-debuginfo-0.8-150600.15.15.1
* libavahi-devel-0.8-150600.15.15.1
* libhowl0-debuginfo-0.8-150600.15.15.1
* avahi-debuginfo-0.8-150600.15.15.1
* Basesystem Module 15-SP7 (noarch)
* avahi-lang-0.8-150600.15.15.1
* Basesystem Module 15-SP7 (x86_64)
* libavahi-common3-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-client3-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-client3-32bit-0.8-150600.15.15.1
* avahi-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-common3-32bit-0.8-150600.15.15.1
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* avahi-glib2-debugsource-0.8-150600.15.15.1
* avahi-autoipd-0.8-150600.15.15.1
* libavahi-gobject-devel-0.8-150600.15.15.1
* avahi-utils-gtk-debuginfo-0.8-150600.15.15.1
* avahi-debuginfo-0.8-150600.15.15.1
* avahi-autoipd-debuginfo-0.8-150600.15.15.1
* avahi-utils-gtk-0.8-150600.15.15.1
* avahi-debugsource-0.8-150600.15.15.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
* avahi-debugsource-0.8-150600.15.15.1
* python3-avahi-0.8-150600.15.15.1
* avahi-debuginfo-0.8-150600.15.15.1

## References:

* https://www.suse.com/security/cve/CVE-2026-24401.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257235



SUSE-SU-2026:1443-1: moderate: Security update for NetworkManager


# Security update for NetworkManager

Announcement ID: SUSE-SU-2026:1443-1
Release Date: 2026-04-17T14:40:59Z
Rating: moderate
References:

* bsc#1225498
* bsc#1257359

Cross-References:

* CVE-2025-9615

CVSS scores:

* CVE-2025-9615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-9615 ( NVD ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Affected Products:

* Basesystem Module 15-SP7
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Linux Enterprise Workstation Extension 15 SP7

An update that solves one vulnerability and has one security fix can now be
installed.

## Description:

This update for NetworkManager fixes the following issue:

Security fixes:

* CVE-2025-9615: Fixed non-admin user using others' certificates
(bsc#1257359).

Other fixes:

* Don't renew DHCP lease when software devices' MAC is empty (bsc#1225498).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1443=1 openSUSE-SLE-15.6-2026-1443=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1443=1

* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-1443=1

* SUSE Linux Enterprise Workstation Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-1443=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* NetworkManager-wwan-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-debugsource-1.44.2-150600.3.7.1
* NetworkManager-ovs-1.44.2-150600.3.7.1
* NetworkManager-ovs-debuginfo-1.44.2-150600.3.7.1
* libnm0-1.44.2-150600.3.7.1
* libnm0-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-tui-debuginfo-1.44.2-150600.3.7.1
* typelib-1_0-NM-1_0-1.44.2-150600.3.7.1
* NetworkManager-cloud-setup-1.44.2-150600.3.7.1
* NetworkManager-wwan-1.44.2-150600.3.7.1
* NetworkManager-1.44.2-150600.3.7.1
* NetworkManager-bluetooth-1.44.2-150600.3.7.1
* NetworkManager-cloud-setup-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-pppoe-1.44.2-150600.3.7.1
* NetworkManager-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-tui-1.44.2-150600.3.7.1
* NetworkManager-bluetooth-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-devel-1.44.2-150600.3.7.1
* NetworkManager-pppoe-debuginfo-1.44.2-150600.3.7.1
* openSUSE Leap 15.6 (noarch)
* NetworkManager-lang-1.44.2-150600.3.7.1
* NetworkManager-branding-upstream-1.44.2-150600.3.7.1
* openSUSE Leap 15.6 (x86_64)
* NetworkManager-devel-32bit-1.44.2-150600.3.7.1
* libnm0-32bit-debuginfo-1.44.2-150600.3.7.1
* libnm0-32bit-1.44.2-150600.3.7.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libnm0-64bit-1.44.2-150600.3.7.1
* NetworkManager-devel-64bit-1.44.2-150600.3.7.1
* libnm0-64bit-debuginfo-1.44.2-150600.3.7.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* NetworkManager-debugsource-1.44.2-150600.3.7.1
* libnm0-1.44.2-150600.3.7.1
* libnm0-debuginfo-1.44.2-150600.3.7.1
* typelib-1_0-NM-1_0-1.44.2-150600.3.7.1
* NetworkManager-debuginfo-1.44.2-150600.3.7.1
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* NetworkManager-wwan-1.44.2-150600.3.7.1
* NetworkManager-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-debugsource-1.44.2-150600.3.7.1
* NetworkManager-1.44.2-150600.3.7.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
* NetworkManager-wwan-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-debugsource-1.44.2-150600.3.7.1
* NetworkManager-tui-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-cloud-setup-1.44.2-150600.3.7.1
* NetworkManager-wwan-1.44.2-150600.3.7.1
* NetworkManager-pppoe-1.44.2-150600.3.7.1
* NetworkManager-bluetooth-1.44.2-150600.3.7.1
* NetworkManager-cloud-setup-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-tui-1.44.2-150600.3.7.1
* NetworkManager-bluetooth-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-devel-1.44.2-150600.3.7.1
* NetworkManager-pppoe-debuginfo-1.44.2-150600.3.7.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch)
* NetworkManager-lang-1.44.2-150600.3.7.1

