SUSE-SU-2026:1578-1: important: Security update for the Linux Kernel (Live Patch 38 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:1583-1: important: Security update for the Linux Kernel (Live Patch 17 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1584-1: important: Security update for the Linux Kernel (Live Patch 47 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:1600-1: important: Security update for flatpak
SUSE-SU-2026:1602-1: moderate: Security update for libpng16
SUSE-SU-2026:1605-1: moderate: Security update for openssl-3
SUSE-SU-2026:1607-1: important: Security update for vim
SUSE-SU-2026:1592-1: important: Security update for the Linux Kernel (Live Patch 48 for SUSE Linux Enterprise 15 SP4)
openSUSE-SU-2026:20618-1: moderate: Security update for haproxy
openSUSE-SU-2026:20617-1: important: Security update for python-Pillow
openSUSE-SU-2026:20619-1: important: Security update for coredns
openSUSE-SU-2026:10607-1: moderate: golang-github-prometheus-prometheus-3.11.2-1.1 on GA media
openSUSE-SU-2026:10608-1: moderate: libXpm-devel-3.5.18-2.1 on GA media
openSUSE-SU-2026:10606-1: moderate: frr-10.5.1-3.1 on GA media
SUSE-SU-2026:1597-1: important: Security update for ImageMagick
SUSE-SU-2026:1599-1: important: Security update for librsvg
SUSE-SU-2026:1619-1: moderate: Security update for PackageKit
SUSE-SU-2026:1613-1: important: Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1611-1: important: Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:1578-1: important: Security update for the Linux Kernel (Live Patch 38 for SUSE Linux Enterprise 15 SP4)
# Security update for the Linux Kernel (Live Patch 38 for SUSE Linux Enterprise
15 SP4)
Announcement ID: SUSE-SU-2026:1578-1
Release Date: 2026-04-23T16:06:07Z
Rating: important
References:
* bsc#1258396
* bsc#1259859
Cross-References:
* CVE-2026-23191
* CVE-2026-23268
CVSS scores:
* CVE-2026-23191 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23191 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23191 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23191 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23268 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.158 fixes
various security issues
The following security issues were fixed:
* CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258396).
* CVE-2026-23268: apparmor: fix unprivileged local user can do privileged
policy management (bsc#1259859).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1578=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-1578=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_158-default-17-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_38-debugsource-17-150400.2.1
* kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-17-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_158-default-17-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_38-debugsource-17-150400.2.1
* kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-17-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-23191.html
* https://www.suse.com/security/cve/CVE-2026-23268.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258396
* https://bugzilla.suse.com/show_bug.cgi?id=1259859
SUSE-SU-2026:1583-1: important: Security update for the Linux Kernel (Live Patch 17 for SUSE Linux Enterprise 15 SP6)
# Security update for the Linux Kernel (Live Patch 17 for SUSE Linux Enterprise
15 SP6)
Announcement ID: SUSE-SU-2026:1583-1
Release Date: 2026-04-23T17:04:03Z
Rating: important
References:
* bsc#1255066
* bsc#1259859
Cross-References:
* CVE-2025-40309
* CVE-2026-23268
CVSS scores:
* CVE-2025-40309 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40309 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23268 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise Kernel 6.4.0-150600.23.78 fixes
various security issues
The following security issues were fixed:
* CVE-2025-40309: Bluetooth: SCO: Fix UAF on sco_conn_free (bsc#1255066).
* CVE-2026-23268: apparmor: fix unprivileged local user can do privileged
policy management (bsc#1259859).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1583=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-1583=1
## Package List:
* openSUSE Leap 15.6 (x86_64)
* kernel-livepatch-SLE15-SP6_Update_17-debugsource-4-150600.2.1
* kernel-livepatch-6_4_0-150600_23_78-default-debuginfo-4-150600.2.1
* kernel-livepatch-6_4_0-150600_23_78-default-4-150600.2.1
* openSUSE Leap 15.6 (ppc64le s390x)
* kernel-livepatch-6_4_0-150600_23_78-default-debuginfo-4-150600.2.2
* kernel-livepatch-SLE15-SP6_Update_17-debugsource-4-150600.2.2
* kernel-livepatch-6_4_0-150600_23_78-default-4-150600.2.2
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x)
* kernel-livepatch-6_4_0-150600_23_78-default-debuginfo-4-150600.2.2
* kernel-livepatch-SLE15-SP6_Update_17-debugsource-4-150600.2.2
* kernel-livepatch-6_4_0-150600_23_78-default-4-150600.2.2
* SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
* kernel-livepatch-SLE15-SP6_Update_17-debugsource-4-150600.2.1
* kernel-livepatch-6_4_0-150600_23_78-default-debuginfo-4-150600.2.1
* kernel-livepatch-6_4_0-150600_23_78-default-4-150600.2.1
## References:
* https://www.suse.com/security/cve/CVE-2025-40309.html
* https://www.suse.com/security/cve/CVE-2026-23268.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255066
* https://bugzilla.suse.com/show_bug.cgi?id=1259859
SUSE-SU-2026:1584-1: important: Security update for the Linux Kernel (Live Patch 47 for SUSE Linux Enterprise 15 SP4)
# Security update for the Linux Kernel (Live Patch 47 for SUSE Linux Enterprise
15 SP4)
Announcement ID: SUSE-SU-2026:1584-1
Release Date: 2026-04-24T06:34:01Z
Rating: important
References:
* bsc#1258396
* bsc#1259859
Cross-References:
* CVE-2026-23191
* CVE-2026-23268
CVSS scores:
* CVE-2026-23191 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23191 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23191 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23191 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23268 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.187 fixes
various security issues
The following security issues were fixed:
* CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258396).
