SUSE 5578 Published by

Several security updates have been released for various SUSE Linux Enterprise products, including kernel live patches and other packages. These updates address multiple vulnerabilities, including CVE-2022-50700, CVE-2023-54142, and CVE-2025-38129, which affect the Linux kernel and can potentially lead to use-after-free issues and denial-of-service attacks. The updates are available for various SUSE products, including openSUSE Leap 15.4, 15.5, and 16.0, as well as SUSE Linux Enterprise Server and Desktop products. Users are advised to apply the updates using YaST online_update or "zypper patch" to ensure their systems remain secure.

SUSE-SU-2026:0711-1: important: Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0725-1: important: Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0713-1: important: Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0731-1: important: Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0734-1: important: Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0727-1: important: Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0736-1: important: Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7)
openSUSE-SU-2026:20292-1: important: Security update for python-azure-core
openSUSE-SU-2026:20291-1: important: Security update for fluidsynth
openSUSE-SU-2026:20290-1: moderate: Security update for haproxy
openSUSE-SU-2026:10276-1: moderate: libsoup-3_0-0-3.6.6-2.1 on GA media
openSUSE-SU-2026:10275-1: moderate: gvfs-1.58.2-1.1 on GA media
SUSE-SU-2026:0741-1: moderate: Security update for shim
SUSE-SU-2026:0745-1: important: Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6)




SUSE-SU-2026:0711-1: important: Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4)


# Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise
15 SP4)

Announcement ID: SUSE-SU-2026:0711-1
Release Date: 2026-02-28T18:33:50Z
Rating: important
References:

* bsc#1255577
* bsc#1256097
* bsc#1258139

Cross-References:

* CVE-2022-50700
* CVE-2023-54142
* CVE-2025-38129

CVSS scores:

* CVE-2022-50700 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that solves three vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.153 fixes
various security issues

The following security issues were fixed:

* CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer
(bsc#1255577).
* CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
(bsc#1256097).
* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-711=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2026-712=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-712=1 SUSE-2026-711=1

## Package List:

* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-15-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_36-debugsource-15-150400.2.1
* kernel-livepatch-5_14_21-150400_24_153-default-15-150400.2.1
* kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-15-150400.2.1
* kernel-livepatch-5_14_21-150400_24_150-default-15-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_37-debugsource-15-150400.2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-15-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_36-debugsource-15-150400.2.1
* kernel-livepatch-5_14_21-150400_24_153-default-15-150400.2.1
* kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-15-150400.2.1
* kernel-livepatch-5_14_21-150400_24_150-default-15-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_37-debugsource-15-150400.2.1

## References:

* https://www.suse.com/security/cve/CVE-2022-50700.html
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255577
* https://bugzilla.suse.com/show_bug.cgi?id=1256097
* https://bugzilla.suse.com/show_bug.cgi?id=1258139



SUSE-SU-2026:0725-1: important: Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5)


# Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise
15 SP5)

Announcement ID: SUSE-SU-2026:0725-1
Release Date: 2026-03-01T10:33:42Z
Rating: important
References:

* bsc#1255577
* bsc#1256097
* bsc#1258139

Cross-References:

* CVE-2022-50700
* CVE-2023-54142
* CVE-2025-38129

CVSS scores:

* CVE-2022-50700 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves three vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.103 fixes
various security issues

The following security issues were fixed:

* CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer
(bsc#1255577).
* CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
(bsc#1256097).
* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-725=1 SUSE-2026-724=1 SUSE-2026-726=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-725=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2026-724=1 SUSE-SLE-Module-Live-
Patching-15-SP5-2026-726=1

## Package List:

* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_25-debugsource-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_24-debugsource-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_103-default-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_26-debugsource-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_97-default-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_100-default-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-14-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_25-debugsource-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_24-debugsource-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_103-default-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_26-debugsource-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_97-default-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_100-default-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-14-150500.2.1

## References:

* https://www.suse.com/security/cve/CVE-2022-50700.html
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255577
* https://bugzilla.suse.com/show_bug.cgi?id=1256097
* https://bugzilla.suse.com/show_bug.cgi?id=1258139



SUSE-SU-2026:0713-1: important: Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5)


# Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise
15 SP5)

Announcement ID: SUSE-SU-2026:0713-1
Release Date: 2026-03-01T07:33:38Z
Rating: important
References:

* bsc#1255577
* bsc#1256097
* bsc#1258139

Cross-References:

* CVE-2022-50700
* CVE-2023-54142
* CVE-2025-38129

CVSS scores:

* CVE-2022-50700 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves three vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.94 fixes
various security issues

The following security issues were fixed:

* CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer
(bsc#1255577).
* CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
(bsc#1256097).
* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-719=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2026-720=1 SUSE-SLE-Module-Live-
Patching-15-SP4-2026-721=1 SUSE-SLE-Module-Live-Patching-15-SP4-2026-722=1 SUSE-
SLE-Module-Live-Patching-15-SP4-2026-713=1 SUSE-SLE-Module-Live-
Patching-15-SP4-2026-714=1 SUSE-SLE-Module-Live-Patching-15-SP4-2026-715=1 SUSE-
SLE-Module-Live-Patching-15-SP4-2026-716=1 SUSE-SLE-Module-Live-
Patching-15-SP4-2026-717=1 SUSE-SLE-Module-Live-Patching-15-SP4-2026-718=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-720=1 SUSE-2026-721=1 SUSE-2026-722=1
SUSE-2026-713=1 SUSE-2026-714=1 SUSE-2026-715=1 SUSE-2026-716=1 SUSE-2026-717=1
SUSE-2026-718=1 SUSE-2026-719=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-723=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-723=1

## Package List:

* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_176-default-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_187-default-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_47-debugsource-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_179-default-debuginfo-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_42-debugsource-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_158-default-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_44-debugsource-8-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_40-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_187-default-debuginfo-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_38-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_184-default-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_167-default-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_179-default-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_39-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_170-default-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_161-default-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_46-debugsource-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_43-debugsource-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_45-debugsource-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_41-debugsource-13-150400.2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_176-default-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_187-default-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_47-debugsource-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_179-default-debuginfo-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_42-debugsource-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_158-default-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_40-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-9-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_44-debugsource-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_187-default-debuginfo-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_38-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_184-default-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_167-default-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_179-default-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_39-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_170-default-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_161-default-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_46-debugsource-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_43-debugsource-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_45-debugsource-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_41-debugsource-13-150400.2.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_94-default-15-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_23-debugsource-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-15-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_94-default-15-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_23-debugsource-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-15-150500.2.1

## References:

* https://www.suse.com/security/cve/CVE-2022-50700.html
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255577
* https://bugzilla.suse.com/show_bug.cgi?id=1256097
* https://bugzilla.suse.com/show_bug.cgi?id=1258139



SUSE-SU-2026:0731-1: important: Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5)


# Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise
15 SP5)

Announcement ID: SUSE-SU-2026:0731-1
Release Date: 2026-03-01T19:33:40Z
Rating: important
References:

* bsc#1255577
* bsc#1256097
* bsc#1258139

Cross-References:

* CVE-2022-50700
* CVE-2023-54142
* CVE-2025-38129

CVSS scores:

* CVE-2022-50700 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves three vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.130 fixes
various security issues

The following security issues were fixed:

* CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer
(bsc#1255577).
* CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
(bsc#1256097).
* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-733=1 SUSE-2026-732=1 SUSE-2026-731=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-731=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2026-733=1 SUSE-SLE-Module-Live-
Patching-15-SP5-2026-732=1

## Package List:

* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_124-default-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_127-default-2-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_33-debugsource-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_130-default-2-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_31-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_127-default-debuginfo-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_130-default-debuginfo-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-5-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_32-debugsource-2-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_124-default-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_127-default-2-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_33-debugsource-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_130-default-2-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_31-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_127-default-debuginfo-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_130-default-debuginfo-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-5-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_32-debugsource-2-150500.2.1

## References:

* https://www.suse.com/security/cve/CVE-2022-50700.html
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255577
* https://bugzilla.suse.com/show_bug.cgi?id=1256097
* https://bugzilla.suse.com/show_bug.cgi?id=1258139



SUSE-SU-2026:0734-1: important: Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5)


# Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise
15 SP5)

Announcement ID: SUSE-SU-2026:0734-1
Release Date: 2026-03-01T19:33:48Z
Rating: important
References:

* bsc#1256097
* bsc#1258139

Cross-References:

* CVE-2023-54142
* CVE-2025-38129

CVSS scores:

* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves two vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.133 fixes
various security issues

The following security issues were fixed:

* CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
(bsc#1256097).
* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-734=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-734=1

## Package List:

* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_34-debugsource-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_133-default-debuginfo-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_133-default-2-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_34-debugsource-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_133-default-debuginfo-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_133-default-2-150500.2.1