## References:

* https://www.suse.com/security/cve/CVE-2025-9615.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225498
* https://bugzilla.suse.com/show_bug.cgi?id=1257359



SUSE-SU-2026:1423-1: important: Security update for podman


# Security update for podman

Announcement ID: SUSE-SU-2026:1423-1
Release Date: 2026-04-17T07:58:24Z
Rating: important
References:

Affected Products:

* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3

An update that can now be installed.

## Description:

This update for podman rebuilds it against the current go 1.25 security release.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-1423=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2026-1423=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-1423=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-1423=1

## Package List:

* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* podman-remote-4.9.5-150300.9.71.1
* podman-remote-debuginfo-4.9.5-150300.9.71.1
* podman-4.9.5-150300.9.71.1
* podman-debuginfo-4.9.5-150300.9.71.1
* podmansh-4.9.5-150300.9.71.1
* openSUSE Leap 15.3 (noarch)
* podman-docker-4.9.5-150300.9.71.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* podman-4.9.5-150300.9.71.1
* podman-debuginfo-4.9.5-150300.9.71.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* podman-remote-4.9.5-150300.9.71.1
* podman-4.9.5-150300.9.71.1
* podman-debuginfo-4.9.5-150300.9.71.1
* podman-remote-debuginfo-4.9.5-150300.9.71.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* podman-remote-4.9.5-150300.9.71.1
* podman-4.9.5-150300.9.71.1
* podman-debuginfo-4.9.5-150300.9.71.1
* podman-remote-debuginfo-4.9.5-150300.9.71.1



SUSE-SU-2026:1424-1: moderate: Security update for polkit


# Security update for polkit

Announcement ID: SUSE-SU-2026:1424-1
Release Date: 2026-04-17T08:03:11Z
Rating: moderate
References:

* bsc#1260859

Cross-References:

* CVE-2026-4897

CVSS scores:

* CVE-2026-4897 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-4897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-4897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for polkit fixes the following issue:

* CVE-2026-4897: Fixed possible OOM condition via specially crafted input to
`polkit-agent-helper-1` (bsc#1260859).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1424=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1424=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1424=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1424=1

