SUSE-SU-2026:0711-1: important: Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0725-1: important: Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0713-1: important: Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0731-1: important: Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0734-1: important: Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0727-1: important: Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0736-1: important: Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7)
openSUSE-SU-2026:20292-1: important: Security update for python-azure-core
openSUSE-SU-2026:20291-1: important: Security update for fluidsynth
openSUSE-SU-2026:20290-1: moderate: Security update for haproxy
openSUSE-SU-2026:10276-1: moderate: libsoup-3_0-0-3.6.6-2.1 on GA media
openSUSE-SU-2026:10275-1: moderate: gvfs-1.58.2-1.1 on GA media
SUSE-SU-2026:0741-1: moderate: Security update for shim
SUSE-SU-2026:0745-1: important: Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:0711-1: important: Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4)
# Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise
15 SP4)
Announcement ID: SUSE-SU-2026:0711-1
Release Date: 2026-02-28T18:33:50Z
Rating: important
References:
* bsc#1255577
* bsc#1256097
* bsc#1258139
Cross-References:
* CVE-2022-50700
* CVE-2023-54142
* CVE-2025-38129
CVSS scores:
* CVE-2022-50700 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.153 fixes
various security issues
The following security issues were fixed:
* CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer
(bsc#1255577).
* CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
(bsc#1256097).
* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-711=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2026-712=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-712=1 SUSE-2026-711=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-15-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_36-debugsource-15-150400.2.1
* kernel-livepatch-5_14_21-150400_24_153-default-15-150400.2.1
* kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-15-150400.2.1
* kernel-livepatch-5_14_21-150400_24_150-default-15-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_37-debugsource-15-150400.2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-15-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_36-debugsource-15-150400.2.1
* kernel-livepatch-5_14_21-150400_24_153-default-15-150400.2.1
* kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-15-150400.2.1
* kernel-livepatch-5_14_21-150400_24_150-default-15-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_37-debugsource-15-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50700.html
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255577
* https://bugzilla.suse.com/show_bug.cgi?id=1256097
* https://bugzilla.suse.com/show_bug.cgi?id=1258139
SUSE-SU-2026:0725-1: important: Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5)
# Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise
15 SP5)
Announcement ID: SUSE-SU-2026:0725-1
Release Date: 2026-03-01T10:33:42Z
Rating: important
References:
* bsc#1255577
* bsc#1256097
* bsc#1258139
Cross-References:
* CVE-2022-50700
* CVE-2023-54142
* CVE-2025-38129
CVSS scores:
* CVE-2022-50700 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.103 fixes
various security issues
The following security issues were fixed:
* CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer
(bsc#1255577).
* CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
(bsc#1256097).
* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-725=1 SUSE-2026-724=1 SUSE-2026-726=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-725=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2026-724=1 SUSE-SLE-Module-Live-
Patching-15-SP5-2026-726=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_25-debugsource-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_24-debugsource-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_103-default-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_26-debugsource-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_97-default-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_100-default-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-14-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_25-debugsource-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_24-debugsource-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_103-default-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_26-debugsource-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_97-default-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_100-default-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-14-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50700.html
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255577
* https://bugzilla.suse.com/show_bug.cgi?id=1256097
* https://bugzilla.suse.com/show_bug.cgi?id=1258139
SUSE-SU-2026:0713-1: important: Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5)
# Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise
15 SP5)
Announcement ID: SUSE-SU-2026:0713-1
Release Date: 2026-03-01T07:33:38Z
Rating: important
References:
* bsc#1255577
* bsc#1256097
* bsc#1258139
Cross-References:
* CVE-2022-50700
* CVE-2023-54142
* CVE-2025-38129
CVSS scores:
* CVE-2022-50700 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.94 fixes
various security issues
The following security issues were fixed:
* CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer
(bsc#1255577).
* CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
(bsc#1256097).
* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-719=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2026-720=1 SUSE-SLE-Module-Live-
Patching-15-SP4-2026-721=1 SUSE-SLE-Module-Live-Patching-15-SP4-2026-722=1 SUSE-
SLE-Module-Live-Patching-15-SP4-2026-713=1 SUSE-SLE-Module-Live-
Patching-15-SP4-2026-714=1 SUSE-SLE-Module-Live-Patching-15-SP4-2026-715=1 SUSE-
SLE-Module-Live-Patching-15-SP4-2026-716=1 SUSE-SLE-Module-Live-
Patching-15-SP4-2026-717=1 SUSE-SLE-Module-Live-Patching-15-SP4-2026-718=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-720=1 SUSE-2026-721=1 SUSE-2026-722=1
SUSE-2026-713=1 SUSE-2026-714=1 SUSE-2026-715=1 SUSE-2026-716=1 SUSE-2026-717=1
SUSE-2026-718=1 SUSE-2026-719=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-723=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-723=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_176-default-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_187-default-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_47-debugsource-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_179-default-debuginfo-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_42-debugsource-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_158-default-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_44-debugsource-8-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_40-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_187-default-debuginfo-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_38-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_184-default-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_167-default-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_179-default-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_39-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_170-default-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_161-default-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_46-debugsource-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_43-debugsource-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_45-debugsource-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_41-debugsource-13-150400.2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_176-default-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_187-default-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_47-debugsource-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_179-default-debuginfo-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_42-debugsource-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_158-default-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_40-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-9-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_44-debugsource-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_187-default-debuginfo-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_38-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_184-default-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_167-default-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_179-default-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_39-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_170-default-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_161-default-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_46-debugsource-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_43-debugsource-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_45-debugsource-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_41-debugsource-13-150400.2.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_94-default-15-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_23-debugsource-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-15-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_94-default-15-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_23-debugsource-15-150500.2.1
* kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-15-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50700.html
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255577
* https://bugzilla.suse.com/show_bug.cgi?id=1256097
* https://bugzilla.suse.com/show_bug.cgi?id=1258139
SUSE-SU-2026:0731-1: important: Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5)
# Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise
15 SP5)
Announcement ID: SUSE-SU-2026:0731-1
Release Date: 2026-03-01T19:33:40Z
Rating: important
References:
* bsc#1255577
* bsc#1256097
* bsc#1258139
Cross-References:
* CVE-2022-50700
* CVE-2023-54142
* CVE-2025-38129
CVSS scores:
* CVE-2022-50700 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.130 fixes
various security issues
The following security issues were fixed:
* CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer
(bsc#1255577).
* CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
(bsc#1256097).
* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-733=1 SUSE-2026-732=1 SUSE-2026-731=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-731=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2026-733=1 SUSE-SLE-Module-Live-
Patching-15-SP5-2026-732=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_124-default-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_127-default-2-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_33-debugsource-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_130-default-2-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_31-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_127-default-debuginfo-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_130-default-debuginfo-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-5-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_32-debugsource-2-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_124-default-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_127-default-2-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_33-debugsource-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_130-default-2-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_31-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_127-default-debuginfo-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_130-default-debuginfo-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-5-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_32-debugsource-2-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50700.html
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255577
* https://bugzilla.suse.com/show_bug.cgi?id=1256097
* https://bugzilla.suse.com/show_bug.cgi?id=1258139
SUSE-SU-2026:0734-1: important: Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5)
# Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise
15 SP5)
Announcement ID: SUSE-SU-2026:0734-1
Release Date: 2026-03-01T19:33:48Z
Rating: important
References:
* bsc#1256097
* bsc#1258139
Cross-References:
* CVE-2023-54142
* CVE-2025-38129
CVSS scores:
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.133 fixes
various security issues
The following security issues were fixed:
* CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
(bsc#1256097).
* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-734=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-734=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_34-debugsource-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_133-default-debuginfo-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_133-default-2-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_34-debugsource-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_133-default-debuginfo-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_133-default-2-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256097
* https://bugzilla.suse.com/show_bug.cgi?id=1258139
SUSE-SU-2026:0727-1: important: Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)
# Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise
15 SP5)
Announcement ID: SUSE-SU-2026:0727-1
Release Date: 2026-03-01T15:04:08Z
Rating: important
References:
* bsc#1255577
* bsc#1256097
* bsc#1258139
Cross-References:
* CVE-2022-50700
* CVE-2023-54142
* CVE-2025-38129
CVSS scores:
* CVE-2022-50700 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.121 fixes
various security issues
The following security issues were fixed:
* CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer
(bsc#1255577).
* CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
(bsc#1256097).
* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-728=1 SUSE-2026-729=1 SUSE-2026-730=1
SUSE-2026-727=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-727=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2026-728=1 SUSE-SLE-Module-Live-
Patching-15-SP5-2026-729=1 SUSE-SLE-Module-Live-Patching-15-SP5-2026-730=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_28-debugsource-12-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_29-debugsource-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-12-150500.2.1
* kernel-livepatch-5_14_21-150500_55_113-default-12-150500.2.1
* kernel-livepatch-5_14_21-150500_55_121-default-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_116-default-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_110-default-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_27-debugsource-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_30-debugsource-7-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_28-debugsource-12-150500.2.1
* kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-12-150500.2.1
* kernel-livepatch-5_14_21-150500_55_113-default-12-150500.2.1
* kernel-livepatch-5_14_21-150500_55_121-default-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_116-default-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_110-default-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_27-debugsource-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_30-debugsource-7-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x)
* kernel-livepatch-SLE15-SP5_Update_29-debugsource-10-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50700.html
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255577
* https://bugzilla.suse.com/show_bug.cgi?id=1256097
* https://bugzilla.suse.com/show_bug.cgi?id=1258139
SUSE-SU-2026:0736-1: important: Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7)
# Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise
15 SP7)
Announcement ID: SUSE-SU-2026:0736-1
Release Date: 2026-03-02T07:04:29Z
Rating: important
References:
* bsc#1258139
Cross-References:
* CVE-2025-38129
CVSS scores:
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Live Patching 15-SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 6.4.0-150700.53.3 fixes one
security issue
The following security issue was fixed:
* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-736=1 SUSE-SLE-
Module-Live-Patching-15-SP6-2026-735=1 SUSE-SLE-Module-Live-
Patching-15-SP6-2026-738=1 SUSE-SLE-Module-Live-Patching-15-SP6-2026-737=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-735=1 SUSE-2026-738=1 SUSE-2026-737=1
SUSE-2026-736=1
* SUSE Linux Enterprise Live Patching 15-SP7
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-739=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_47-default-13-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_12-debugsource-12-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_8-debugsource-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-13-150600.2.1
* kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_50-default-12-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_11-debugsource-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-14-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_10-debugsource-13-150600.2.1
* kernel-livepatch-6_4_0-150600_23_38-default-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-12-150600.2.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_47-default-13-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_12-debugsource-12-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_8-debugsource-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-13-150600.2.1
* kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_50-default-12-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_11-debugsource-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-14-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_10-debugsource-13-150600.2.1
* kernel-livepatch-6_4_0-150600_23_38-default-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-12-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150700_53_3-default-11-150700.2.1
* kernel-livepatch-6_4_0-150700_53_3-default-debuginfo-11-150700.2.1
* kernel-livepatch-SLE15-SP7_Update_1-debugsource-11-150700.2.1
## References:
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258139
openSUSE-SU-2026:20292-1: important: Security update for python-azure-core
openSUSE security update: security update for python-azure-core
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20292-1
Rating: important
References:
* bsc#1257703
Cross-References:
* CVE-2026-21226
CVSS scores:
* CVE-2026-21226 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-21226 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for python-azure-core fixes the following issues:
- CVE-2026-21226: Fixed deserialization of untrusted data which may allow an authorized attacker to execute code over a network. (bsc#1257703)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-330=1
Package List:
- openSUSE Leap 16.0:
python313-azure-core-1.32.0-160000.3.1
References:
* https://www.suse.com/security/cve/CVE-2026-21226.html
openSUSE-SU-2026:20291-1: important: Security update for fluidsynth
openSUSE security update: security update for fluidsynth
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20291-1
Rating: important
References:
* bsc#1256435
Cross-References:
* CVE-2025-56225
CVSS scores:
* CVE-2025-56225 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-56225 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for fluidsynth fixes the following issues:
- CVE-2025-56225: NULL pointer deference when loading and invalid MIDI file (bsc#1256435).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-329=1
Package List:
- openSUSE Leap 16.0:
fluidsynth-2.3.5-160000.3.1
fluidsynth-devel-2.3.5-160000.3.1
libfluidsynth3-2.3.5-160000.3.1
References:
* https://www.suse.com/security/cve/CVE-2025-56225.html
openSUSE-SU-2026:20290-1: moderate: Security update for haproxy
openSUSE security update: security update for haproxy
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20290-1
Rating: moderate
References:
* bsc#1257521
* bsc#1257976
Cross-References:
* CVE-2026-26080
* CVE-2026-26081
CVSS scores:
* CVE-2026-26080 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-26080 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-26081 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-26081 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 2 vulnerabilities and has 2 bug fixes can now be installed.
