SUSE-SU-2026:1418-1: low: Security update for iproute2
SUSE-SU-2026:1421-1: moderate: Security update for python-CairoSVG
SUSE-SU-2026:1422-1: moderate: Security update for smc-tools
SUSE-SU-2026:1436-1: moderate: Security update for python-ecdsa
SUSE-SU-2026:1440-1: moderate: Security update for openvswitch3
SUSE-SU-2026:1441-1: moderate: Security update for avahi
SUSE-SU-2026:1443-1: moderate: Security update for NetworkManager
SUSE-SU-2026:1423-1: important: Security update for podman
SUSE-SU-2026:1424-1: moderate: Security update for polkit
SUSE-SU-2026:1429-1: moderate: Security update for openssl-3
SUSE-SU-2026:1432-1: important: Security update for libcap
SUSE-SU-2026:1428-1: important: Security update for bind
SUSE-SU-2026:1427-1: moderate: Security update for NetworkManager
openSUSE-SU-2026:10565-1: moderate: libraw-devel-0.22.1-1.1 on GA media
openSUSE-SU-2026:10560-1: moderate: blender-5.1-5.1.1-1.1 on GA media
openSUSE-SU-2026:10567-1: moderate: python311-Django-5.2.13-1.1 on GA media
openSUSE-SU-2026:10562-1: moderate: flannel-0.28.4-1.1 on GA media
openSUSE-SU-2026:10566-1: moderate: liblog4cxx-devel-1.7.0-2.1 on GA media
openSUSE-SU-2026:10559-1: moderate: ImageMagick-7.1.2.19-1.1 on GA media
openSUSE-SU-2026:10558-1: moderate: GraphicsMagick-1.3.46-5.1 on GA media
openSUSE-SU-2026:10564-1: moderate: libpng16-16-1.6.57-1.1 on GA media
openSUSE-SU-2026:10563-1: moderate: leancrypto-devel-1.7.2-1.1 on GA media
SUSE-SU-2026:1418-1: low: Security update for iproute2
# Security update for iproute2
Announcement ID: SUSE-SU-2026:1418-1
Release Date: 2026-04-16T16:43:07Z
Rating: low
References:
* bsc#1254324
Cross-References:
* CVE-2024-58251
CVSS scores:
* CVE-2024-58251 ( SUSE ): 2.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-58251 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-58251 ( NVD ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for iproute2 fixes the following issue:
* CVE-2024-58251: denial of service via terminal escape sequences
(bsc#1254324).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1418=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1418=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* iproute2-arpd-debuginfo-6.4-150600.7.12.1
* libnetlink-devel-6.4-150600.7.12.1
* iproute2-6.4-150600.7.12.1
* iproute2-debugsource-6.4-150600.7.12.1
* iproute2-bash-completion-6.4-150600.7.12.1
* iproute2-debuginfo-6.4-150600.7.12.1
* iproute2-arpd-6.4-150600.7.12.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* iproute2-arpd-debuginfo-6.4-150600.7.12.1
* libnetlink-devel-6.4-150600.7.12.1
* iproute2-6.4-150600.7.12.1
* iproute2-debugsource-6.4-150600.7.12.1
* iproute2-bash-completion-6.4-150600.7.12.1
* iproute2-debuginfo-6.4-150600.7.12.1
* iproute2-arpd-6.4-150600.7.12.1
## References:
* https://www.suse.com/security/cve/CVE-2024-58251.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254324
SUSE-SU-2026:1421-1: moderate: Security update for python-CairoSVG
# Security update for python-CairoSVG
Announcement ID: SUSE-SU-2026:1421-1
Release Date: 2026-04-17T06:46:50Z
Rating: moderate
References:
* bsc#1259690
Cross-References:
* CVE-2026-31899
CVSS scores:
* CVE-2026-31899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-31899 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for python-CairoSVG fixes the following issue:
* CVE-2026-31899: denial of service via recursive element amplification
(bsc#1259690).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1421=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1421=1
* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-1421=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* python311-CairoSVG-2.7.1-150400.9.6.1
* openSUSE Leap 15.6 (noarch)
* python311-CairoSVG-2.7.1-150400.9.6.1
* Python 3 Module 15-SP7 (noarch)
* python311-CairoSVG-2.7.1-150400.9.6.1
## References:
* https://www.suse.com/security/cve/CVE-2026-31899.html
* https://bugzilla.suse.com/show_bug.cgi?id=1259690
SUSE-SU-2026:1422-1: moderate: Security update for smc-tools
# Security update for smc-tools
Announcement ID: SUSE-SU-2026:1422-1
Release Date: 2026-04-17T07:21:34Z
Rating: moderate
References:
* bsc#1230052
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
An update that has one security fix can now be installed.
## Description:
This update for smc-tools fixes the following issue:
Update to smc-tools v1.8.7:
* predictable /tmp file allows for local denial of service (bsc#1230052).