## Package List:

* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libpolkit-agent-1-0-debuginfo-121-150500.3.11.1
* polkit-121-150500.3.11.1
* libpolkit-gobject-1-0-debuginfo-121-150500.3.11.1
* polkit-debuginfo-121-150500.3.11.1
* polkit-debugsource-121-150500.3.11.1
* libpolkit-agent-1-0-121-150500.3.11.1
* libpolkit-gobject-1-0-121-150500.3.11.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libpolkit-agent-1-0-debuginfo-121-150500.3.11.1
* libpolkit-gobject-1-0-debuginfo-121-150500.3.11.1
* polkit-121-150500.3.11.1
* polkit-devel-121-150500.3.11.1
* polkit-debuginfo-121-150500.3.11.1
* typelib-1_0-Polkit-1_0-121-150500.3.11.1
* pkexec-121-150500.3.11.1
* pkexec-debuginfo-121-150500.3.11.1
* polkit-debugsource-121-150500.3.11.1
* polkit-devel-debuginfo-121-150500.3.11.1
* libpolkit-agent-1-0-121-150500.3.11.1
* libpolkit-gobject-1-0-121-150500.3.11.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libpolkit-agent-1-0-debuginfo-121-150500.3.11.1
* libpolkit-gobject-1-0-debuginfo-121-150500.3.11.1
* polkit-121-150500.3.11.1
* polkit-devel-121-150500.3.11.1
* polkit-debuginfo-121-150500.3.11.1
* typelib-1_0-Polkit-1_0-121-150500.3.11.1
* pkexec-121-150500.3.11.1
* pkexec-debuginfo-121-150500.3.11.1
* polkit-debugsource-121-150500.3.11.1
* polkit-devel-debuginfo-121-150500.3.11.1
* libpolkit-agent-1-0-121-150500.3.11.1
* libpolkit-gobject-1-0-121-150500.3.11.1
* openSUSE Leap 15.5 (x86_64)
* libpolkit-agent-1-0-32bit-121-150500.3.11.1
* libpolkit-agent-1-0-32bit-debuginfo-121-150500.3.11.1
* libpolkit-gobject-1-0-32bit-121-150500.3.11.1
* libpolkit-gobject-1-0-32bit-debuginfo-121-150500.3.11.1
* openSUSE Leap 15.5 (noarch)
* polkit-doc-121-150500.3.11.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libpolkit-gobject-1-0-64bit-121-150500.3.11.1
* libpolkit-agent-1-0-64bit-121-150500.3.11.1
* libpolkit-gobject-1-0-64bit-debuginfo-121-150500.3.11.1
* libpolkit-agent-1-0-64bit-debuginfo-121-150500.3.11.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libpolkit-agent-1-0-debuginfo-121-150500.3.11.1
* libpolkit-gobject-1-0-debuginfo-121-150500.3.11.1
* polkit-121-150500.3.11.1
* polkit-devel-121-150500.3.11.1
* polkit-debuginfo-121-150500.3.11.1
* typelib-1_0-Polkit-1_0-121-150500.3.11.1
* pkexec-121-150500.3.11.1
* pkexec-debuginfo-121-150500.3.11.1
* polkit-debugsource-121-150500.3.11.1
* polkit-devel-debuginfo-121-150500.3.11.1
* libpolkit-agent-1-0-121-150500.3.11.1
* libpolkit-gobject-1-0-121-150500.3.11.1
* openSUSE Leap 15.6 (x86_64)
* libpolkit-agent-1-0-32bit-121-150500.3.11.1
* libpolkit-agent-1-0-32bit-debuginfo-121-150500.3.11.1
* libpolkit-gobject-1-0-32bit-121-150500.3.11.1
* libpolkit-gobject-1-0-32bit-debuginfo-121-150500.3.11.1
* openSUSE Leap 15.6 (noarch)
* polkit-doc-121-150500.3.11.1

## References:

* https://www.suse.com/security/cve/CVE-2026-4897.html
* https://bugzilla.suse.com/show_bug.cgi?id=1260859



SUSE-SU-2026:1429-1: moderate: Security update for openssl-3


# Security update for openssl-3

Announcement ID: SUSE-SU-2026:1429-1
Release Date: 2026-04-17T10:03:32Z
Rating: moderate
References:

* bsc#1261678

Cross-References:

* CVE-2026-28390

CVSS scores:

* CVE-2026-28390 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28390 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28390 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that solves one vulnerability can now be installed.

## Description:

This update for openssl-3 fixes the following issue:

* CVE-2026-28390: NULL pointer dereference during processing of a crafted CMS
EnvelopedData message with KeyTransportRecipientInfo (bsc#1261678).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1429=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1429=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1429=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1429=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1429=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1429=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1429=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1429=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1429=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* libopenssl-3-devel-3.0.8-150400.4.84.1
* openssl-3-debuginfo-3.0.8-150400.4.84.1
* openSUSE Leap 15.4 (x86_64)
* libopenssl3-32bit-debuginfo-3.0.8-150400.4.84.1
* libopenssl-3-devel-32bit-3.0.8-150400.4.84.1
* libopenssl3-32bit-3.0.8-150400.4.84.1
* openSUSE Leap 15.4 (noarch)
* openssl-3-doc-3.0.8-150400.4.84.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libopenssl3-64bit-debuginfo-3.0.8-150400.4.84.1
* libopenssl-3-devel-64bit-3.0.8-150400.4.84.1
* libopenssl3-64bit-3.0.8-150400.4.84.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* libopenssl-3-devel-3.0.8-150400.4.84.1
* openssl-3-debuginfo-3.0.8-150400.4.84.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* libopenssl-3-devel-3.0.8-150400.4.84.1
* openssl-3-debuginfo-3.0.8-150400.4.84.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* libopenssl-3-devel-3.0.8-150400.4.84.1
* openssl-3-debuginfo-3.0.8-150400.4.84.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* libopenssl-3-devel-3.0.8-150400.4.84.1
* openssl-3-debuginfo-3.0.8-150400.4.84.1

## References:

* https://www.suse.com/security/cve/CVE-2026-28390.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261678



SUSE-SU-2026:1432-1: important: Security update for libcap


# Security update for libcap

Announcement ID: SUSE-SU-2026:1432-1
Release Date: 2026-04-17T10:13:04Z
Rating: important
References:

* bsc#1261809

Cross-References:

* CVE-2026-4878

CVSS scores:

* CVE-2026-4878 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-4878 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-4878 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for libcap fixes the following issue:

* CVE-2026-4878: Address a potential TOCTOU race condition in cap_set_file()
(bsc#1261809).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1432=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1432=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1432=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1432=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1432=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1432=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1432=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1432=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1432=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1432=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1432=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1432=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1432=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1432=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1432=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1432=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1432=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* openSUSE Leap 15.4 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libpsx2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* libpsx2-32bit-debuginfo-2.63-150400.3.6.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libcap2-64bit-2.63-150400.3.6.1
* libcap2-64bit-debuginfo-2.63-150400.3.6.1
* libpsx2-64bit-debuginfo-2.63-150400.3.6.1
* libpsx2-64bit-2.63-150400.3.6.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libcap2-debuginfo-2.63-150400.3.6.1
* libcap-debugsource-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libcap2-debuginfo-2.63-150400.3.6.1
* libcap-debugsource-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libcap2-debuginfo-2.63-150400.3.6.1
* libcap-debugsource-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libcap2-debuginfo-2.63-150400.3.6.1
* libcap-debugsource-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libcap2-debuginfo-2.63-150400.3.6.1
* libcap-debugsource-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* Basesystem Module 15-SP7 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1

## References:

* https://www.suse.com/security/cve/CVE-2026-4878.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261809



SUSE-SU-2026:1428-1: important: Security update for bind


# Security update for bind

Announcement ID: SUSE-SU-2026:1428-1
Release Date: 2026-04-17T10:00:58Z
Rating: important
References:

* bsc#1260805

Cross-References:

* CVE-2026-1519

CVSS scores:

* CVE-2026-1519 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-1519 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-1519 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that solves one vulnerability can now be installed.

## Description:

This update for bind fixes the following issues:

* CVE-2026-1519: high CPU load during insecure delegation validation due to
excessive NSEC3 iterations (bsc#1260805).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1428=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1428=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1428=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1428=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1428=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* bind-9.16.50-150400.5.59.1
* bind-utils-9.16.50-150400.5.59.1
* bind-debuginfo-9.16.50-150400.5.59.1
* bind-utils-debuginfo-9.16.50-150400.5.59.1
* bind-debugsource-9.16.50-150400.5.59.1
* openSUSE Leap 15.4 (noarch)
* python3-bind-9.16.50-150400.5.59.1
* bind-doc-9.16.50-150400.5.59.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* bind-9.16.50-150400.5.59.1
* bind-utils-9.16.50-150400.5.59.1
* bind-debuginfo-9.16.50-150400.5.59.1
* bind-utils-debuginfo-9.16.50-150400.5.59.1
* bind-debugsource-9.16.50-150400.5.59.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python3-bind-9.16.50-150400.5.59.1
* bind-doc-9.16.50-150400.5.59.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* bind-9.16.50-150400.5.59.1
* bind-utils-9.16.50-150400.5.59.1
* bind-debuginfo-9.16.50-150400.5.59.1
* bind-utils-debuginfo-9.16.50-150400.5.59.1
* bind-debugsource-9.16.50-150400.5.59.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python3-bind-9.16.50-150400.5.59.1
* bind-doc-9.16.50-150400.5.59.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* bind-9.16.50-150400.5.59.1
* bind-utils-9.16.50-150400.5.59.1
* bind-debuginfo-9.16.50-150400.5.59.1
* bind-utils-debuginfo-9.16.50-150400.5.59.1
* bind-debugsource-9.16.50-150400.5.59.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* python3-bind-9.16.50-150400.5.59.1
* bind-doc-9.16.50-150400.5.59.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* bind-9.16.50-150400.5.59.1
* bind-utils-9.16.50-150400.5.59.1
* bind-debuginfo-9.16.50-150400.5.59.1
* bind-utils-debuginfo-9.16.50-150400.5.59.1
* bind-debugsource-9.16.50-150400.5.59.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* python3-bind-9.16.50-150400.5.59.1
* bind-doc-9.16.50-150400.5.59.1

## References:

* https://www.suse.com/security/cve/CVE-2026-1519.html
* https://bugzilla.suse.com/show_bug.cgi?id=1260805



SUSE-SU-2026:1427-1: moderate: Security update for NetworkManager


# Security update for NetworkManager

Announcement ID: SUSE-SU-2026:1427-1
Release Date: 2026-04-17T09:58:43Z
Rating: moderate
References:

* bsc#1257359

Cross-References:

* CVE-2025-9615

CVSS scores:

* CVE-2025-9615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-9615 ( NVD ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise Micro 5.5

An update that solves one vulnerability can now be installed.

## Description:

This update for NetworkManager fixes the following issue:

* CVE-2025-9615: Fixed non-admin user using others' certificates
(bsc#1257359).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1427=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1427=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* NetworkManager-debuginfo-1.38.6-150500.3.5.1
* libnm0-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-bluetooth-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-debugsource-1.38.6-150500.3.5.1
* NetworkManager-wwan-1.38.6-150500.3.5.1
* NetworkManager-bluetooth-1.38.6-150500.3.5.1
* NetworkManager-cloud-setup-1.38.6-150500.3.5.1
* NetworkManager-devel-1.38.6-150500.3.5.1
* NetworkManager-pppoe-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-pppoe-1.38.6-150500.3.5.1
* NetworkManager-tui-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-cloud-setup-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-1.38.6-150500.3.5.1
* NetworkManager-tui-1.38.6-150500.3.5.1
* NetworkManager-wwan-debuginfo-1.38.6-150500.3.5.1
* typelib-1_0-NM-1_0-1.38.6-150500.3.5.1
* NetworkManager-ovs-debuginfo-1.38.6-150500.3.5.1
* libnm0-1.38.6-150500.3.5.1
* NetworkManager-ovs-1.38.6-150500.3.5.1
* openSUSE Leap 15.5 (noarch)
* NetworkManager-lang-1.38.6-150500.3.5.1
* NetworkManager-branding-upstream-1.38.6-150500.3.5.1
* openSUSE Leap 15.5 (x86_64)
* NetworkManager-devel-32bit-1.38.6-150500.3.5.1
* libnm0-32bit-debuginfo-1.38.6-150500.3.5.1
* libnm0-32bit-1.38.6-150500.3.5.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libnm0-64bit-1.38.6-150500.3.5.1
* libnm0-64bit-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-devel-64bit-1.38.6-150500.3.5.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* NetworkManager-debuginfo-1.38.6-150500.3.5.1
* libnm0-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-bluetooth-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-debugsource-1.38.6-150500.3.5.1
* NetworkManager-wwan-1.38.6-150500.3.5.1
* NetworkManager-bluetooth-1.38.6-150500.3.5.1
* NetworkManager-cloud-setup-1.38.6-150500.3.5.1
* NetworkManager-pppoe-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-pppoe-1.38.6-150500.3.5.1
* NetworkManager-tui-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-cloud-setup-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-1.38.6-150500.3.5.1
* NetworkManager-tui-1.38.6-150500.3.5.1
* NetworkManager-wwan-debuginfo-1.38.6-150500.3.5.1
* typelib-1_0-NM-1_0-1.38.6-150500.3.5.1
* libnm0-1.38.6-150500.3.5.1