* CVE-2026-23268: apparmor: fix unprivileged local user can do privileged
policy management (bsc#1259859).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-1584=1 SUSE-SLE-Live-
Patching-12-SP5-2026-1585=1 SUSE-SLE-Live-Patching-12-SP5-2026-1586=1 SUSE-SLE-
Live-Patching-12-SP5-2026-1587=1 SUSE-SLE-Live-Patching-12-SP5-2026-1588=1 SUSE-
SLE-Live-Patching-12-SP5-2026-1589=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1591=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-1591=1
## Package List:
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kgraft-patch-4_12_14-122_290-default-5-2.1
* kgraft-patch-4_12_14-122_275-default-7-2.1
* kgraft-patch-4_12_14-122_283-default-5-2.1
* kgraft-patch-4_12_14-122_293-default-4-2.1
* kgraft-patch-4_12_14-122_272-default-9-2.1
* kgraft-patch-4_12_14-122_280-default-5-2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_187-default-debuginfo-5-150400.2.1
* kernel-livepatch-5_14_21-150400_24_187-default-5-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_47-debugsource-5-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_187-default-debuginfo-5-150400.2.1
* kernel-livepatch-5_14_21-150400_24_187-default-5-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_47-debugsource-5-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-23191.html
* https://www.suse.com/security/cve/CVE-2026-23268.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258396
* https://bugzilla.suse.com/show_bug.cgi?id=1259859
SUSE-SU-2026:1600-1: important: Security update for flatpak
# Security update for flatpak
Announcement ID: SUSE-SU-2026:1600-1
Release Date: 2026-04-24T11:46:10Z
Rating: important
References:
* bsc#1261769
* bsc#1261770
Cross-References:
* CVE-2026-34078
* CVE-2026-34079
CVSS scores:
* CVE-2026-34078 ( SUSE ): 6.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
* CVE-2026-34078 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-34078 ( NVD ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34079 ( SUSE ): 4.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N
* CVE-2026-34079 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:L
* CVE-2026-34079 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34079 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-34079 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves two vulnerabilities can now be installed.
## Description:
This update for flatpak fixes the following issues:
* CVE-2026-34078: Arbitrary code execution via crafted symlinks in sandbox-
expose options (bsc#1261769).
* CVE-2026-34079: Arbitrary file deletion on host via improper cache file path
validation (bsc#1261770).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1600=1
* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-1600=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1600=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1600=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* flatpak-1.16.0-150600.3.9.1
* typelib-1_0-Flatpak-1_0-1.16.0-150600.3.9.1
* libflatpak0-1.16.0-150600.3.9.1
* flatpak-debuginfo-1.16.0-150600.3.9.1
* libflatpak0-debuginfo-1.16.0-150600.3.9.1
* flatpak-devel-1.16.0-150600.3.9.1
* flatpak-debugsource-1.16.0-150600.3.9.1
* openSUSE Leap 15.6 (noarch)
* flatpak-zsh-completion-1.16.0-150600.3.9.1
* system-user-flatpak-1.16.0-150600.3.9.1
* flatpak-remote-flathub-1.16.0-150600.3.9.1
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* flatpak-1.16.0-150600.3.9.1
* typelib-1_0-Flatpak-1_0-1.16.0-150600.3.9.1
* libflatpak0-1.16.0-150600.3.9.1
* flatpak-debuginfo-1.16.0-150600.3.9.1
* libflatpak0-debuginfo-1.16.0-150600.3.9.1
* flatpak-devel-1.16.0-150600.3.9.1
* flatpak-debugsource-1.16.0-150600.3.9.1
* Desktop Applications Module 15-SP7 (noarch)
* flatpak-zsh-completion-1.16.0-150600.3.9.1
* system-user-flatpak-1.16.0-150600.3.9.1
* flatpak-remote-flathub-1.16.0-150600.3.9.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* flatpak-1.16.0-150600.3.9.1
* typelib-1_0-Flatpak-1_0-1.16.0-150600.3.9.1
* libflatpak0-1.16.0-150600.3.9.1
* flatpak-debuginfo-1.16.0-150600.3.9.1
* libflatpak0-debuginfo-1.16.0-150600.3.9.1
* flatpak-devel-1.16.0-150600.3.9.1
* flatpak-debugsource-1.16.0-150600.3.9.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* flatpak-zsh-completion-1.16.0-150600.3.9.1
* system-user-flatpak-1.16.0-150600.3.9.1
* flatpak-remote-flathub-1.16.0-150600.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* flatpak-1.16.0-150600.3.9.1
* typelib-1_0-Flatpak-1_0-1.16.0-150600.3.9.1
* libflatpak0-1.16.0-150600.3.9.1
* flatpak-debuginfo-1.16.0-150600.3.9.1
* libflatpak0-debuginfo-1.16.0-150600.3.9.1
* flatpak-devel-1.16.0-150600.3.9.1
* flatpak-debugsource-1.16.0-150600.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* flatpak-zsh-completion-1.16.0-150600.3.9.1
* system-user-flatpak-1.16.0-150600.3.9.1
* flatpak-remote-flathub-1.16.0-150600.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2026-34078.html
* https://www.suse.com/security/cve/CVE-2026-34079.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261769
* https://bugzilla.suse.com/show_bug.cgi?id=1261770
SUSE-SU-2026:1602-1: moderate: Security update for libpng16
# Security update for libpng16
Announcement ID: SUSE-SU-2026:1602-1
Release Date: 2026-04-24T11:46:32Z
Rating: moderate
References:
* bsc#1261957
Cross-References:
* CVE-2026-34757
CVSS scores:
* CVE-2026-34757 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34757 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-34757 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for libpng16 fixes the following issue:
* CVE-2026-34757: information disclosure and data corruption due to use-after-
free in `png_set_PLTE`, `png_set_tRNS` and `png_set_hIST` (bsc#1261957).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1602=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1602=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libpng16-compat-devel-1.6.40-150600.3.20.1
* libpng16-tools-debuginfo-1.6.40-150600.3.20.1
* libpng16-devel-1.6.40-150600.3.20.1
* libpng16-16-1.6.40-150600.3.20.1
* libpng16-tools-1.6.40-150600.3.20.1
* libpng16-debugsource-1.6.40-150600.3.20.1
* libpng16-16-debuginfo-1.6.40-150600.3.20.1
* openSUSE Leap 15.6 (x86_64)
* libpng16-16-32bit-1.6.40-150600.3.20.1
* libpng16-16-32bit-debuginfo-1.6.40-150600.3.20.1
* libpng16-devel-32bit-1.6.40-150600.3.20.1
* libpng16-compat-devel-32bit-1.6.40-150600.3.20.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libpng16-compat-devel-64bit-1.6.40-150600.3.20.1
* libpng16-16-64bit-1.6.40-150600.3.20.1
* libpng16-16-64bit-debuginfo-1.6.40-150600.3.20.1
* libpng16-devel-64bit-1.6.40-150600.3.20.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libpng16-compat-devel-1.6.40-150600.3.20.1
* libpng16-devel-1.6.40-150600.3.20.1
* libpng16-16-1.6.40-150600.3.20.1
* libpng16-debugsource-1.6.40-150600.3.20.1
* libpng16-16-debuginfo-1.6.40-150600.3.20.1
* Basesystem Module 15-SP7 (x86_64)
* libpng16-16-32bit-1.6.40-150600.3.20.1
* libpng16-16-32bit-debuginfo-1.6.40-150600.3.20.1
## References:
* https://www.suse.com/security/cve/CVE-2026-34757.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261957
SUSE-SU-2026:1605-1: moderate: Security update for openssl-3
# Security update for openssl-3
Announcement ID: SUSE-SU-2026:1605-1
Release Date: 2026-04-24T11:48:58Z
Rating: moderate
References:
* bsc#1261678
* jsc#PED-15724
Cross-References:
* CVE-2026-28390
CVSS scores:
* CVE-2026-28390 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28390 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28390 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28390 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability and contains one feature can now be
installed.