Changelog:
Update to v1.8.7:
* smc_rnics: fix regression when PFT not available
* smcd/smcr: prevent DoS on statistics workfile present in /tmp/
Update to v1.8.6:
* man pages: Update man page for smc_pnet
* smc-tools: Display sndbuf/RMB stats only if supported by the kernel
Update to v1.8.5:
* smc_rnics: Add support for Network Express RNIC in smc_rnics
* smc_rnics: Add PFT and VF columns to smc_rnics output
* libnetlink..: Fix function declaration to use a void prototype
* smc_rnics: Update smc_chk to extract PNetID from column 9
* man pages: Update man page for --rawids option and PFT and VF columns
* smc_rnics: Fix missing PPrt values in smc_rnics -r output
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1422=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1422=1 openSUSE-SLE-15.6-2026-1422=1
## Package List:
* SUSE Linux Enterprise Server 15 SP6 LTSS (s390x)
* smc-tools-debuginfo-1.8.7-150600.3.6.1
* smc-tools-debugsource-1.8.7-150600.3.6.1
* smc-tools-completion-1.8.7-150600.3.6.1
* smc-tools-1.8.7-150600.3.6.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* smc-tools-debuginfo-1.8.7-150600.3.6.1
* smc-tools-debugsource-1.8.7-150600.3.6.1
* smc-tools-completion-1.8.7-150600.3.6.1
* smc-tools-1.8.7-150600.3.6.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230052
SUSE-SU-2026:1436-1: moderate: Security update for python-ecdsa
# Security update for python-ecdsa
Announcement ID: SUSE-SU-2026:1436-1
Release Date: 2026-04-17T12:51:37Z
Rating: moderate
References:
* bsc#1261009
Cross-References:
* CVE-2026-33936
CVSS scores:
* CVE-2026-33936 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-33936 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33936 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for python-ecdsa fixes the following issues:
* CVE-2026-33936: issue in the low-level DER parsing functions can cause
unexpected exceptions to be raised from the public API functions
(bsc#1261009).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1436=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1436=1
* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-1436=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* python311-ecdsa-0.18.0-150400.12.6.1
* openSUSE Leap 15.6 (noarch)
* python311-ecdsa-0.18.0-150400.12.6.1
* Python 3 Module 15-SP7 (noarch)
* python311-ecdsa-0.18.0-150400.12.6.1
## References:
* https://www.suse.com/security/cve/CVE-2026-33936.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261009
SUSE-SU-2026:1440-1: moderate: Security update for openvswitch3
# Security update for openvswitch3
Announcement ID: SUSE-SU-2026:1440-1
Release Date: 2026-04-17T13:44:11Z
Rating: moderate
References:
* bsc#1261273
Cross-References:
* CVE-2026-34956
CVSS scores:
* CVE-2026-34956 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34956 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Micro 5.5
An update that solves one vulnerability can now be installed.
## Description:
This update for openvswitch3 fixes the following issues:
* CVE-2026-34956: invalid memory access via crafted FTP payloads in userspace
conntrack flows specifying the FTP alg handler (bsc#1261273).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1440=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1440=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* openvswitch3-pki-3.1.7-150500.3.28.1
* ovn3-host-debuginfo-23.03.3-150500.3.28.1
* openvswitch3-vtep-debuginfo-3.1.7-150500.3.28.1
* ovn3-devel-23.03.3-150500.3.28.1
* openvswitch3-test-debuginfo-3.1.7-150500.3.28.1
* openvswitch3-ipsec-3.1.7-150500.3.28.1
* ovn3-23.03.3-150500.3.28.1
* python3-ovs3-3.1.7-150500.3.28.1
* openvswitch3-debuginfo-3.1.7-150500.3.28.1
* ovn3-central-debuginfo-23.03.3-150500.3.28.1
* openvswitch3-test-3.1.7-150500.3.28.1
* ovn3-central-23.03.3-150500.3.28.1
* openvswitch3-3.1.7-150500.3.28.1
* openvswitch3-debugsource-3.1.7-150500.3.28.1
* libovn-23_03-0-debuginfo-23.03.3-150500.3.28.1
* ovn3-vtep-23.03.3-150500.3.28.1
* ovn3-vtep-debuginfo-23.03.3-150500.3.28.1
* libopenvswitch-3_1-0-3.1.7-150500.3.28.1
* openvswitch3-devel-3.1.7-150500.3.28.1
* openvswitch3-vtep-3.1.7-150500.3.28.1
* ovn3-docker-23.03.3-150500.3.28.1
* libovn-23_03-0-23.03.3-150500.3.28.1
* libopenvswitch-3_1-0-debuginfo-3.1.7-150500.3.28.1
* ovn3-host-23.03.3-150500.3.28.1
* ovn3-debuginfo-23.03.3-150500.3.28.1
* openSUSE Leap 15.5 (noarch)
* ovn3-doc-23.03.3-150500.3.28.1
* openvswitch3-doc-3.1.7-150500.3.28.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* openvswitch3-debuginfo-3.1.7-150500.3.28.1
* ovn3-central-debuginfo-23.03.3-150500.3.28.1
* openvswitch3-pki-3.1.7-150500.3.28.1
* libopenvswitch-3_1-0-3.1.7-150500.3.28.1
* ovn3-debuginfo-23.03.3-150500.3.28.1
* ovn3-docker-23.03.3-150500.3.28.1
* libovn-23_03-0-23.03.3-150500.3.28.1
* ovn3-vtep-23.03.3-150500.3.28.1
* python3-ovs3-3.1.7-150500.3.28.1
* ovn3-host-debuginfo-23.03.3-150500.3.28.1
* libopenvswitch-3_1-0-debuginfo-3.1.7-150500.3.28.1
* ovn3-central-23.03.3-150500.3.28.1
* ovn3-host-23.03.3-150500.3.28.1
* openvswitch3-vtep-debuginfo-3.1.7-150500.3.28.1
* openvswitch3-3.1.7-150500.3.28.1
* openvswitch3-debugsource-3.1.7-150500.3.28.1
* libovn-23_03-0-debuginfo-23.03.3-150500.3.28.1
* openvswitch3-vtep-3.1.7-150500.3.28.1
* ovn3-vtep-debuginfo-23.03.3-150500.3.28.1
* ovn3-23.03.3-150500.3.28.1
## References:
* https://www.suse.com/security/cve/CVE-2026-34956.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261273
SUSE-SU-2026:1441-1: moderate: Security update for avahi
# Security update for avahi
Announcement ID: SUSE-SU-2026:1441-1
Release Date: 2026-04-17T14:18:38Z
Rating: moderate
References:
* bsc#1257235
Cross-References:
* CVE-2026-24401
CVSS scores:
* CVE-2026-24401 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-24401 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-24401 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP7
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for avahi fixes the following issue:
* CVE-2026-24401: avahi-daemon can be crashed via a segmentation fault by
