SUSE-SU-2026:1997-1: important: Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5)
openSUSE-SU-2026:20762-1: important: Security update for go1.26
openSUSE-SU-2026:20763-1: important: Security update for go1.25
openSUSE-SU-2026:20764-1: important: Security update for glibc
openSUSE-SU-2026:20759-1: moderate: Security update for emacs
openSUSE-SU-2026:20753-1: important: Security update for agama
openSUSE-SU-2026:20761-1: important: Security update for google-guest-agent
openSUSE-SU-2026:20758-1: important: Security update for the Linux Kernel
openSUSE-SU-2026:20757-1: important: Security update for openssh
openSUSE-SU-2026:20750-1: moderate: Security update for ibus-rime, librime
openSUSE-SU-2026:20755-1: important: Security update for openexr
openSUSE-SU-2026:20754-1: important: Security update for rsync
openSUSE-SU-2026:20752-1: important: Security update for alloy
openSUSE-SU-2026:20749-1: important: Security update for tree-sitter
openSUSE-SU-2026:20745-1: critical: Security update for php8
openSUSE-SU-2026:20747-1: important: Security update for ImageMagick
openSUSE-SU-2026:20743-1: important: Security update for the Linux Kernel
openSUSE-SU-2026:20742-1: moderate: Security update for ongres-scram, ongres-stringprep, plexus-testing, maven, maven-doxia, mojo-parent, sisu
openSUSE-SU-2026:20737-1: moderate: Security update for python-lxml
openSUSE-SU-2026:20748-1: important: Security update for dnsmasq
openSUSE-SU-2026:20741-1: moderate: Security update for MozillaFirefox
openSUSE-SU-2026:10805-1: moderate: perl-HTTP-Tiny-0.094-1.1 on GA media
openSUSE-SU-2026:10808-1: moderate: postgresql16-16.14-1.1 on GA media
openSUSE-SU-2026:10806-1: moderate: postgresql14-14.23-1.1 on GA media
openSUSE-SU-2026:10810-1: moderate: traefik-3.6.17-1.1 on GA media
openSUSE-SU-2026:10804-1: moderate: openssh-10.3p1-4.1 on GA media
SUSE-SU-2026:1999-1: important: Security update for postgresql15
SUSE-SU-2026:2003-1: moderate: Security update for GraphicsMagick
SUSE-SU-2026:2001-1: important: Security update for postgresql16
SUSE-SU-2026:2004-1: important: Security update for python-Pillow
SUSE-SU-2026:2008-1: important: Security update for haveged
SUSE-SU-2026:2010-1: important: Security update for erlang26
SUSE-SU-2026:2009-1: important: Security update for haveged
openSUSE-SU-2026:0171-1: important: Security update for git-bug
openSUSE-SU-2026:0170-1: important: Security update for perl-CryptX
SUSE-SU-2026:1997-1: important: Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5)
# Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise
15 SP5)
Announcement ID: SUSE-SU-2026:1997-1
Release Date: 2026-05-18T16:33:54Z
Rating: important
References:
* bsc#1264459
Cross-References:
* CVE-2026-43284
CVSS scores:
* CVE-2026-43284 ( SUSE ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-43284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-43284 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for the SUSE Linux Enterprise Kernel 5.14.21-150500.55.124 fixes one
security issue
The following security issue was fixed:
* CVE-2026-43284: xfrm: esp: avoid in-place decrypt on shared skb frags
(bsc#1264459).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1997=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-1997=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_124-default-10-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_31-debugsource-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-10-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_124-default-10-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_31-debugsource-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-10-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-43284.html
* https://bugzilla.suse.com/show_bug.cgi?id=1264459
openSUSE-SU-2026:20762-1: important: Security update for go1.26
openSUSE security update: security update for go1.26
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20762-1
Rating: important
References:
* bsc#1170826
* bsc#1255111
* bsc#1264499
* bsc#1264500
* bsc#1264501
* bsc#1264502
* bsc#1264503
* bsc#1264504
* bsc#1264505
* bsc#1264506
* bsc#1264507
* bsc#1264508
* bsc#1264509
Cross-References:
* CVE-2026-33811
* CVE-2026-33814
* CVE-2026-39817
* CVE-2026-39819
* CVE-2026-39820
* CVE-2026-39823
* CVE-2026-39825
* CVE-2026-39826
* CVE-2026-39836
* CVE-2026-42499
* CVE-2026-42501
CVSS scores:
* CVE-2026-33811 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33814 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-39817 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N
* CVE-2026-39819 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N
* CVE-2026-39820 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-39823 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-39825 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-39826 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-39836 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-42499 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-42501 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 11 vulnerabilities and has 13 bug fixes can now be installed.
Description:
This update for go1.26 fixes the following issues
Security issues:
- CVE-2026-33811: net: crash when handling long CNAME response (bsc#1264508).
- CVE-2026-33814: net/http: infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE (bsc#1264506).