Description:
This update for haproxy fixes the following issues:
- Update to version 3.2.12+git0.6011f448e
- CVE-2026-26081: Fixed a DOS vulnerability in QUIC. (bsc#1257976)
- CVE-2026-26080: Fixed a DOS vulnerability in QUIC. (bsc#1257976)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-328=1
Package List:
- openSUSE Leap 16.0:
haproxy-3.2.12+git0.6011f448e-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2026-26080.html
* https://www.suse.com/security/cve/CVE-2026-26081.html
openSUSE-SU-2026:10276-1: moderate: libsoup-3_0-0-3.6.6-2.1 on GA media
# libsoup-3_0-0-3.6.6-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10276-1
Rating: moderate
Cross-References:
* CVE-2026-1467
* CVE-2026-1539
* CVE-2026-1760
CVSS scores:
* CVE-2026-1467 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-1467 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
* CVE-2026-1539 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
* CVE-2026-1539 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N
* CVE-2026-1760 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
* CVE-2026-1760 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 3 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the libsoup-3_0-0-3.6.6-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libsoup-3_0-0 3.6.6-2.1
* libsoup-3_0-0-32bit 3.6.6-2.1
* libsoup-devel 3.6.6-2.1
* libsoup-devel-32bit 3.6.6-2.1
* libsoup-lang 3.6.6-2.1
* typelib-1_0-Soup-3_0 3.6.6-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-1467.html
* https://www.suse.com/security/cve/CVE-2026-1539.html
* https://www.suse.com/security/cve/CVE-2026-1760.html
openSUSE-SU-2026:10275-1: moderate: gvfs-1.58.2-1.1 on GA media
# gvfs-1.58.2-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10275-1
Rating: moderate
Cross-References:
* CVE-2026-28295
* CVE-2026-28296
CVSS scores:
* CVE-2026-28295 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-28295 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-28296 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-28296 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the gvfs-1.58.2-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* gvfs 1.58.2-1.1
* gvfs-backend-afc 1.58.2-1.1
* gvfs-backend-goa 1.58.2-1.1
* gvfs-backend-gphoto 1.58.2-1.1
* gvfs-backend-samba 1.58.2-1.1
* gvfs-backends 1.58.2-1.1
* gvfs-fuse 1.58.2-1.1
* gvfs-lang 1.58.2-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-28295.html
* https://www.suse.com/security/cve/CVE-2026-28296.html
SUSE-SU-2026:0741-1: moderate: Security update for shim
# Security update for shim
Announcement ID: SUSE-SU-2026:0741-1
Release Date: 2026-03-02T08:11:32Z
Rating: moderate
References:
* bsc#1240871
* bsc#1247432
Cross-References:
* CVE-2024-2312
CVSS scores:
* CVE-2024-2312 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2312 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.3
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for shim fixes the following issues:
shim is updated to version 16.1:
* shim_start_image(): fix guid/handle pairing when uninstalling protocols
* Fix uncompressed ipv6 netboot
* fix test segfaults caused by uninitialized memory
* SbatLevel_Variable.txt: minor typo fix.