sending an unsolicited mDNS response containing a recursive CNAME record
(bsc#1257235).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1441=1 openSUSE-SLE-15.6-2026-1441=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1441=1
* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-1441=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-1441=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libavahi-glib-devel-0.8-150600.15.15.1
* avahi-qt5-debugsource-0.8-150600.15.15.1
* libavahi-common3-debuginfo-0.8-150600.15.15.1
* libavahi-glib1-debuginfo-0.8-150600.15.15.1
* python3-avahi-gtk-0.8-150600.15.15.1
* avahi-0.8-150600.15.15.1
* libdns_sd-0.8-150600.15.15.1
* avahi-utils-debuginfo-0.8-150600.15.15.1
* libavahi-qt5-1-0.8-150600.15.15.1
* libavahi-libevent1-debuginfo-0.8-150600.15.15.1
* avahi-utils-gtk-0.8-150600.15.15.1
* avahi-debugsource-0.8-150600.15.15.1
* libavahi-gobject0-0.8-150600.15.15.1
* avahi-compat-howl-devel-0.8-150600.15.15.1
* libhowl0-0.8-150600.15.15.1
* avahi-autoipd-0.8-150600.15.15.1
* python3-avahi-0.8-150600.15.15.1
* libavahi-libevent1-0.8-150600.15.15.1
* libavahi-qt5-1-debuginfo-0.8-150600.15.15.1
* libavahi-qt5-devel-0.8-150600.15.15.1
* libavahi-ui-gtk3-0-0.8-150600.15.15.1
* libavahi-common3-0.8-150600.15.15.1
* typelib-1_0-Avahi-0_6-0.8-150600.15.15.1
* libavahi-client3-0.8-150600.15.15.1
* avahi-utils-gtk-debuginfo-0.8-150600.15.15.1
* avahi-utils-0.8-150600.15.15.1
* libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.15.1
* avahi-autoipd-debuginfo-0.8-150600.15.15.1
* libdns_sd-debuginfo-0.8-150600.15.15.1
* libavahi-glib1-0.8-150600.15.15.1
* libavahi-gobject0-debuginfo-0.8-150600.15.15.1
* avahi-compat-mDNSResponder-devel-0.8-150600.15.15.1
* libavahi-core7-0.8-150600.15.15.1
* avahi-glib2-debugsource-0.8-150600.15.15.1
* libavahi-core7-debuginfo-0.8-150600.15.15.1
* libavahi-client3-debuginfo-0.8-150600.15.15.1
* libavahi-devel-0.8-150600.15.15.1
* libavahi-gobject-devel-0.8-150600.15.15.1
* libhowl0-debuginfo-0.8-150600.15.15.1
* avahi-debuginfo-0.8-150600.15.15.1
* openSUSE Leap 15.6 (x86_64)
* libavahi-glib1-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-common3-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-client3-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-client3-32bit-0.8-150600.15.15.1
* avahi-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-common3-32bit-0.8-150600.15.15.1
* libdns_sd-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-glib1-32bit-0.8-150600.15.15.1
* libdns_sd-32bit-0.8-150600.15.15.1
* openSUSE Leap 15.6 (noarch)
* avahi-lang-0.8-150600.15.15.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libavahi-glib1-64bit-0.8-150600.15.15.1
* avahi-64bit-debuginfo-0.8-150600.15.15.1
* libavahi-glib1-64bit-debuginfo-0.8-150600.15.15.1
* libavahi-client3-64bit-debuginfo-0.8-150600.15.15.1
* libavahi-client3-64bit-0.8-150600.15.15.1
* libdns_sd-64bit-0.8-150600.15.15.1
* libdns_sd-64bit-debuginfo-0.8-150600.15.15.1
* libavahi-common3-64bit-debuginfo-0.8-150600.15.15.1
* libavahi-common3-64bit-0.8-150600.15.15.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libavahi-glib-devel-0.8-150600.15.15.1
* libavahi-common3-debuginfo-0.8-150600.15.15.1
* libavahi-glib1-debuginfo-0.8-150600.15.15.1
* avahi-0.8-150600.15.15.1
* libdns_sd-0.8-150600.15.15.1
* avahi-utils-debuginfo-0.8-150600.15.15.1
* libavahi-libevent1-debuginfo-0.8-150600.15.15.1
* libavahi-gobject0-0.8-150600.15.15.1
* avahi-debugsource-0.8-150600.15.15.1
* avahi-compat-howl-devel-0.8-150600.15.15.1
* libhowl0-0.8-150600.15.15.1
* libavahi-libevent1-0.8-150600.15.15.1
* libavahi-ui-gtk3-0-0.8-150600.15.15.1
* libavahi-common3-0.8-150600.15.15.1
* typelib-1_0-Avahi-0_6-0.8-150600.15.15.1
* libavahi-client3-0.8-150600.15.15.1
* avahi-utils-0.8-150600.15.15.1
* libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.15.1
* libdns_sd-debuginfo-0.8-150600.15.15.1
* libavahi-glib1-0.8-150600.15.15.1
* libavahi-gobject0-debuginfo-0.8-150600.15.15.1
* avahi-compat-mDNSResponder-devel-0.8-150600.15.15.1
* libavahi-core7-0.8-150600.15.15.1
* avahi-glib2-debugsource-0.8-150600.15.15.1
* libavahi-core7-debuginfo-0.8-150600.15.15.1
* libavahi-client3-debuginfo-0.8-150600.15.15.1
* libavahi-devel-0.8-150600.15.15.1
* libhowl0-debuginfo-0.8-150600.15.15.1
* avahi-debuginfo-0.8-150600.15.15.1
* Basesystem Module 15-SP7 (noarch)
* avahi-lang-0.8-150600.15.15.1
* Basesystem Module 15-SP7 (x86_64)
* libavahi-common3-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-client3-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-client3-32bit-0.8-150600.15.15.1
* avahi-32bit-debuginfo-0.8-150600.15.15.1
* libavahi-common3-32bit-0.8-150600.15.15.1
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* avahi-glib2-debugsource-0.8-150600.15.15.1
* avahi-autoipd-0.8-150600.15.15.1
* libavahi-gobject-devel-0.8-150600.15.15.1
* avahi-utils-gtk-debuginfo-0.8-150600.15.15.1
* avahi-debuginfo-0.8-150600.15.15.1
* avahi-autoipd-debuginfo-0.8-150600.15.15.1
* avahi-utils-gtk-0.8-150600.15.15.1
* avahi-debugsource-0.8-150600.15.15.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
* avahi-debugsource-0.8-150600.15.15.1
* python3-avahi-0.8-150600.15.15.1
* avahi-debuginfo-0.8-150600.15.15.1
## References:
* https://www.suse.com/security/cve/CVE-2026-24401.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257235
SUSE-SU-2026:1443-1: moderate: Security update for NetworkManager
# Security update for NetworkManager
Announcement ID: SUSE-SU-2026:1443-1
Release Date: 2026-04-17T14:40:59Z
Rating: moderate
References:
* bsc#1225498
* bsc#1257359
Cross-References:
* CVE-2025-9615
CVSS scores:
* CVE-2025-9615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-9615 ( NVD ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* Basesystem Module 15-SP7
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Linux Enterprise Workstation Extension 15 SP7
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for NetworkManager fixes the following issue:
Security fixes:
* CVE-2025-9615: Fixed non-admin user using others' certificates
(bsc#1257359).