- CVE-2026-39817: cmd/go: "go tool pack" does not sanitize output paths (bsc#1264505).
- CVE-2026-39819: cmd/go: "go bug" follows symlinks in predictable temporary filenames (bsc#1264504).
- CVE-2026-39820: net/mail: quadratic string concatentation in consumeComment (bsc#1264503).
- CVE-2026-39823: html/template: bypass of meta content URL escaping causes XSS (bsc#1264509).
- CVE-2026-39825: net/http/httputil: ReverseProxy forwards queries with more than urlmaxqueryparams parameters
(bsc#1264500).
- CVE-2026-39826: html/template: escaper bypass leads to XSS (bsc#1264507).
- CVE-2026-39836: net: panic in Dial and LookupPort when handling NUL byte on Windows (bsc#1264501).
- CVE-2026-42499: net/mail: quadratic string concatenation in consumePhrase (bsc#1264502).
- CVE-2026-42501: cmd/go: malicious module proxy can bypass checksum database (bsc#1264499).
Non security issues:
- Updated to go1.26.3 (bsc#1255111).
- Go packages miss binutils-gold dependency (bsc#1170826).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-758=1
Package List:
- openSUSE Leap 16.0:
go1.26-1.26.3-160000.1.1
go1.26-doc-1.26.3-160000.1.1
go1.26-libstd-1.26.3-160000.1.1
go1.26-race-1.26.3-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2026-33811.html
* https://www.suse.com/security/cve/CVE-2026-33814.html
* https://www.suse.com/security/cve/CVE-2026-39817.html
* https://www.suse.com/security/cve/CVE-2026-39819.html
* https://www.suse.com/security/cve/CVE-2026-39820.html
* https://www.suse.com/security/cve/CVE-2026-39823.html
* https://www.suse.com/security/cve/CVE-2026-39825.html
* https://www.suse.com/security/cve/CVE-2026-39826.html
* https://www.suse.com/security/cve/CVE-2026-39836.html
* https://www.suse.com/security/cve/CVE-2026-42499.html
* https://www.suse.com/security/cve/CVE-2026-42501.html
openSUSE-SU-2026:20763-1: important: Security update for go1.25
openSUSE security update: security update for go1.25
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20763-1
Rating: important
References:
* bsc#1170826
* bsc#1244485
* bsc#1264499
* bsc#1264500
* bsc#1264501
* bsc#1264502
* bsc#1264503
* bsc#1264504
* bsc#1264505
* bsc#1264506
* bsc#1264507
* bsc#1264508
* bsc#1264509
Cross-References:
* CVE-2026-33811
* CVE-2026-33814
* CVE-2026-39817
* CVE-2026-39819
* CVE-2026-39820
* CVE-2026-39823
* CVE-2026-39825
* CVE-2026-39826
* CVE-2026-39836
* CVE-2026-42499
* CVE-2026-42501
CVSS scores:
* CVE-2026-33811 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33814 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-39817 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N
* CVE-2026-39819 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N
* CVE-2026-39820 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-39823 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-39825 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-39826 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-39836 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-42499 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-42501 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 11 vulnerabilities and has 13 bug fixes can now be installed.
Description:
This update for go1.25 fixes the following issues
Security issues:
- CVE-2026-33811: net: crash when handling long CNAME response (bsc#1264508).
- CVE-2026-33814: net/http: infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE (bsc#1264506).
- CVE-2026-39817: cmd/go: "go tool pack" does not sanitize output paths (bsc#1264505).
- CVE-2026-39819: cmd/go: "go bug" follows symlinks in predictable temporary filenames (bsc#1264504).
- CVE-2026-39820: net/mail: quadratic string concatentation in consumeComment (bsc#1264503).
- CVE-2026-39823: html/template: bypass of meta content URL escaping causes XSS (bsc#1264509).
- CVE-2026-39825: net/http/httputil: ReverseProxy forwards queries with more than urlmaxqueryparams parameters
(bsc#1264500).
- CVE-2026-39826: html/template: escaper bypass leads to XSS (bsc#1264507).
- CVE-2026-39836: net: panic in Dial and LookupPort when handling NUL byte on Windows (bsc#1264501).
- CVE-2026-42499: net/mail: quadratic string concatenation in consumePhrase (bsc#1264502).
- CVE-2026-42501: cmd/go: malicious module proxy can bypass checksum database (bsc#1264499).
Non security issues:
- Updated to go1.25.10 (bsc#1244485).