## Description:
This update for openssl-3 fixes the following issue:
Security issues fixed:
* CVE-2026-28390: NULL pointer dereference during processing of a crafted CMS
EnvelopedData message with KeyTransportRecipientInfo (bsc#1261678).
Other updates and bugfixes:
* Enable MD2 in legacy provider (jsc#PED-15724).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1605=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1605=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1605=1
## Package List:
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* openssl-3-3.1.4-150600.5.50.1
* openssl-3-debuginfo-3.1.4-150600.5.50.1
* libopenssl3-3.1.4-150600.5.50.1
* libopenssl-3-fips-provider-3.1.4-150600.5.50.1
* libopenssl-3-devel-3.1.4-150600.5.50.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.50.1
* libopenssl3-debuginfo-3.1.4-150600.5.50.1
* openssl-3-debugsource-3.1.4-150600.5.50.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.50.1
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.50.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.50.1
* libopenssl3-32bit-3.1.4-150600.5.50.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* openssl-3-3.1.4-150600.5.50.1
* openssl-3-debuginfo-3.1.4-150600.5.50.1
* libopenssl3-3.1.4-150600.5.50.1
* libopenssl-3-fips-provider-3.1.4-150600.5.50.1
* libopenssl-3-devel-3.1.4-150600.5.50.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.50.1
* libopenssl3-debuginfo-3.1.4-150600.5.50.1
* openssl-3-debugsource-3.1.4-150600.5.50.1
* openSUSE Leap 15.6 (x86_64)
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.50.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.50.1
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.50.1
* libopenssl3-32bit-3.1.4-150600.5.50.1
* libopenssl-3-devel-32bit-3.1.4-150600.5.50.1
* openSUSE Leap 15.6 (noarch)
* openssl-3-doc-3.1.4-150600.5.50.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libopenssl-3-fips-provider-64bit-3.1.4-150600.5.50.1
* libopenssl-3-devel-64bit-3.1.4-150600.5.50.1
* libopenssl3-64bit-3.1.4-150600.5.50.1
* libopenssl-3-fips-provider-64bit-debuginfo-3.1.4-150600.5.50.1
* libopenssl3-64bit-debuginfo-3.1.4-150600.5.50.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* openssl-3-3.1.4-150600.5.50.1
* openssl-3-debuginfo-3.1.4-150600.5.50.1
* libopenssl3-3.1.4-150600.5.50.1
* libopenssl-3-fips-provider-3.1.4-150600.5.50.1
* libopenssl-3-devel-3.1.4-150600.5.50.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.50.1
* libopenssl3-debuginfo-3.1.4-150600.5.50.1
* openssl-3-debugsource-3.1.4-150600.5.50.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64)
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.50.1
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.50.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.50.1
* libopenssl3-32bit-3.1.4-150600.5.50.1
## References:
* https://www.suse.com/security/cve/CVE-2026-28390.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261678
* https://jira.suse.com/browse/PED-15724
SUSE-SU-2026:1607-1: important: Security update for vim
# Security update for vim
Announcement ID: SUSE-SU-2026:1607-1
Release Date: 2026-04-24T11:51:19Z
Rating: important
References:
* bsc#1259985
* bsc#1261191
* bsc#1261271
Cross-References:
* CVE-2026-33412
* CVE-2026-34714
* CVE-2026-34982
CVSS scores:
* CVE-2026-33412 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-33412 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N
* CVE-2026-33412 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
* CVE-2026-33412 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-34714 ( SUSE ): 9.3
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2026-34714 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-34714 ( NVD ): 9.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
* CVE-2026-34714 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-34982 ( SUSE ): 8.3
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34982 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
* CVE-2026-34982 ( NVD ): 8.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Affected Products:
* Basesystem Module 15-SP7
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves three vulnerabilities can now be installed.
## Description:
This update for vim fixes the following issues:
Update to version 9.2.0280.
* CVE-2026-34982: missing input validation allows for a modeline sandbox
bypass and can lead to arbitrary OS command execution (bsc#1261271).
* CVE-2026-34714: missing checks allow for a `tabpanel` modeline escape and
can lead to arbitrary OS command execution (bsc#1261191).