Other fixes:
* Don't renew DHCP lease when software devices' MAC is empty (bsc#1225498).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1443=1 openSUSE-SLE-15.6-2026-1443=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1443=1
* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-1443=1
* SUSE Linux Enterprise Workstation Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-1443=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* NetworkManager-wwan-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-debugsource-1.44.2-150600.3.7.1
* NetworkManager-ovs-1.44.2-150600.3.7.1
* NetworkManager-ovs-debuginfo-1.44.2-150600.3.7.1
* libnm0-1.44.2-150600.3.7.1
* libnm0-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-tui-debuginfo-1.44.2-150600.3.7.1
* typelib-1_0-NM-1_0-1.44.2-150600.3.7.1
* NetworkManager-cloud-setup-1.44.2-150600.3.7.1
* NetworkManager-wwan-1.44.2-150600.3.7.1
* NetworkManager-1.44.2-150600.3.7.1
* NetworkManager-bluetooth-1.44.2-150600.3.7.1
* NetworkManager-cloud-setup-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-pppoe-1.44.2-150600.3.7.1
* NetworkManager-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-tui-1.44.2-150600.3.7.1
* NetworkManager-bluetooth-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-devel-1.44.2-150600.3.7.1
* NetworkManager-pppoe-debuginfo-1.44.2-150600.3.7.1
* openSUSE Leap 15.6 (noarch)
* NetworkManager-lang-1.44.2-150600.3.7.1
* NetworkManager-branding-upstream-1.44.2-150600.3.7.1
* openSUSE Leap 15.6 (x86_64)
* NetworkManager-devel-32bit-1.44.2-150600.3.7.1
* libnm0-32bit-debuginfo-1.44.2-150600.3.7.1
* libnm0-32bit-1.44.2-150600.3.7.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libnm0-64bit-1.44.2-150600.3.7.1
* NetworkManager-devel-64bit-1.44.2-150600.3.7.1
* libnm0-64bit-debuginfo-1.44.2-150600.3.7.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* NetworkManager-debugsource-1.44.2-150600.3.7.1
* libnm0-1.44.2-150600.3.7.1
* libnm0-debuginfo-1.44.2-150600.3.7.1
* typelib-1_0-NM-1_0-1.44.2-150600.3.7.1
* NetworkManager-debuginfo-1.44.2-150600.3.7.1
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* NetworkManager-wwan-1.44.2-150600.3.7.1
* NetworkManager-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-debugsource-1.44.2-150600.3.7.1
* NetworkManager-1.44.2-150600.3.7.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
* NetworkManager-wwan-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-debugsource-1.44.2-150600.3.7.1
* NetworkManager-tui-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-cloud-setup-1.44.2-150600.3.7.1
* NetworkManager-wwan-1.44.2-150600.3.7.1
* NetworkManager-pppoe-1.44.2-150600.3.7.1
* NetworkManager-bluetooth-1.44.2-150600.3.7.1
* NetworkManager-cloud-setup-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-tui-1.44.2-150600.3.7.1
* NetworkManager-bluetooth-debuginfo-1.44.2-150600.3.7.1
* NetworkManager-devel-1.44.2-150600.3.7.1
* NetworkManager-pppoe-debuginfo-1.44.2-150600.3.7.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch)
* NetworkManager-lang-1.44.2-150600.3.7.1
## References:
* https://www.suse.com/security/cve/CVE-2025-9615.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225498
* https://bugzilla.suse.com/show_bug.cgi?id=1257359
SUSE-SU-2026:1423-1: important: Security update for podman
# Security update for podman
Announcement ID: SUSE-SU-2026:1423-1
Release Date: 2026-04-17T07:58:24Z
Rating: important
References:
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
An update that can now be installed.