## References:

* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256097
* https://bugzilla.suse.com/show_bug.cgi?id=1258139



SUSE-SU-2026:0727-1: important: Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)


# Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise
15 SP5)

Announcement ID: SUSE-SU-2026:0727-1
Release Date: 2026-03-01T15:04:08Z
Rating: important
References:

* bsc#1255577
* bsc#1256097
* bsc#1258139

Cross-References:

* CVE-2022-50700
* CVE-2023-54142
* CVE-2025-38129

CVSS scores:

* CVE-2022-50700 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves three vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.121 fixes
various security issues

The following security issues were fixed:

* CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer
(bsc#1255577).
* CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
(bsc#1256097).
* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-728=1 SUSE-2026-729=1 SUSE-2026-730=1
SUSE-2026-727=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-727=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2026-728=1 SUSE-SLE-Module-Live-
Patching-15-SP5-2026-729=1 SUSE-SLE-Module-Live-Patching-15-SP5-2026-730=1

## Package List:

* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_28-debugsource-12-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_29-debugsource-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-12-150500.2.1
* kernel-livepatch-5_14_21-150500_55_113-default-12-150500.2.1
* kernel-livepatch-5_14_21-150500_55_121-default-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_116-default-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_110-default-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_27-debugsource-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_30-debugsource-7-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_28-debugsource-12-150500.2.1
* kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-12-150500.2.1
* kernel-livepatch-5_14_21-150500_55_113-default-12-150500.2.1
* kernel-livepatch-5_14_21-150500_55_121-default-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_116-default-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_110-default-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_27-debugsource-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_30-debugsource-7-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x)
* kernel-livepatch-SLE15-SP5_Update_29-debugsource-10-150500.2.1

## References:

* https://www.suse.com/security/cve/CVE-2022-50700.html
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255577
* https://bugzilla.suse.com/show_bug.cgi?id=1256097
* https://bugzilla.suse.com/show_bug.cgi?id=1258139



SUSE-SU-2026:0736-1: important: Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7)


# Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise
15 SP7)

Announcement ID: SUSE-SU-2026:0736-1
Release Date: 2026-03-02T07:04:29Z
Rating: important
References:

* bsc#1258139

Cross-References:

* CVE-2025-38129

CVSS scores:

* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Live Patching 15-SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 6.4.0-150700.53.3 fixes one
security issue

The following security issue was fixed:

* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-736=1 SUSE-SLE-
Module-Live-Patching-15-SP6-2026-735=1 SUSE-SLE-Module-Live-
Patching-15-SP6-2026-738=1 SUSE-SLE-Module-Live-Patching-15-SP6-2026-737=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-735=1 SUSE-2026-738=1 SUSE-2026-737=1
SUSE-2026-736=1

* SUSE Linux Enterprise Live Patching 15-SP7
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-739=1

## Package List:

* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_47-default-13-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_12-debugsource-12-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_8-debugsource-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-13-150600.2.1
* kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_50-default-12-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_11-debugsource-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-14-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_10-debugsource-13-150600.2.1
* kernel-livepatch-6_4_0-150600_23_38-default-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-12-150600.2.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_47-default-13-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_12-debugsource-12-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_8-debugsource-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-13-150600.2.1
* kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_50-default-12-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_11-debugsource-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-14-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_10-debugsource-13-150600.2.1
* kernel-livepatch-6_4_0-150600_23_38-default-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-12-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150700_53_3-default-11-150700.2.1
* kernel-livepatch-6_4_0-150700_53_3-default-debuginfo-11-150700.2.1
* kernel-livepatch-SLE15-SP7_Update_1-debugsource-11-150700.2.1

## References:

* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258139



openSUSE-SU-2026:20292-1: important: Security update for python-azure-core


openSUSE security update: security update for python-azure-core
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20292-1
Rating: important
References:

* bsc#1257703

Cross-References:

* CVE-2026-21226

CVSS scores:

* CVE-2026-21226 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-21226 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for python-azure-core fixes the following issues:

- CVE-2026-21226: Fixed deserialization of untrusted data which may allow an authorized attacker to execute code over a network. (bsc#1257703)

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-330=1

Package List:

- openSUSE Leap 16.0:

python313-azure-core-1.32.0-160000.3.1

References:

* https://www.suse.com/security/cve/CVE-2026-21226.html



openSUSE-SU-2026:20291-1: important: Security update for fluidsynth


openSUSE security update: security update for fluidsynth
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20291-1
Rating: important
References:

* bsc#1256435

Cross-References:

* CVE-2025-56225

CVSS scores:

* CVE-2025-56225 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-56225 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for fluidsynth fixes the following issues:

- CVE-2025-56225: NULL pointer deference when loading and invalid MIDI file (bsc#1256435).