* CVE-2026-33412: improper escaping of newline characters allows for command
injection in `glob` and can lead to arbitrary code execution (bsc#1259985).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1607=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1607=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1607=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1607=1
* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-1607=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1607=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1607=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1607=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1607=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1607=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1607=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* vim-small-9.2.0280-150500.20.46.1
* gvim-debuginfo-9.2.0280-150500.20.46.1
* vim-debuginfo-9.2.0280-150500.20.46.1
* vim-small-debuginfo-9.2.0280-150500.20.46.1
* vim-9.2.0280-150500.20.46.1
* gvim-9.2.0280-150500.20.46.1
* vim-debugsource-9.2.0280-150500.20.46.1
* openSUSE Leap 15.5 (noarch)
* vim-data-9.2.0280-150500.20.46.1
* vim-data-common-9.2.0280-150500.20.46.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* vim-small-9.2.0280-150500.20.46.1
* gvim-debuginfo-9.2.0280-150500.20.46.1
* vim-debuginfo-9.2.0280-150500.20.46.1
* vim-small-debuginfo-9.2.0280-150500.20.46.1
* vim-9.2.0280-150500.20.46.1
* gvim-9.2.0280-150500.20.46.1
* vim-debugsource-9.2.0280-150500.20.46.1
* openSUSE Leap 15.6 (noarch)
* vim-data-9.2.0280-150500.20.46.1
* vim-data-common-9.2.0280-150500.20.46.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* vim-data-common-9.2.0280-150500.20.46.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* vim-debuginfo-9.2.0280-150500.20.46.1
* vim-small-debuginfo-9.2.0280-150500.20.46.1
* vim-small-9.2.0280-150500.20.46.1
* vim-debugsource-9.2.0280-150500.20.46.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* vim-small-9.2.0280-150500.20.46.1
* vim-debuginfo-9.2.0280-150500.20.46.1
* vim-small-debuginfo-9.2.0280-150500.20.46.1
* vim-9.2.0280-150500.20.46.1
* vim-debugsource-9.2.0280-150500.20.46.1
* Basesystem Module 15-SP7 (noarch)
* vim-data-9.2.0280-150500.20.46.1
* vim-data-common-9.2.0280-150500.20.46.1
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* vim-debugsource-9.2.0280-150500.20.46.1
* vim-debuginfo-9.2.0280-150500.20.46.1
* gvim-9.2.0280-150500.20.46.1
* gvim-debuginfo-9.2.0280-150500.20.46.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* vim-small-9.2.0280-150500.20.46.1
* gvim-debuginfo-9.2.0280-150500.20.46.1
* vim-debuginfo-9.2.0280-150500.20.46.1
* vim-small-debuginfo-9.2.0280-150500.20.46.1
* vim-9.2.0280-150500.20.46.1
* gvim-9.2.0280-150500.20.46.1
* vim-debugsource-9.2.0280-150500.20.46.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* vim-data-9.2.0280-150500.20.46.1
* vim-data-common-9.2.0280-150500.20.46.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* vim-small-9.2.0280-150500.20.46.1
* gvim-debuginfo-9.2.0280-150500.20.46.1
* vim-debuginfo-9.2.0280-150500.20.46.1
* vim-small-debuginfo-9.2.0280-150500.20.46.1
* vim-9.2.0280-150500.20.46.1
* gvim-9.2.0280-150500.20.46.1
* vim-debugsource-9.2.0280-150500.20.46.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* vim-data-9.2.0280-150500.20.46.1
* vim-data-common-9.2.0280-150500.20.46.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* vim-small-9.2.0280-150500.20.46.1
* gvim-debuginfo-9.2.0280-150500.20.46.1
* vim-debuginfo-9.2.0280-150500.20.46.1
* vim-small-debuginfo-9.2.0280-150500.20.46.1
* vim-9.2.0280-150500.20.46.1
* gvim-9.2.0280-150500.20.46.1
* vim-debugsource-9.2.0280-150500.20.46.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* vim-data-9.2.0280-150500.20.46.1
* vim-data-common-9.2.0280-150500.20.46.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* vim-small-9.2.0280-150500.20.46.1
* gvim-debuginfo-9.2.0280-150500.20.46.1
* vim-debuginfo-9.2.0280-150500.20.46.1
* vim-small-debuginfo-9.2.0280-150500.20.46.1
* vim-9.2.0280-150500.20.46.1
* gvim-9.2.0280-150500.20.46.1
* vim-debugsource-9.2.0280-150500.20.46.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* vim-data-9.2.0280-150500.20.46.1
* vim-data-common-9.2.0280-150500.20.46.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* vim-small-9.2.0280-150500.20.46.1
* gvim-debuginfo-9.2.0280-150500.20.46.1
* vim-debuginfo-9.2.0280-150500.20.46.1
* vim-small-debuginfo-9.2.0280-150500.20.46.1
* vim-9.2.0280-150500.20.46.1
* gvim-9.2.0280-150500.20.46.1
* vim-debugsource-9.2.0280-150500.20.46.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* vim-data-9.2.0280-150500.20.46.1
* vim-data-common-9.2.0280-150500.20.46.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* vim-small-9.2.0280-150500.20.46.1
* gvim-debuginfo-9.2.0280-150500.20.46.1
* vim-debuginfo-9.2.0280-150500.20.46.1
* vim-small-debuginfo-9.2.0280-150500.20.46.1
* vim-9.2.0280-150500.20.46.1
* gvim-9.2.0280-150500.20.46.1
* vim-debugsource-9.2.0280-150500.20.46.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* vim-data-9.2.0280-150500.20.46.1
* vim-data-common-9.2.0280-150500.20.46.1
## References:
* https://www.suse.com/security/cve/CVE-2026-33412.html
* https://www.suse.com/security/cve/CVE-2026-34714.html
* https://www.suse.com/security/cve/CVE-2026-34982.html
* https://bugzilla.suse.com/show_bug.cgi?id=1259985
* https://bugzilla.suse.com/show_bug.cgi?id=1261191
* https://bugzilla.suse.com/show_bug.cgi?id=1261271
SUSE-SU-2026:1592-1: important: Security update for the Linux Kernel (Live Patch 48 for SUSE Linux Enterprise 15 SP4)
# Security update for the Linux Kernel (Live Patch 48 for SUSE Linux Enterprise
15 SP4)
Announcement ID: SUSE-SU-2026:1592-1
Release Date: 2026-04-24T09:04:09Z
Rating: important
References:
* bsc#1258396
* bsc#1259859
Cross-References:
* CVE-2026-23191
* CVE-2026-23268
CVSS scores:
* CVE-2026-23191 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23191 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23191 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23191 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23268 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.194 fixes
various security issues
The following security issues were fixed:
* CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258396).
* CVE-2026-23268: apparmor: fix unprivileged local user can do privileged
policy management (bsc#1259859).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1592=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-1592=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_48-debugsource-3-150400.2.1
* kernel-livepatch-5_14_21-150400_24_194-default-debuginfo-3-150400.2.1
* kernel-livepatch-5_14_21-150400_24_194-default-3-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_48-debugsource-3-150400.2.1
* kernel-livepatch-5_14_21-150400_24_194-default-debuginfo-3-150400.2.1
* kernel-livepatch-5_14_21-150400_24_194-default-3-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-23191.html
* https://www.suse.com/security/cve/CVE-2026-23268.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258396
* https://bugzilla.suse.com/show_bug.cgi?id=1259859
openSUSE-SU-2026:20618-1: moderate: Security update for haproxy
openSUSE security update: security update for haproxy
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20618-1
Rating: moderate
References:
* bsc#1261626
* bsc#1262103
Cross-References:
* CVE-2026-33555
CVSS scores:
* CVE-2026-33555 ( SUSE ): 4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2026-33555 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has 2 bug fixes can now be installed.
Description:
This update for haproxy fixes the following issues:
Security issue:
- CVE-2026-33555: Request smuggling via HTTP/3 parser desynchronization (bsc#1262103).