## Description:
This update for podman rebuilds it against the current go 1.25 security release.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-1423=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2026-1423=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-1423=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-1423=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* podman-remote-4.9.5-150300.9.71.1
* podman-remote-debuginfo-4.9.5-150300.9.71.1
* podman-4.9.5-150300.9.71.1
* podman-debuginfo-4.9.5-150300.9.71.1
* podmansh-4.9.5-150300.9.71.1
* openSUSE Leap 15.3 (noarch)
* podman-docker-4.9.5-150300.9.71.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* podman-4.9.5-150300.9.71.1
* podman-debuginfo-4.9.5-150300.9.71.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* podman-remote-4.9.5-150300.9.71.1
* podman-4.9.5-150300.9.71.1
* podman-debuginfo-4.9.5-150300.9.71.1
* podman-remote-debuginfo-4.9.5-150300.9.71.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* podman-remote-4.9.5-150300.9.71.1
* podman-4.9.5-150300.9.71.1
* podman-debuginfo-4.9.5-150300.9.71.1
* podman-remote-debuginfo-4.9.5-150300.9.71.1
SUSE-SU-2026:1424-1: moderate: Security update for polkit
# Security update for polkit
Announcement ID: SUSE-SU-2026:1424-1
Release Date: 2026-04-17T08:03:11Z
Rating: moderate
References:
* bsc#1260859
Cross-References:
* CVE-2026-4897
CVSS scores:
* CVE-2026-4897 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-4897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-4897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for polkit fixes the following issue:
* CVE-2026-4897: Fixed possible OOM condition via specially crafted input to
`polkit-agent-helper-1` (bsc#1260859).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1424=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1424=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1424=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1424=1
## Package List:
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libpolkit-agent-1-0-debuginfo-121-150500.3.11.1
* polkit-121-150500.3.11.1
* libpolkit-gobject-1-0-debuginfo-121-150500.3.11.1
* polkit-debuginfo-121-150500.3.11.1
* polkit-debugsource-121-150500.3.11.1
* libpolkit-agent-1-0-121-150500.3.11.1
* libpolkit-gobject-1-0-121-150500.3.11.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libpolkit-agent-1-0-debuginfo-121-150500.3.11.1
* libpolkit-gobject-1-0-debuginfo-121-150500.3.11.1
* polkit-121-150500.3.11.1
* polkit-devel-121-150500.3.11.1
* polkit-debuginfo-121-150500.3.11.1
* typelib-1_0-Polkit-1_0-121-150500.3.11.1
* pkexec-121-150500.3.11.1
* pkexec-debuginfo-121-150500.3.11.1
* polkit-debugsource-121-150500.3.11.1
* polkit-devel-debuginfo-121-150500.3.11.1
* libpolkit-agent-1-0-121-150500.3.11.1
* libpolkit-gobject-1-0-121-150500.3.11.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libpolkit-agent-1-0-debuginfo-121-150500.3.11.1
* libpolkit-gobject-1-0-debuginfo-121-150500.3.11.1
* polkit-121-150500.3.11.1
* polkit-devel-121-150500.3.11.1
* polkit-debuginfo-121-150500.3.11.1
* typelib-1_0-Polkit-1_0-121-150500.3.11.1
* pkexec-121-150500.3.11.1
* pkexec-debuginfo-121-150500.3.11.1
* polkit-debugsource-121-150500.3.11.1
* polkit-devel-debuginfo-121-150500.3.11.1
* libpolkit-agent-1-0-121-150500.3.11.1
* libpolkit-gobject-1-0-121-150500.3.11.1
* openSUSE Leap 15.5 (x86_64)
* libpolkit-agent-1-0-32bit-121-150500.3.11.1
* libpolkit-agent-1-0-32bit-debuginfo-121-150500.3.11.1
* libpolkit-gobject-1-0-32bit-121-150500.3.11.1
* libpolkit-gobject-1-0-32bit-debuginfo-121-150500.3.11.1
* openSUSE Leap 15.5 (noarch)
* polkit-doc-121-150500.3.11.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libpolkit-gobject-1-0-64bit-121-150500.3.11.1
* libpolkit-agent-1-0-64bit-121-150500.3.11.1
* libpolkit-gobject-1-0-64bit-debuginfo-121-150500.3.11.1
* libpolkit-agent-1-0-64bit-debuginfo-121-150500.3.11.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libpolkit-agent-1-0-debuginfo-121-150500.3.11.1
* libpolkit-gobject-1-0-debuginfo-121-150500.3.11.1
* polkit-121-150500.3.11.1
* polkit-devel-121-150500.3.11.1
* polkit-debuginfo-121-150500.3.11.1
* typelib-1_0-Polkit-1_0-121-150500.3.11.1
* pkexec-121-150500.3.11.1
* pkexec-debuginfo-121-150500.3.11.1
* polkit-debugsource-121-150500.3.11.1
* polkit-devel-debuginfo-121-150500.3.11.1
* libpolkit-agent-1-0-121-150500.3.11.1
* libpolkit-gobject-1-0-121-150500.3.11.1
* openSUSE Leap 15.6 (x86_64)
* libpolkit-agent-1-0-32bit-121-150500.3.11.1
* libpolkit-agent-1-0-32bit-debuginfo-121-150500.3.11.1
* libpolkit-gobject-1-0-32bit-121-150500.3.11.1
* libpolkit-gobject-1-0-32bit-debuginfo-121-150500.3.11.1
* openSUSE Leap 15.6 (noarch)
* polkit-doc-121-150500.3.11.1
## References:
* https://www.suse.com/security/cve/CVE-2026-4897.html
* https://bugzilla.suse.com/show_bug.cgi?id=1260859
SUSE-SU-2026:1429-1: moderate: Security update for openssl-3
# Security update for openssl-3
Announcement ID: SUSE-SU-2026:1429-1
Release Date: 2026-04-17T10:03:32Z
Rating: moderate
References:
* bsc#1261678
Cross-References:
* CVE-2026-28390
CVSS scores:
* CVE-2026-28390 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28390 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28390 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-3 fixes the following issue:
* CVE-2026-28390: NULL pointer dereference during processing of a crafted CMS
EnvelopedData message with KeyTransportRecipientInfo (bsc#1261678).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1429=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1429=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1429=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1429=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1429=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1429=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1429=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1429=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1429=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* libopenssl-3-devel-3.0.8-150400.4.84.1
* openssl-3-debuginfo-3.0.8-150400.4.84.1
* openSUSE Leap 15.4 (x86_64)
* libopenssl3-32bit-debuginfo-3.0.8-150400.4.84.1
* libopenssl-3-devel-32bit-3.0.8-150400.4.84.1
* libopenssl3-32bit-3.0.8-150400.4.84.1
* openSUSE Leap 15.4 (noarch)
* openssl-3-doc-3.0.8-150400.4.84.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libopenssl3-64bit-debuginfo-3.0.8-150400.4.84.1
* libopenssl-3-devel-64bit-3.0.8-150400.4.84.1
* libopenssl3-64bit-3.0.8-150400.4.84.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* libopenssl-3-devel-3.0.8-150400.4.84.1
* openssl-3-debuginfo-3.0.8-150400.4.84.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* libopenssl-3-devel-3.0.8-150400.4.84.1
* openssl-3-debuginfo-3.0.8-150400.4.84.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* libopenssl-3-devel-3.0.8-150400.4.84.1