## References:

* https://www.suse.com/security/cve/CVE-2025-9615.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257359



openSUSE-SU-2026:10565-1: moderate: libraw-devel-0.22.1-1.1 on GA media


# libraw-devel-0.22.1-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10565-1
Rating: moderate

Cross-References:

* CVE-2026-20884
* CVE-2026-20889
* CVE-2026-20911
* CVE-2026-21413
* CVE-2026-24450
* CVE-2026-24660
* CVE-2026-5342

CVSS scores:

* CVE-2026-20884 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20884 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20889 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20889 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20911 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20911 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21413 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-21413 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-24450 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-24450 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-24660 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-24660 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-5342 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-5342 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 7 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the libraw-devel-0.22.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libraw-devel 0.22.1-1.1
* libraw-devel-static 0.22.1-1.1
* libraw-tools 0.22.1-1.1
* libraw25 0.22.1-1.1
* libraw25-32bit 0.22.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-20884.html
* https://www.suse.com/security/cve/CVE-2026-20889.html
* https://www.suse.com/security/cve/CVE-2026-20911.html
* https://www.suse.com/security/cve/CVE-2026-21413.html
* https://www.suse.com/security/cve/CVE-2026-24450.html
* https://www.suse.com/security/cve/CVE-2026-24660.html
* https://www.suse.com/security/cve/CVE-2026-5342.html



openSUSE-SU-2026:10560-1: moderate: blender-5.1-5.1.1-1.1 on GA media


# blender-5.1-5.1.1-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10560-1
Rating: moderate

Cross-References:

* CVE-2022-0544
* CVE-2022-0545
* CVE-2022-0546

Affected Products:

* openSUSE Tumbleweed

An update that solves 3 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the blender-5.1-5.1.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* blender-5.1 5.1.1-1.1
* blender-5.1-demo 5.1.1-1.1
* blender-5.1-lang 5.1.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2022-0544.html
* https://www.suse.com/security/cve/CVE-2022-0545.html
* https://www.suse.com/security/cve/CVE-2022-0546.html



openSUSE-SU-2026:10567-1: moderate: python311-Django-5.2.13-1.1 on GA media


# python311-Django-5.2.13-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10567-1
Rating: moderate

Cross-References:

* CVE-2026-33033
* CVE-2026-33034
* CVE-2026-3902
* CVE-2026-4277
* CVE-2026-4292

CVSS scores:

* CVE-2026-33033 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33033 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-33034 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-3902 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-3902 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-4277 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-4292 ( SUSE ): 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 5 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the python311-Django-5.2.13-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311-Django 5.2.13-1.1
* python313-Django 5.2.13-1.1
* python314-Django 5.2.13-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-33033.html
* https://www.suse.com/security/cve/CVE-2026-33034.html
* https://www.suse.com/security/cve/CVE-2026-3902.html
* https://www.suse.com/security/cve/CVE-2026-4277.html
* https://www.suse.com/security/cve/CVE-2026-4292.html



openSUSE-SU-2026:10562-1: moderate: flannel-0.28.4-1.1 on GA media


# flannel-0.28.4-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10562-1
Rating: moderate

Cross-References:

* CVE-2026-33413

CVSS scores:

* CVE-2026-33413 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-33413 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the flannel-0.28.4-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* flannel 0.28.4-1.1
* flannel-k8s-yaml 0.28.4-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-33413.html



openSUSE-SU-2026:10566-1: moderate: liblog4cxx-devel-1.7.0-2.1 on GA media


# liblog4cxx-devel-1.7.0-2.1 on GA media

Announcement ID: openSUSE-SU-2026:10566-1
Rating: moderate

Cross-References:

* CVE-2026-40023

CVSS scores:

* CVE-2026-40023 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-40023 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the liblog4cxx-devel-1.7.0-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* liblog4cxx-devel 1.7.0-2.1
* liblog4cxx15 1.7.0-2.1