- bug in SLZ compression (bsc#1261626).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-632=1
Package List:
- openSUSE Leap 16.0:
haproxy-3.2.15+git64.0fc44b458-160000.2.1
References:
* https://www.suse.com/security/cve/CVE-2026-33555.html
openSUSE-SU-2026:20617-1: important: Security update for python-Pillow
openSUSE security update: security update for python-pillow
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20617-1
Rating: important
References:
* bsc#1262184
Cross-References:
* CVE-2026-40192
CVSS scores:
* CVE-2026-40192 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-40192 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for python-Pillow fixes the following issue:
- CVE-2026-40192: Versions 10.3.0 through 12.1.1 did not limit the amount of GZIP-compressed data read when decoding a
FITS image, making them vulnerable to decompression bomb attacks (bsc#1262184).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-629=1
Package List:
- openSUSE Leap 16.0:
python313-Pillow-11.3.0-160000.4.1
python313-Pillow-tk-11.3.0-160000.4.1
References:
* https://www.suse.com/security/cve/CVE-2026-40192.html
openSUSE-SU-2026:20619-1: important: Security update for coredns
openSUSE security update: security update for coredns
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20619-1
Rating: important
References:
* bsc#1259319
* bsc#1259320
Cross-References:
* CVE-2025-61726
* CVE-2025-61728
* CVE-2025-61731
* CVE-2025-68119
* CVE-2025-68121
* CVE-2026-26017
* CVE-2026-26018
CVSS scores:
* CVE-2025-61726 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61726 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61728 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61731 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-61731 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68119 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68119 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-68121 ( SUSE ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 7 vulnerabilities and has 2 bug fixes can now be installed.
Description:
This update for coredns fixes the following issues:
Changes in coredns:
- Update to version 1.14.2:
* plugin/reload: Allow disabling jitter with 0s
* bump deps
* plugin/forward: fix parsing error when handling TLS+IPv6 address
* plugin/loop: use crypto/rand for query name generation
* plugin: reorder rewrite before acl to prevent bypass
* fix(rewrite): fix cname target rewrite for CNAME chains
* fix(kubernetes): panic on empty ListenHosts
* chore: bump minimum Go version to 1.25
* feat(proxyproto): add proxy protocol support
* refactor(cache): modernize with generics
* Add metadata for response Type and Class to Log
* docs: clarify kubernetes auth docs
* fix: return SOA and NS records when queried for a record CNAMEd to origin
- fixes bsc#1259320 CVE-2026-26017
- fixes bsc#1259319 CVE-2026-26018
- address more unstable unstable tests under aarch64 and s390x
- Update to version 1.14.1:
* This release primarily addresses security vulnerabilities affecting Go
versions prior to Go 1.25.6 and Go 1.24.12
(CVE-2025-61728, CVE-2025-61726, CVE-2025-68121, CVE-2025-61731,
CVE-2025-68119).
It also includes performance improvements to the proxy plugin via
multiplexed connections, along with various documentation updates.
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-packagehub-212=1
Package List:
- openSUSE Leap 16.0:
coredns-1.14.2-bp160.1.1
coredns-extras-1.14.2-bp160.1.1
References:
* https://www.suse.com/security/cve/CVE-2025-61726.html
* https://www.suse.com/security/cve/CVE-2025-61728.html
* https://www.suse.com/security/cve/CVE-2025-61731.html
* https://www.suse.com/security/cve/CVE-2025-68119.html
* https://www.suse.com/security/cve/CVE-2025-68121.html
* https://www.suse.com/security/cve/CVE-2026-26017.html
* https://www.suse.com/security/cve/CVE-2026-26018.html
openSUSE-SU-2026:10607-1: moderate: golang-github-prometheus-prometheus-3.11.2-1.1 on GA media
# golang-github-prometheus-prometheus-3.11.2-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10607-1
Rating: moderate
Cross-References:
* CVE-2026-40179
CVSS scores:
* CVE-2026-40179 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2026-40179 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the golang-github-prometheus-prometheus-3.11.2-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* golang-github-prometheus-prometheus 3.11.2-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-40179.html
openSUSE-SU-2026:10608-1: moderate: libXpm-devel-3.5.18-2.1 on GA media
# libXpm-devel-3.5.18-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10608-1
Rating: moderate
Cross-References:
* CVE-2026-4367
CVSS scores:
* CVE-2026-4367 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-4367 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the libXpm-devel-3.5.18-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libXpm-devel 3.5.18-2.1
* libXpm-devel-32bit 3.5.18-2.1
* libXpm-tools 3.5.18-2.1
* libXpm4 3.5.18-2.1
* libXpm4-32bit 3.5.18-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-4367.html
openSUSE-SU-2026:10606-1: moderate: frr-10.5.1-3.1 on GA media
# frr-10.5.1-3.1 on GA media
Announcement ID: openSUSE-SU-2026:10606-1
Rating: moderate
Cross-References:
* CVE-2026-5107
CVSS scores:
* CVE-2026-5107 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2026-5107 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the frr-10.5.1-3.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* frr 10.5.1-3.1
* frr-devel 10.5.1-3.1
* libfrr0 10.5.1-3.1
* libfrr_pb0 10.5.1-3.1
* libfrrcares0 10.5.1-3.1
* libfrrfpm_pb0 10.5.1-3.1
* libfrrospfapiclient0 10.5.1-3.1
* libfrrsnmp0 10.5.1-3.1
* libfrrzmq0 10.5.1-3.1
* libmgmt_be_nb0 10.5.1-3.1
* libmlag_pb0 10.5.1-3.1
## References:
* https://www.suse.com/security/cve/CVE-2026-5107.html
SUSE-SU-2026:1597-1: important: Security update for ImageMagick
# Security update for ImageMagick
Announcement ID: SUSE-SU-2026:1597-1
Release Date: 2026-04-24T11:44:19Z
Rating: important
References:
* bsc#1262097
* bsc#1262145
* bsc#1262146
* bsc#1262147
* bsc#1262148
* bsc#1262149
* bsc#1262150
* bsc#1262152
* bsc#1262154
* bsc#1262155
* bsc#1262156
Cross-References:
* CVE-2026-33899
* CVE-2026-33900
* CVE-2026-33901
* CVE-2026-33905
* CVE-2026-33908
* CVE-2026-34238
* CVE-2026-40169
* CVE-2026-40183
* CVE-2026-40310
* CVE-2026-40311
* CVE-2026-40312
CVSS scores:
* CVE-2026-33899 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-33899 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33899 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33900 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33900 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33900 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33900 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33901 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33901 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33901 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33905 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33905 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-33905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-33905 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
* CVE-2026-33908 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33908 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33908 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-34238 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34238 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-34238 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-34238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-40169 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-40169 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-40169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-40169 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-40183 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-40183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-40183 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-40183 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-40310 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-40310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-40310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-40310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-40311 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-40311 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-40311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-40311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-40312 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-40312 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-40312 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-40312 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves 11 vulnerabilities can now be installed.