* openssl-3-debuginfo-3.0.8-150400.4.84.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libopenssl3-3.0.8-150400.4.84.1
* libopenssl3-debuginfo-3.0.8-150400.4.84.1
* openssl-3-3.0.8-150400.4.84.1
* openssl-3-debugsource-3.0.8-150400.4.84.1
* libopenssl-3-devel-3.0.8-150400.4.84.1
* openssl-3-debuginfo-3.0.8-150400.4.84.1
## References:
* https://www.suse.com/security/cve/CVE-2026-28390.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261678
SUSE-SU-2026:1432-1: important: Security update for libcap
# Security update for libcap
Announcement ID: SUSE-SU-2026:1432-1
Release Date: 2026-04-17T10:13:04Z
Rating: important
References:
* bsc#1261809
Cross-References:
* CVE-2026-4878
CVSS scores:
* CVE-2026-4878 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-4878 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-4878 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for libcap fixes the following issue:
* CVE-2026-4878: Address a potential TOCTOU race condition in cap_set_file()
(bsc#1261809).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1432=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1432=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1432=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1432=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1432=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1432=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1432=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1432=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1432=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1432=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1432=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1432=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1432=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1432=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1432=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1432=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1432=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* openSUSE Leap 15.4 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libpsx2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* libpsx2-32bit-debuginfo-2.63-150400.3.6.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libcap2-64bit-2.63-150400.3.6.1
* libcap2-64bit-debuginfo-2.63-150400.3.6.1
* libpsx2-64bit-debuginfo-2.63-150400.3.6.1
* libpsx2-64bit-2.63-150400.3.6.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libcap2-debuginfo-2.63-150400.3.6.1
* libcap-debugsource-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libcap2-debuginfo-2.63-150400.3.6.1
* libcap-debugsource-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libcap2-debuginfo-2.63-150400.3.6.1
* libcap-debugsource-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libcap2-debuginfo-2.63-150400.3.6.1
* libcap-debugsource-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libcap2-debuginfo-2.63-150400.3.6.1
* libcap-debugsource-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* Basesystem Module 15-SP7 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libcap-debugsource-2.63-150400.3.6.1
* libcap-progs-2.63-150400.3.6.1
* libcap2-debuginfo-2.63-150400.3.6.1
* libpsx2-2.63-150400.3.6.1
* libpsx2-debuginfo-2.63-150400.3.6.1
* libcap2-2.63-150400.3.6.1
* libcap-devel-2.63-150400.3.6.1
* libcap-progs-debuginfo-2.63-150400.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* libcap2-32bit-2.63-150400.3.6.1
* libcap2-32bit-debuginfo-2.63-150400.3.6.1
## References:
* https://www.suse.com/security/cve/CVE-2026-4878.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261809
SUSE-SU-2026:1428-1: important: Security update for bind
# Security update for bind
Announcement ID: SUSE-SU-2026:1428-1
Release Date: 2026-04-17T10:00:58Z
Rating: important
References:
* bsc#1260805
Cross-References:
* CVE-2026-1519
CVSS scores:
* CVE-2026-1519 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-1519 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-1519 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves one vulnerability can now be installed.
## Description:
This update for bind fixes the following issues:
* CVE-2026-1519: high CPU load during insecure delegation validation due to
excessive NSEC3 iterations (bsc#1260805).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1428=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1428=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1428=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1428=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1428=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* bind-9.16.50-150400.5.59.1
* bind-utils-9.16.50-150400.5.59.1
* bind-debuginfo-9.16.50-150400.5.59.1
* bind-utils-debuginfo-9.16.50-150400.5.59.1
* bind-debugsource-9.16.50-150400.5.59.1
* openSUSE Leap 15.4 (noarch)
* python3-bind-9.16.50-150400.5.59.1
* bind-doc-9.16.50-150400.5.59.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* bind-9.16.50-150400.5.59.1
* bind-utils-9.16.50-150400.5.59.1
* bind-debuginfo-9.16.50-150400.5.59.1
* bind-utils-debuginfo-9.16.50-150400.5.59.1
* bind-debugsource-9.16.50-150400.5.59.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python3-bind-9.16.50-150400.5.59.1
* bind-doc-9.16.50-150400.5.59.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* bind-9.16.50-150400.5.59.1
* bind-utils-9.16.50-150400.5.59.1
* bind-debuginfo-9.16.50-150400.5.59.1
* bind-utils-debuginfo-9.16.50-150400.5.59.1
* bind-debugsource-9.16.50-150400.5.59.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python3-bind-9.16.50-150400.5.59.1
* bind-doc-9.16.50-150400.5.59.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* bind-9.16.50-150400.5.59.1
* bind-utils-9.16.50-150400.5.59.1
* bind-debuginfo-9.16.50-150400.5.59.1
* bind-utils-debuginfo-9.16.50-150400.5.59.1
* bind-debugsource-9.16.50-150400.5.59.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* python3-bind-9.16.50-150400.5.59.1
* bind-doc-9.16.50-150400.5.59.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* bind-9.16.50-150400.5.59.1
* bind-utils-9.16.50-150400.5.59.1
* bind-debuginfo-9.16.50-150400.5.59.1
* bind-utils-debuginfo-9.16.50-150400.5.59.1
* bind-debugsource-9.16.50-150400.5.59.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* python3-bind-9.16.50-150400.5.59.1
* bind-doc-9.16.50-150400.5.59.1
## References:
* https://www.suse.com/security/cve/CVE-2026-1519.html
* https://bugzilla.suse.com/show_bug.cgi?id=1260805
SUSE-SU-2026:1427-1: moderate: Security update for NetworkManager
# Security update for NetworkManager
Announcement ID: SUSE-SU-2026:1427-1
Release Date: 2026-04-17T09:58:43Z
Rating: moderate
References:
* bsc#1257359
Cross-References:
* CVE-2025-9615
CVSS scores:
* CVE-2025-9615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-9615 ( NVD ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Micro 5.5
An update that solves one vulnerability can now be installed.