* Realloc() needs to allocate one more byte for sprintf()
* IPv6: Add more check to avoid multiple double colon and illegal char
* Loader proto v2
* loader-protocol: add workaround for EDK2 2025.02 page fault on FreePages
* Generate Authenticode for the entire PE file
* README: mention new loader protocol and interaction with UKIs
* shim: change automatically enable MOK_POLICY_REQUIRE_NX
* Save var info
* add SbatLevel entry 2025051000 for PSA-2025-00012-1
* Coverity fixes 20250804
* fix http boot
* Fix double free and leak in the loader protocol
shim is updated to version 16.0:
* Validate that a supplied vendor cert is not in PEM format
* sbat: Add grub.peimage,2 to latest (CVE-2024-2312)
* sbat: Also bump latest for grub,4 (and to todays date)
* undo change that limits certificate files to a single file
* shim: don't set second_stage to the empty string
* Fix SBAT.md for today's consensus about numbers
* Update Code of Conduct contact address
* make-certs: Handle missing OpenSSL installation
* Update MokVars.txt
* export DEFINES for sub makefile
* Drop unused EFI_IMAGE_SECURITY_DATABASE_GUID definition
* Null-terminate 'arguments' in fallback
* Fix "Verifiying" typo in error message
* Update Fedora CI targets
* Force gcc to produce DWARF4 so that gdb can use it
* Minor housekeeping 2024121700
* Discard load-options that start with WINDOWS
* Fix the issue that the gBS->LoadImage pointer was empty.
* shim: Allow data after the end of device path node in load options
* Handle network file not found like disks
* Update gnu-efi submodule for EFI_HTTP_ERROR
* Increase EFI file alignment
* avoid EFIv2 runtime services on Apple x86 machines
* Improve shortcut performance when comparing two boolean expressions
* Provide better error message when MokManager is not found
* tpm: Boot with a warning if the event log is full
* MokManager: remove redundant logical constraints
* Test import_mok_state() when MokListRT would be bigger than available size
* test-mok-mirror: minor bug fix
* Fix file system browser hang when enrolling MOK from disk
* Ignore a minor clang-tidy nit
* Allow fallback to default loader when encountering errors on network boot
* test.mk: don't use a temporary random.bin
* pe: Enhance debug report for update_mem_attrs
* Multiple certificate handling improvements
* Generate SbatLevel Metadata from SbatLevel_Variable.txt
* Apply EKU check with compile option
* Add configuration option to boot an alternative 2nd stage
* Loader protocol (with Device Path resolution support)
* netboot cleanup for additional files
* Document how revocations can be delivered
* post-process-pe: add tests to validate NX compliance
* regression: CopyMem() in ad8692e copies out of bounds
* Save the debug and error logs in mok-variables
* Add features for the Host Security ID program
* Mirror some more efi variables to mok-variables
* This adds DXE Services measurements to HSI and uses them for NX
* Add shim's current NX_COMPAT status to HSIStatus
* README.tpm: reflect that vendor_db is in fact logged as "vendor_db"
* Reject HTTP message with duplicate Content-Length header fields
* Disable log saving
* fallback: don't add new boot order entries backwards
* README.tpm: Update MokList entry to MokListRT
* SBAT Level update for February 2025 GRUB CVEs
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-741=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-741=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-741=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-741=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-741=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-741=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-741=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-741=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-741=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-741=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-741=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-741=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-741=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-741=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-741=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-741=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-741=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-741=1
## Package List:
* openSUSE Leap 15.3 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* openSUSE Leap 15.6 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* Basesystem Module 15-SP7 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* shim-16.1-150300.4.31.3
* shim-debugsource-16.1-150300.4.31.3
* shim-debuginfo-16.1-150300.4.31.3
## References:
* https://www.suse.com/security/cve/CVE-2024-2312.html
* https://bugzilla.suse.com/show_bug.cgi?id=1240871
* https://bugzilla.suse.com/show_bug.cgi?id=1247432
SUSE-SU-2026:0745-1: important: Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6)
# Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise
15 SP6)
Announcement ID: SUSE-SU-2026:0745-1
Release Date: 2026-03-02T09:34:18Z
Rating: important
References:
* bsc#1258139
Cross-References:
* CVE-2025-38129
CVSS scores:
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.42 fixes one
security issue
The following security issue was fixed:
* CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring
(bsc#1258139).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-745=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-745=1
## Package List:
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_42-default-14-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_9-debugsource-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-14-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_42-default-14-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_9-debugsource-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-14-150600.2.1
## References:
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258139