## Description:
This update for ImageMagick fixes the following issues:
* CVE-2026-33899: Denial of Service via out-of-bounds write in XML parsing
(bsc#1262154).
* CVE-2026-33900: Denial of Service via integer truncation in viff encoder
(bsc#1262156).
* CVE-2026-33901: Denial of Service due to heap buffer overflow in MVG decoder
(bsc#1262155).
* CVE-2026-33905: Denial of service via out-of-bounds read in -sample
operation (bsc#1262097).
* CVE-2026-33908: Denial of Service via deeply nested XML file processing
(bsc#1262152).
* CVE-2026-34238: Denial of Service via integer overflow in despeckle
operation (bsc#1262147).
* CVE-2026-40169: Denial of Service via crafted image leading to out-of-bounds
write (bsc#1262150).
* CVE-2026-40183: Denial of Service via heap write overflow in JXL encoder
(bsc#1262145).
* CVE-2026-40310: Denial of service via heap out-of-bounds write in JP2
encoder (bsc#1262148).
* CVE-2026-40311: Denial of Service via heap use-after-free in XMP profile
processing (bsc#1262146).
* CVE-2026-40312: Denial of Service via malicious MSL file processing
(bsc#1262149).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1597=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1597=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1597=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.55.1
* ImageMagick-7.1.1.21-150600.3.55.1
* ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.55.1
* perl-PerlMagick-debuginfo-7.1.1.21-150600.3.55.1
* ImageMagick-debugsource-7.1.1.21-150600.3.55.1
* ImageMagick-extra-7.1.1.21-150600.3.55.1
* ImageMagick-debuginfo-7.1.1.21-150600.3.55.1
* libMagick++-devel-7.1.1.21-150600.3.55.1
* libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.55.1
* libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.55.1
* ImageMagick-extra-debuginfo-7.1.1.21-150600.3.55.1
* libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.55.1
* ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.55.1
* ImageMagick-config-7-SUSE-7.1.1.21-150600.3.55.1
* libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.55.1
* ImageMagick-devel-7.1.1.21-150600.3.55.1
* perl-PerlMagick-7.1.1.21-150600.3.55.1
* libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.55.1
* libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.55.1
* ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.55.1
* openSUSE Leap 15.6 (x86_64)
* libMagick++-7_Q16HDRI5-32bit-debuginfo-7.1.1.21-150600.3.55.1
* libMagickCore-7_Q16HDRI10-32bit-7.1.1.21-150600.3.55.1
* libMagickCore-7_Q16HDRI10-32bit-debuginfo-7.1.1.21-150600.3.55.1
* libMagick++-devel-32bit-7.1.1.21-150600.3.55.1
* libMagickWand-7_Q16HDRI10-32bit-7.1.1.21-150600.3.55.1
* libMagickWand-7_Q16HDRI10-32bit-debuginfo-7.1.1.21-150600.3.55.1
* libMagick++-7_Q16HDRI5-32bit-7.1.1.21-150600.3.55.1
* ImageMagick-devel-32bit-7.1.1.21-150600.3.55.1
* openSUSE Leap 15.6 (noarch)
* ImageMagick-doc-7.1.1.21-150600.3.55.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libMagickCore-7_Q16HDRI10-64bit-7.1.1.21-150600.3.55.1
* libMagickWand-7_Q16HDRI10-64bit-debuginfo-7.1.1.21-150600.3.55.1
* libMagick++-devel-64bit-7.1.1.21-150600.3.55.1
* libMagick++-7_Q16HDRI5-64bit-debuginfo-7.1.1.21-150600.3.55.1
* libMagickCore-7_Q16HDRI10-64bit-debuginfo-7.1.1.21-150600.3.55.1
* libMagick++-7_Q16HDRI5-64bit-7.1.1.21-150600.3.55.1
* libMagickWand-7_Q16HDRI10-64bit-7.1.1.21-150600.3.55.1
* ImageMagick-devel-64bit-7.1.1.21-150600.3.55.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.55.1
* ImageMagick-7.1.1.21-150600.3.55.1
* ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.55.1
* perl-PerlMagick-debuginfo-7.1.1.21-150600.3.55.1
* ImageMagick-debugsource-7.1.1.21-150600.3.55.1
* ImageMagick-debuginfo-7.1.1.21-150600.3.55.1
* libMagick++-devel-7.1.1.21-150600.3.55.1
* libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.55.1
* libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.55.1
* libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.55.1
* perl-PerlMagick-7.1.1.21-150600.3.55.1
* ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.55.1
* ImageMagick-config-7-SUSE-7.1.1.21-150600.3.55.1
* libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.55.1
* ImageMagick-devel-7.1.1.21-150600.3.55.1
* libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.55.1
* libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.55.1
* ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.55.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.55.1
* ImageMagick-7.1.1.21-150600.3.55.1
* ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.55.1
* perl-PerlMagick-debuginfo-7.1.1.21-150600.3.55.1
* ImageMagick-debugsource-7.1.1.21-150600.3.55.1
* ImageMagick-debuginfo-7.1.1.21-150600.3.55.1
* libMagick++-devel-7.1.1.21-150600.3.55.1
* libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.55.1
* libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.55.1
* libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.55.1
* perl-PerlMagick-7.1.1.21-150600.3.55.1
* ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.55.1
* ImageMagick-config-7-SUSE-7.1.1.21-150600.3.55.1
* libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.55.1
* ImageMagick-devel-7.1.1.21-150600.3.55.1
* libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.55.1
* libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.55.1
* ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.55.1
## References:
* https://www.suse.com/security/cve/CVE-2026-33899.html
* https://www.suse.com/security/cve/CVE-2026-33900.html
* https://www.suse.com/security/cve/CVE-2026-33901.html
* https://www.suse.com/security/cve/CVE-2026-33905.html
* https://www.suse.com/security/cve/CVE-2026-33908.html
* https://www.suse.com/security/cve/CVE-2026-34238.html
* https://www.suse.com/security/cve/CVE-2026-40169.html
* https://www.suse.com/security/cve/CVE-2026-40183.html
* https://www.suse.com/security/cve/CVE-2026-40310.html
* https://www.suse.com/security/cve/CVE-2026-40311.html
* https://www.suse.com/security/cve/CVE-2026-40312.html
* https://bugzilla.suse.com/show_bug.cgi?id=1262097
* https://bugzilla.suse.com/show_bug.cgi?id=1262145
* https://bugzilla.suse.com/show_bug.cgi?id=1262146
* https://bugzilla.suse.com/show_bug.cgi?id=1262147
* https://bugzilla.suse.com/show_bug.cgi?id=1262148
* https://bugzilla.suse.com/show_bug.cgi?id=1262149
* https://bugzilla.suse.com/show_bug.cgi?id=1262150
* https://bugzilla.suse.com/show_bug.cgi?id=1262152
* https://bugzilla.suse.com/show_bug.cgi?id=1262154