## Description:
This update for NetworkManager fixes the following issue:
* CVE-2025-9615: Fixed non-admin user using others' certificates
(bsc#1257359).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1427=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1427=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* NetworkManager-debuginfo-1.38.6-150500.3.5.1
* libnm0-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-bluetooth-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-debugsource-1.38.6-150500.3.5.1
* NetworkManager-wwan-1.38.6-150500.3.5.1
* NetworkManager-bluetooth-1.38.6-150500.3.5.1
* NetworkManager-cloud-setup-1.38.6-150500.3.5.1
* NetworkManager-devel-1.38.6-150500.3.5.1
* NetworkManager-pppoe-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-pppoe-1.38.6-150500.3.5.1
* NetworkManager-tui-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-cloud-setup-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-1.38.6-150500.3.5.1
* NetworkManager-tui-1.38.6-150500.3.5.1
* NetworkManager-wwan-debuginfo-1.38.6-150500.3.5.1
* typelib-1_0-NM-1_0-1.38.6-150500.3.5.1
* NetworkManager-ovs-debuginfo-1.38.6-150500.3.5.1
* libnm0-1.38.6-150500.3.5.1
* NetworkManager-ovs-1.38.6-150500.3.5.1
* openSUSE Leap 15.5 (noarch)
* NetworkManager-lang-1.38.6-150500.3.5.1
* NetworkManager-branding-upstream-1.38.6-150500.3.5.1
* openSUSE Leap 15.5 (x86_64)
* NetworkManager-devel-32bit-1.38.6-150500.3.5.1
* libnm0-32bit-debuginfo-1.38.6-150500.3.5.1
* libnm0-32bit-1.38.6-150500.3.5.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libnm0-64bit-1.38.6-150500.3.5.1
* libnm0-64bit-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-devel-64bit-1.38.6-150500.3.5.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* NetworkManager-debuginfo-1.38.6-150500.3.5.1
* libnm0-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-bluetooth-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-debugsource-1.38.6-150500.3.5.1
* NetworkManager-wwan-1.38.6-150500.3.5.1
* NetworkManager-bluetooth-1.38.6-150500.3.5.1
* NetworkManager-cloud-setup-1.38.6-150500.3.5.1
* NetworkManager-pppoe-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-pppoe-1.38.6-150500.3.5.1
* NetworkManager-tui-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-cloud-setup-debuginfo-1.38.6-150500.3.5.1
* NetworkManager-1.38.6-150500.3.5.1
* NetworkManager-tui-1.38.6-150500.3.5.1
* NetworkManager-wwan-debuginfo-1.38.6-150500.3.5.1
* typelib-1_0-NM-1_0-1.38.6-150500.3.5.1
* libnm0-1.38.6-150500.3.5.1
## References:
* https://www.suse.com/security/cve/CVE-2025-9615.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257359
openSUSE-SU-2026:10565-1: moderate: libraw-devel-0.22.1-1.1 on GA media
# libraw-devel-0.22.1-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10565-1
Rating: moderate
Cross-References:
* CVE-2026-20884
* CVE-2026-20889
* CVE-2026-20911
* CVE-2026-21413
* CVE-2026-24450
* CVE-2026-24660
* CVE-2026-5342
CVSS scores:
* CVE-2026-20884 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20884 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20889 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20889 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20911 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20911 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21413 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-21413 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-24450 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-24450 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-24660 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-24660 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-5342 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-5342 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 7 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the libraw-devel-0.22.1-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libraw-devel 0.22.1-1.1
* libraw-devel-static 0.22.1-1.1
* libraw-tools 0.22.1-1.1
* libraw25 0.22.1-1.1
* libraw25-32bit 0.22.1-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-20884.html
* https://www.suse.com/security/cve/CVE-2026-20889.html
* https://www.suse.com/security/cve/CVE-2026-20911.html
* https://www.suse.com/security/cve/CVE-2026-21413.html
* https://www.suse.com/security/cve/CVE-2026-24450.html
* https://www.suse.com/security/cve/CVE-2026-24660.html
* https://www.suse.com/security/cve/CVE-2026-5342.html
openSUSE-SU-2026:10560-1: moderate: blender-5.1-5.1.1-1.1 on GA media
# blender-5.1-5.1.1-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10560-1
Rating: moderate
Cross-References:
* CVE-2022-0544
* CVE-2022-0545
* CVE-2022-0546
Affected Products:
* openSUSE Tumbleweed
An update that solves 3 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the blender-5.1-5.1.1-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* blender-5.1 5.1.1-1.1
* blender-5.1-demo 5.1.1-1.1
* blender-5.1-lang 5.1.1-1.1
## References:
* https://www.suse.com/security/cve/CVE-2022-0544.html
* https://www.suse.com/security/cve/CVE-2022-0545.html
* https://www.suse.com/security/cve/CVE-2022-0546.html
openSUSE-SU-2026:10567-1: moderate: python311-Django-5.2.13-1.1 on GA media
# python311-Django-5.2.13-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10567-1
Rating: moderate
Cross-References:
* CVE-2026-33033
* CVE-2026-33034
* CVE-2026-3902
* CVE-2026-4277