## References:

* https://www.suse.com/security/cve/CVE-2026-40023.html



openSUSE-SU-2026:10559-1: moderate: ImageMagick-7.1.2.19-1.1 on GA media


# ImageMagick-7.1.2.19-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10559-1
Rating: moderate

Cross-References:

* CVE-2026-33905

CVSS scores:

* CVE-2026-33905 ( SUSE ): 5 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-33905 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the ImageMagick-7.1.2.19-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* ImageMagick 7.1.2.19-1.1
* ImageMagick-config-7-SUSE 7.1.2.19-1.1
* ImageMagick-devel 7.1.2.19-1.1
* ImageMagick-devel-32bit 7.1.2.19-1.1
* ImageMagick-doc 7.1.2.19-1.1
* ImageMagick-extra 7.1.2.19-1.1
* libMagick++-7_Q16HDRI5 7.1.2.19-1.1
* libMagick++-7_Q16HDRI5-32bit 7.1.2.19-1.1
* libMagick++-devel 7.1.2.19-1.1
* libMagick++-devel-32bit 7.1.2.19-1.1
* libMagickCore-7_Q16HDRI10 7.1.2.19-1.1
* libMagickCore-7_Q16HDRI10-32bit 7.1.2.19-1.1
* libMagickWand-7_Q16HDRI10 7.1.2.19-1.1
* libMagickWand-7_Q16HDRI10-32bit 7.1.2.19-1.1
* perl-PerlMagick 7.1.2.19-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-33905.html



openSUSE-SU-2026:10558-1: moderate: GraphicsMagick-1.3.46-5.1 on GA media


# GraphicsMagick-1.3.46-5.1 on GA media

Announcement ID: openSUSE-SU-2026:10558-1
Rating: moderate

Cross-References:

* CVE-2026-26284

CVSS scores:

* CVE-2026-26284 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-26284 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the GraphicsMagick-1.3.46-5.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* GraphicsMagick 1.3.46-5.1
* GraphicsMagick-devel 1.3.46-5.1
* libGraphicsMagick++-Q16-12 1.3.46-5.1
* libGraphicsMagick++-devel 1.3.46-5.1
* libGraphicsMagick-Q16-3 1.3.46-5.1
* libGraphicsMagick3-config 1.3.46-5.1
* libGraphicsMagickWand-Q16-2 1.3.46-5.1
* perl-GraphicsMagick 1.3.46-5.1

## References:

* https://www.suse.com/security/cve/CVE-2026-26284.html



openSUSE-SU-2026:10564-1: moderate: libpng16-16-1.6.57-1.1 on GA media


# libpng16-16-1.6.57-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10564-1
Rating: moderate

Cross-References:

* CVE-2026-34757

CVSS scores:

* CVE-2026-34757 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-34757 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the libpng16-16-1.6.57-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libpng16-16 1.6.57-1.1
* libpng16-16-32bit 1.6.57-1.1
* libpng16-16-x86-64-v3 1.6.57-1.1
* libpng16-compat-devel 1.6.57-1.1
* libpng16-compat-devel-32bit 1.6.57-1.1
* libpng16-compat-devel-x86-64-v3 1.6.57-1.1
* libpng16-devel 1.6.57-1.1
* libpng16-devel-32bit 1.6.57-1.1
* libpng16-devel-x86-64-v3 1.6.57-1.1
* libpng16-tools 1.6.57-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-34757.html



openSUSE-SU-2026:10563-1: moderate: leancrypto-devel-1.7.2-1.1 on GA media


# leancrypto-devel-1.7.2-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10563-1
Rating: moderate

Cross-References:

* CVE-2026-34610

CVSS scores:

* CVE-2026-34610 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the leancrypto-devel-1.7.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* leancrypto-devel 1.7.2-1.1
* leancrypto-devel-32bit 1.7.2-1.1
* leancrypto-devel-static 1.7.2-1.1
* leancrypto-tools 1.7.2-1.1
* libleancrypto-fips1 1.7.2-1.1
* libleancrypto-fips1-32bit 1.7.2-1.1
* libleancrypto1 1.7.2-1.1
* libleancrypto1-32bit 1.7.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-34610.html