* https://bugzilla.suse.com/show_bug.cgi?id=1262155
* https://bugzilla.suse.com/show_bug.cgi?id=1262156
SUSE-SU-2026:1599-1: important: Security update for librsvg
# Security update for librsvg
Announcement ID: SUSE-SU-2026:1599-1
Release Date: 2026-04-24T11:45:53Z
Rating: important
References:
* bsc#1257922
Cross-References:
* CVE-2026-25727
CVSS scores:
* CVE-2026-25727 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25727 ( NVD ): 6.8
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-25727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for librsvg fixes the following issue:
* CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date
parser can lead to stack exhaustion (bsc#1257922).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1599=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1599=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1599=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1599=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1599=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1599=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1599=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1599=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1599=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1599=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1599=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1599=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1599=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1599=1
## Package List:
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.12.1
* librsvg-2-2-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-2.52.12-150400.3.12.1
* librsvg-2-2-debuginfo-2.52.12-150400.3.12.1
* librsvg-debugsource-2.52.12-150400.3.12.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.12.1
* typelib-1_0-Rsvg-2_0-2.52.12-150400.3.12.1
* librsvg-2-2-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-2.52.12-150400.3.12.1
* librsvg-devel-2.52.12-150400.3.12.1
* librsvg-2-2-debuginfo-2.52.12-150400.3.12.1
* librsvg-debugsource-2.52.12-150400.3.12.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.12.1
* typelib-1_0-Rsvg-2_0-2.52.12-150400.3.12.1
* librsvg-2-2-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-2.52.12-150400.3.12.1
* librsvg-devel-2.52.12-150400.3.12.1
* librsvg-2-2-debuginfo-2.52.12-150400.3.12.1
* librsvg-debugsource-2.52.12-150400.3.12.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.12.1
* typelib-1_0-Rsvg-2_0-2.52.12-150400.3.12.1
* librsvg-2-2-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-2.52.12-150400.3.12.1
* librsvg-devel-2.52.12-150400.3.12.1
* librsvg-2-2-debuginfo-2.52.12-150400.3.12.1
* librsvg-debugsource-2.52.12-150400.3.12.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.12.1
* typelib-1_0-Rsvg-2_0-2.52.12-150400.3.12.1
* librsvg-2-2-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-2.52.12-150400.3.12.1
* librsvg-devel-2.52.12-150400.3.12.1
* librsvg-2-2-debuginfo-2.52.12-150400.3.12.1
* librsvg-debugsource-2.52.12-150400.3.12.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.12.1
* typelib-1_0-Rsvg-2_0-2.52.12-150400.3.12.1
* librsvg-2-2-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-2.52.12-150400.3.12.1
* librsvg-devel-2.52.12-150400.3.12.1
* librsvg-2-2-debuginfo-2.52.12-150400.3.12.1
* librsvg-debugsource-2.52.12-150400.3.12.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.12.1
* typelib-1_0-Rsvg-2_0-2.52.12-150400.3.12.1
* librsvg-2-2-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-2.52.12-150400.3.12.1
* librsvg-devel-2.52.12-150400.3.12.1
* librsvg-2-2-debuginfo-2.52.12-150400.3.12.1
* librsvg-debugsource-2.52.12-150400.3.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.12.1
* typelib-1_0-Rsvg-2_0-2.52.12-150400.3.12.1
* librsvg-2-2-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-2.52.12-150400.3.12.1
* librsvg-devel-2.52.12-150400.3.12.1
* librsvg-2-2-debuginfo-2.52.12-150400.3.12.1
* librsvg-debugsource-2.52.12-150400.3.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.12.1
* typelib-1_0-Rsvg-2_0-2.52.12-150400.3.12.1
* librsvg-2-2-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-2.52.12-150400.3.12.1
* librsvg-devel-2.52.12-150400.3.12.1
* librsvg-2-2-debuginfo-2.52.12-150400.3.12.1
* librsvg-debugsource-2.52.12-150400.3.12.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.12.1
* typelib-1_0-Rsvg-2_0-2.52.12-150400.3.12.1
* librsvg-2-2-2.52.12-150400.3.12.1
* rsvg-convert-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-2.52.12-150400.3.12.1
* librsvg-devel-2.52.12-150400.3.12.1
* librsvg-2-2-debuginfo-2.52.12-150400.3.12.1
* librsvg-debugsource-2.52.12-150400.3.12.1
* openSUSE Leap 15.4 (noarch)
* rsvg-thumbnailer-2.52.12-150400.3.12.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* librsvg-2-2-64bit-debuginfo-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-64bit-2.52.12-150400.3.12.1
* librsvg-2-2-64bit-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-64bit-debuginfo-2.52.12-150400.3.12.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.12.1
* librsvg-2-2-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-2.52.12-150400.3.12.1
* librsvg-2-2-debuginfo-2.52.12-150400.3.12.1
* librsvg-debugsource-2.52.12-150400.3.12.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.12.1
* librsvg-2-2-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-2.52.12-150400.3.12.1
* librsvg-2-2-debuginfo-2.52.12-150400.3.12.1
* librsvg-debugsource-2.52.12-150400.3.12.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.12.1
* librsvg-2-2-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-2.52.12-150400.3.12.1
* librsvg-2-2-debuginfo-2.52.12-150400.3.12.1
* librsvg-debugsource-2.52.12-150400.3.12.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.12.1
* librsvg-2-2-2.52.12-150400.3.12.1
* gdk-pixbuf-loader-rsvg-2.52.12-150400.3.12.1
* librsvg-2-2-debuginfo-2.52.12-150400.3.12.1
* librsvg-debugsource-2.52.12-150400.3.12.1
## References:
* https://www.suse.com/security/cve/CVE-2026-25727.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257922
SUSE-SU-2026:1619-1: moderate: Security update for PackageKit
# Security update for PackageKit
Announcement ID: SUSE-SU-2026:1619-1
Release Date: 2026-04-24T14:34:25Z
Rating: moderate
References:
* bsc#1262220
Cross-References:
* CVE-2026-41651
CVSS scores:
* CVE-2026-41651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-41651 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
An update that solves one vulnerability can now be installed.