* CVE-2026-4292
CVSS scores:
* CVE-2026-33033 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33033 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-33034 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-3902 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-3902 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-4277 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-4292 ( SUSE ): 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 5 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the python311-Django-5.2.13-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python311-Django 5.2.13-1.1
* python313-Django 5.2.13-1.1
* python314-Django 5.2.13-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-33033.html
* https://www.suse.com/security/cve/CVE-2026-33034.html
* https://www.suse.com/security/cve/CVE-2026-3902.html
* https://www.suse.com/security/cve/CVE-2026-4277.html
* https://www.suse.com/security/cve/CVE-2026-4292.html
openSUSE-SU-2026:10562-1: moderate: flannel-0.28.4-1.1 on GA media
# flannel-0.28.4-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10562-1
Rating: moderate
Cross-References:
* CVE-2026-33413
CVSS scores:
* CVE-2026-33413 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-33413 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the flannel-0.28.4-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* flannel 0.28.4-1.1
* flannel-k8s-yaml 0.28.4-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-33413.html
openSUSE-SU-2026:10566-1: moderate: liblog4cxx-devel-1.7.0-2.1 on GA media
# liblog4cxx-devel-1.7.0-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10566-1
Rating: moderate
Cross-References:
* CVE-2026-40023
CVSS scores:
* CVE-2026-40023 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-40023 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the liblog4cxx-devel-1.7.0-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* liblog4cxx-devel 1.7.0-2.1
* liblog4cxx15 1.7.0-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-40023.html
openSUSE-SU-2026:10559-1: moderate: ImageMagick-7.1.2.19-1.1 on GA media
# ImageMagick-7.1.2.19-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10559-1
Rating: moderate
Cross-References:
* CVE-2026-33905
CVSS scores:
* CVE-2026-33905 ( SUSE ): 5 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-33905 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the ImageMagick-7.1.2.19-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* ImageMagick 7.1.2.19-1.1
* ImageMagick-config-7-SUSE 7.1.2.19-1.1
* ImageMagick-devel 7.1.2.19-1.1
* ImageMagick-devel-32bit 7.1.2.19-1.1
* ImageMagick-doc 7.1.2.19-1.1
* ImageMagick-extra 7.1.2.19-1.1
* libMagick++-7_Q16HDRI5 7.1.2.19-1.1
* libMagick++-7_Q16HDRI5-32bit 7.1.2.19-1.1
* libMagick++-devel 7.1.2.19-1.1
* libMagick++-devel-32bit 7.1.2.19-1.1
* libMagickCore-7_Q16HDRI10 7.1.2.19-1.1
* libMagickCore-7_Q16HDRI10-32bit 7.1.2.19-1.1
* libMagickWand-7_Q16HDRI10 7.1.2.19-1.1
* libMagickWand-7_Q16HDRI10-32bit 7.1.2.19-1.1
* perl-PerlMagick 7.1.2.19-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-33905.html
openSUSE-SU-2026:10558-1: moderate: GraphicsMagick-1.3.46-5.1 on GA media
# GraphicsMagick-1.3.46-5.1 on GA media
Announcement ID: openSUSE-SU-2026:10558-1
Rating: moderate
Cross-References:
* CVE-2026-26284
CVSS scores:
* CVE-2026-26284 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-26284 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the GraphicsMagick-1.3.46-5.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* GraphicsMagick 1.3.46-5.1
* GraphicsMagick-devel 1.3.46-5.1
* libGraphicsMagick++-Q16-12 1.3.46-5.1
* libGraphicsMagick++-devel 1.3.46-5.1
* libGraphicsMagick-Q16-3 1.3.46-5.1
* libGraphicsMagick3-config 1.3.46-5.1
* libGraphicsMagickWand-Q16-2 1.3.46-5.1
* perl-GraphicsMagick 1.3.46-5.1
## References:
* https://www.suse.com/security/cve/CVE-2026-26284.html
openSUSE-SU-2026:10564-1: moderate: libpng16-16-1.6.57-1.1 on GA media
# libpng16-16-1.6.57-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10564-1
Rating: moderate
Cross-References:
* CVE-2026-34757
CVSS scores:
* CVE-2026-34757 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-34757 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the libpng16-16-1.6.57-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libpng16-16 1.6.57-1.1
* libpng16-16-32bit 1.6.57-1.1
* libpng16-16-x86-64-v3 1.6.57-1.1
* libpng16-compat-devel 1.6.57-1.1
* libpng16-compat-devel-32bit 1.6.57-1.1
* libpng16-compat-devel-x86-64-v3 1.6.57-1.1
* libpng16-devel 1.6.57-1.1
* libpng16-devel-32bit 1.6.57-1.1
* libpng16-devel-x86-64-v3 1.6.57-1.1
* libpng16-tools 1.6.57-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-34757.html
openSUSE-SU-2026:10563-1: moderate: leancrypto-devel-1.7.2-1.1 on GA media
# leancrypto-devel-1.7.2-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10563-1
Rating: moderate
Cross-References:
* CVE-2026-34610
CVSS scores:
* CVE-2026-34610 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the leancrypto-devel-1.7.2-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* leancrypto-devel 1.7.2-1.1
* leancrypto-devel-32bit 1.7.2-1.1
* leancrypto-devel-static 1.7.2-1.1
* leancrypto-tools 1.7.2-1.1
* libleancrypto-fips1 1.7.2-1.1
* libleancrypto-fips1-32bit 1.7.2-1.1
* libleancrypto1 1.7.2-1.1
* libleancrypto1-32bit 1.7.2-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-34610.html