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-329=1

Package List:

- openSUSE Leap 16.0:

fluidsynth-2.3.5-160000.3.1
fluidsynth-devel-2.3.5-160000.3.1
libfluidsynth3-2.3.5-160000.3.1

References:

* https://www.suse.com/security/cve/CVE-2025-56225.html



openSUSE-SU-2026:20290-1: moderate: Security update for haproxy


openSUSE security update: security update for haproxy
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20290-1
Rating: moderate
References:

* bsc#1257521
* bsc#1257976

Cross-References:

* CVE-2026-26080
* CVE-2026-26081

CVSS scores:

* CVE-2026-26080 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-26080 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-26081 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-26081 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 2 vulnerabilities and has 2 bug fixes can now be installed.

Description:

This update for haproxy fixes the following issues:

- Update to version 3.2.12+git0.6011f448e
- CVE-2026-26081: Fixed a DOS vulnerability in QUIC. (bsc#1257976)
- CVE-2026-26080: Fixed a DOS vulnerability in QUIC. (bsc#1257976)

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-328=1

Package List:

- openSUSE Leap 16.0:

haproxy-3.2.12+git0.6011f448e-160000.1.1

References:

* https://www.suse.com/security/cve/CVE-2026-26080.html
* https://www.suse.com/security/cve/CVE-2026-26081.html



openSUSE-SU-2026:10276-1: moderate: libsoup-3_0-0-3.6.6-2.1 on GA media


# libsoup-3_0-0-3.6.6-2.1 on GA media

Announcement ID: openSUSE-SU-2026:10276-1
Rating: moderate

Cross-References:

* CVE-2026-1467
* CVE-2026-1539
* CVE-2026-1760

CVSS scores:

* CVE-2026-1467 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-1467 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
* CVE-2026-1539 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
* CVE-2026-1539 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N
* CVE-2026-1760 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
* CVE-2026-1760 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 3 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the libsoup-3_0-0-3.6.6-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libsoup-3_0-0 3.6.6-2.1
* libsoup-3_0-0-32bit 3.6.6-2.1
* libsoup-devel 3.6.6-2.1
* libsoup-devel-32bit 3.6.6-2.1
* libsoup-lang 3.6.6-2.1
* typelib-1_0-Soup-3_0 3.6.6-2.1

## References:

* https://www.suse.com/security/cve/CVE-2026-1467.html
* https://www.suse.com/security/cve/CVE-2026-1539.html
* https://www.suse.com/security/cve/CVE-2026-1760.html



openSUSE-SU-2026:10275-1: moderate: gvfs-1.58.2-1.1 on GA media


# gvfs-1.58.2-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10275-1
Rating: moderate

Cross-References:

* CVE-2026-28295
* CVE-2026-28296

CVSS scores:

* CVE-2026-28295 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-28295 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-28296 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-28296 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the gvfs-1.58.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* gvfs 1.58.2-1.1
* gvfs-backend-afc 1.58.2-1.1
* gvfs-backend-goa 1.58.2-1.1
* gvfs-backend-gphoto 1.58.2-1.1
* gvfs-backend-samba 1.58.2-1.1
* gvfs-backends 1.58.2-1.1
* gvfs-fuse 1.58.2-1.1
* gvfs-lang 1.58.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-28295.html
* https://www.suse.com/security/cve/CVE-2026-28296.html



SUSE-SU-2026:0741-1: moderate: Security update for shim


# Security update for shim

Announcement ID: SUSE-SU-2026:0741-1
Release Date: 2026-03-02T08:11:32Z
Rating: moderate
References:

* bsc#1240871
* bsc#1247432

Cross-References:

* CVE-2024-2312

CVSS scores:

* CVE-2024-2312 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2312 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.3
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability and has one security fix can now be
installed.