## Description:
This update for PackageKit fixes the following issue:
* CVE-2026-41651: Do not allow re-invoking methods on non-new transactions
(bsc#1262220).
## Special Instructions and Notes:
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1619=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150500.6.5.1
* PackageKit-backend-dnf-1.2.4-150500.6.5.1
* PackageKit-1.2.4-150500.6.5.1
* PackageKit-debugsource-1.2.4-150500.6.5.1
* PackageKit-gtk3-module-1.2.4-150500.6.5.1
* libpackagekit-glib2-18-1.2.4-150500.6.5.1
* libpackagekit-glib2-devel-1.2.4-150500.6.5.1
* PackageKit-gtk3-module-debuginfo-1.2.4-150500.6.5.1
* PackageKit-devel-debuginfo-1.2.4-150500.6.5.1
* PackageKit-debuginfo-1.2.4-150500.6.5.1
* libpackagekit-glib2-18-debuginfo-1.2.4-150500.6.5.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150500.6.5.1
* PackageKit-backend-zypp-1.2.4-150500.6.5.1
* PackageKit-backend-dnf-debuginfo-1.2.4-150500.6.5.1
* PackageKit-gstreamer-plugin-1.2.4-150500.6.5.1
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150500.6.5.1
* PackageKit-devel-1.2.4-150500.6.5.1
* openSUSE Leap 15.5 (noarch)
* PackageKit-branding-upstream-1.2.4-150500.6.5.1
* PackageKit-lang-1.2.4-150500.6.5.1
* openSUSE Leap 15.5 (x86_64)
* libpackagekit-glib2-18-32bit-1.2.4-150500.6.5.1
* libpackagekit-glib2-18-32bit-debuginfo-1.2.4-150500.6.5.1
* libpackagekit-glib2-devel-32bit-1.2.4-150500.6.5.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libpackagekit-glib2-18-64bit-debuginfo-1.2.4-150500.6.5.1
* libpackagekit-glib2-18-64bit-1.2.4-150500.6.5.1
* libpackagekit-glib2-devel-64bit-1.2.4-150500.6.5.1
## References:
* https://www.suse.com/security/cve/CVE-2026-41651.html
* https://bugzilla.suse.com/show_bug.cgi?id=1262220
SUSE-SU-2026:1613-1: important: Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise 15 SP6)
# Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise
15 SP6)
Announcement ID: SUSE-SU-2026:1613-1
Release Date: 2026-04-24T13:34:09Z
Rating: important
References:
* bsc#1255066
* bsc#1259859
Cross-References:
* CVE-2025-40309
* CVE-2026-23268
CVSS scores:
* CVE-2025-40309 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40309 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23268 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise Kernel 6.4.0-150600.23.50 fixes
various security issues
The following security issues were fixed:
* CVE-2025-40309: Bluetooth: SCO: Fix UAF on sco_conn_free (bsc#1255066).
* CVE-2026-23268: apparmor: fix unprivileged local user can do privileged
policy management (bsc#1259859).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1613=1 SUSE-2026-1610=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-1613=1 SUSE-SLE-
Module-Live-Patching-15-SP6-2026-1610=1
## Package List:
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_10-debugsource-16-150600.2.2
* kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-16-150600.2.2
* kernel-livepatch-6_4_0-150600_23_47-default-16-150600.2.2
* kernel-livepatch-SLE15-SP6_Update_11-debugsource-15-150600.2.2
* kernel-livepatch-6_4_0-150600_23_50-default-15-150600.2.2
* kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-15-150600.2.2
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_10-debugsource-16-150600.2.2
* kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-16-150600.2.2
* kernel-livepatch-6_4_0-150600_23_47-default-16-150600.2.2
* kernel-livepatch-SLE15-SP6_Update_11-debugsource-15-150600.2.2
* kernel-livepatch-6_4_0-150600_23_50-default-15-150600.2.2
* kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-15-150600.2.2
## References:
* https://www.suse.com/security/cve/CVE-2025-40309.html
* https://www.suse.com/security/cve/CVE-2026-23268.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255066
* https://bugzilla.suse.com/show_bug.cgi?id=1259859
SUSE-SU-2026:1611-1: important: Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5)
# Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise
15 SP5)
Announcement ID: SUSE-SU-2026:1611-1
Release Date: 2026-04-24T14:06:13Z
Rating: important
References:
* bsc#1258396
* bsc#1259859
Cross-References:
* CVE-2026-23191
* CVE-2026-23268
CVSS scores:
* CVE-2026-23191 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23191 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23191 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23191 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23268 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise Kernel 5.14.21-150500.55.133 fixes
various security issues
The following security issues were fixed:
* CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258396).
* CVE-2026-23268: apparmor: fix unprivileged local user can do privileged
policy management (bsc#1259859).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-1611=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1612=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-1612=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1614=1 SUSE-2026-1615=1 SUSE-2026-1616=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-1614=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2026-1615=1 SUSE-SLE-Module-Live-
Patching-15-SP5-2026-1616=1
## Package List:
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kgraft-patch-4_12_14-122_261-default-13-2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_46-debugsource-5-150400.2.1
* kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-5-150400.2.1
* kernel-livepatch-5_14_21-150400_24_184-default-5-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_46-debugsource-5-150400.2.1
* kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-5-150400.2.1
* kernel-livepatch-5_14_21-150400_24_184-default-5-150400.2.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_116-default-13-150500.2.1
* kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_31-debugsource-8-150500.2.1
* kernel-livepatch-5_14_21-150500_55_133-default-debuginfo-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-8-150500.2.1
* kernel-livepatch-5_14_21-150500_55_133-default-5-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_34-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-8-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_29-debugsource-13-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_116-default-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_31-debugsource-8-150500.2.1
* kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-13-150500.2.1
* kernel-livepatch-5_14_21-150500_55_133-default-debuginfo-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-8-150500.2.1
* kernel-livepatch-5_14_21-150500_55_133-default-5-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_34-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-8-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x)
* kernel-livepatch-SLE15-SP5_Update_29-debugsource-13-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-23191.html
* https://www.suse.com/security/cve/CVE-2026-23268.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258396
* https://bugzilla.suse.com/show_bug.cgi?id=1259859