## Description:

This update for shim fixes the following issues:

shim is updated to version 16.1:

* shim_start_image(): fix guid/handle pairing when uninstalling protocols
* Fix uncompressed ipv6 netboot
* fix test segfaults caused by uninitialized memory
* SbatLevel_Variable.txt: minor typo fix.
* Realloc() needs to allocate one more byte for sprintf()
* IPv6: Add more check to avoid multiple double colon and illegal char
* Loader proto v2
* loader-protocol: add workaround for EDK2 2025.02 page fault on FreePages
* Generate Authenticode for the entire PE file
* README: mention new loader protocol and interaction with UKIs
* shim: change automatically enable MOK_POLICY_REQUIRE_NX
* Save var info
* add SbatLevel entry 2025051000 for PSA-2025-00012-1
* Coverity fixes 20250804
* fix http boot
* Fix double free and leak in the loader protocol

shim is updated to version 16.0:

* Validate that a supplied vendor cert is not in PEM format
* sbat: Add grub.peimage,2 to latest (CVE-2024-2312)
* sbat: Also bump latest for grub,4 (and to todays date)
* undo change that limits certificate files to a single file
* shim: don't set second_stage to the empty string
* Fix SBAT.md for today's consensus about numbers
* Update Code of Conduct contact address
* make-certs: Handle missing OpenSSL installation
* Update MokVars.txt
* export DEFINES for sub makefile
* Drop unused EFI_IMAGE_SECURITY_DATABASE_GUID definition
* Null-terminate 'arguments' in fallback
* Fix "Verifiying" typo in error message
* Update Fedora CI targets
* Force gcc to produce DWARF4 so that gdb can use it
* Minor housekeeping 2024121700
* Discard load-options that start with WINDOWS
* Fix the issue that the gBS->LoadImage pointer was empty.
* shim: Allow data after the end of device path node in load options
* Handle network file not found like disks
* Update gnu-efi submodule for EFI_HTTP_ERROR
* Increase EFI file alignment
* avoid EFIv2 runtime services on Apple x86 machines
* Improve shortcut performance when comparing two boolean expressions
* Provide better error message when MokManager is not found
* tpm: Boot with a warning if the event log is full
* MokManager: remove redundant logical constraints
* Test import_mok_state() when MokListRT would be bigger than available size
* test-mok-mirror: minor bug fix
* Fix file system browser hang when enrolling MOK from disk
* Ignore a minor clang-tidy nit
* Allow fallback to default loader when encountering errors on network boot
* test.mk: don't use a temporary random.bin
* pe: Enhance debug report for update_mem_attrs
* Multiple certificate handling improvements
* Generate SbatLevel Metadata from SbatLevel_Variable.txt
* Apply EKU check with compile option
* Add configuration option to boot an alternative 2nd stage
* Loader protocol (with Device Path resolution support)
* netboot cleanup for additional files
* Document how revocations can be delivered
* post-process-pe: add tests to validate NX compliance
* regression: CopyMem() in ad8692e copies out of bounds
* Save the debug and error logs in mok-variables
* Add features for the Host Security ID program
* Mirror some more efi variables to mok-variables
* This adds DXE Services measurements to HSI and uses them for NX
* Add shim's current NX_COMPAT status to HSIStatus
* README.tpm: reflect that vendor_db is in fact logged as "vendor_db"
* Reject HTTP message with duplicate Content-Length header fields
* Disable log saving
* fallback: don't add new boot order entries backwards
* README.tpm: Update MokList entry to MokListRT
* SBAT Level update for February 2025 GRUB CVEs

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-741=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-741=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-741=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-741=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-741=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-741=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-741=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-741=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-741=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-741=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-741=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-741=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-741=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-741=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-741=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-741=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-741=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-741=1

## Package List:

* openSUSE Leap 15.3 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* openSUSE Leap 15.6 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* Basesystem Module 15-SP7 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3

## References:

* https://www.suse.com/security/cve/CVE-2024-2312.html
* https://bugzilla.suse.com/show_bug.cgi?id=1240871
* https://bugzilla.suse.com/show_bug.cgi?id=1247432



SUSE-SU-2026:0745-1: important: Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6)


# Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise
15 SP6)

Announcement ID: SUSE-SU-2026:0745-1
Release Date: 2026-03-02T09:34:18Z
Rating: important
References:

* bsc#1258139

Cross-References:

* CVE-2025-38129

CVSS scores:

* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.42 fixes one
security issue

The following security issue was fixed:

* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-745=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-745=1

## Package List:

* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_42-default-14-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_9-debugsource-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-14-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_42-default-14-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_9-debugsource-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-14-150600.2.1

## References:

* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258139