- Go packages miss binutils-gold dependency (bsc#1170826).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-760=1
Package List:
- openSUSE Leap 16.0:
go1.25-1.25.10-160000.1.1
go1.25-doc-1.25.10-160000.1.1
go1.25-libstd-1.25.10-160000.1.1
go1.25-race-1.25.10-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2026-33811.html
* https://www.suse.com/security/cve/CVE-2026-33814.html
* https://www.suse.com/security/cve/CVE-2026-39817.html
* https://www.suse.com/security/cve/CVE-2026-39819.html
* https://www.suse.com/security/cve/CVE-2026-39820.html
* https://www.suse.com/security/cve/CVE-2026-39823.html
* https://www.suse.com/security/cve/CVE-2026-39825.html
* https://www.suse.com/security/cve/CVE-2026-39826.html
* https://www.suse.com/security/cve/CVE-2026-39836.html
* https://www.suse.com/security/cve/CVE-2026-42499.html
* https://www.suse.com/security/cve/CVE-2026-42501.html
openSUSE-SU-2026:20764-1: important: Security update for glibc
openSUSE security update: security update for glibc
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20764-1
Rating: important
References:
* bsc#1261206
* bsc#1262464
* bsc#1262465
Cross-References:
* CVE-2026-4046
* CVE-2026-5450
* CVE-2026-5928
CVSS scores:
* CVE-2026-4046 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-4046 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-5450 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-5450 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-5928 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-5928 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 3 vulnerabilities and has 3 bug fixes can now be installed.
Description:
This update for glibc fixes the following issues
- CVE-2026-4046: assertion failure when converting inputs may be used to remotely crash an application (bsc#1261206).
- CVE-2026-5450: stdio-common: scanf %mc pattern will cause heap overflow when width > 1024 (bsc#1262465).
- CVE-2026-5928: libio: ungetwc could be used to leak data on special conditions (bsc#1262464).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-761=1
Package List:
- openSUSE Leap 16.0:
cross-aarch64-glibc-devel-2.40-160000.5.1
cross-ppc64le-glibc-devel-2.40-160000.5.1
cross-riscv64-glibc-devel-2.40-160000.5.1
cross-s390x-glibc-devel-2.40-160000.5.1
glibc-2.40-160000.5.1
glibc-devel-2.40-160000.5.1
glibc-devel-static-2.40-160000.5.1
glibc-extra-2.40-160000.5.1
glibc-gconv-modules-extra-2.40-160000.5.1
glibc-html-2.40-160000.5.1
glibc-i18ndata-2.40-160000.5.1
glibc-info-2.40-160000.5.1
glibc-lang-2.40-160000.5.1
glibc-locale-2.40-160000.5.1
glibc-locale-base-2.40-160000.5.1
glibc-profile-2.40-160000.5.1
glibc-utils-2.40-160000.5.1
References:
* https://www.suse.com/security/cve/CVE-2026-4046.html
* https://www.suse.com/security/cve/CVE-2026-5450.html
* https://www.suse.com/security/cve/CVE-2026-5928.html
openSUSE-SU-2026:20759-1: moderate: Security update for emacs
openSUSE security update: security update for emacs
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20759-1
Rating: moderate
References:
* bsc#1262007
* bsc#1262611
Cross-References:
* CVE-2026-6861
CVSS scores:
* CVE-2026-6861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
* CVE-2026-6861 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has 2 bug fixes can now be installed.
Description:
This update for emacs fixes the following issue:
- CVE-2026-6861: memory corruption when processing specially crafted SVG CSS data (bsc#1262611).
- Build with tree-sitter-0.26.8 security update (bsc#1262007).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-755=1
Package List:
- openSUSE Leap 16.0:
emacs-30.2-160000.2.1
emacs-el-30.2-160000.2.1
emacs-eln-30.2-160000.2.1
emacs-games-30.2-160000.2.1
emacs-info-30.2-160000.2.1
emacs-nox-30.2-160000.2.1
emacs-x11-30.2-160000.2.1
etags-30.2-160000.2.1
References:
* https://www.suse.com/security/cve/CVE-2026-6861.html
openSUSE-SU-2026:20753-1: important: Security update for agama
openSUSE security update: security update for agama
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20753-1
Rating: important
References:
* bsc#1257930
Cross-References:
* CVE-2026-25727
CVSS scores:
* CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for agama fixes the following issue
- CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion
(bsc#1257930).
Changes for agama:
- Update "time" crate to version 0.3.47.
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-748=1
Package List:
- openSUSE Leap 16.0:
agama-17+570.fe7244a50-160000.10.1
agama-autoinstall-17+570.fe7244a50-160000.10.1
agama-cli-17+570.fe7244a50-160000.10.1
agama-cli-bash-completion-17+570.fe7244a50-160000.10.2
agama-cli-fish-completion-17+570.fe7244a50-160000.10.2
agama-cli-zsh-completion-17+570.fe7244a50-160000.10.2
agama-openapi-17+570.fe7244a50-160000.10.1
agama-scripts-17+570.fe7244a50-160000.10.1
References:
* https://www.suse.com/security/cve/CVE-2026-25727.html
openSUSE-SU-2026:20761-1: important: Security update for google-guest-agent
openSUSE security update: security update for google-guest-agent
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20761-1
Rating: important
References:
* bsc#1260264
Cross-References:
* CVE-2026-33186
CVSS scores:
* CVE-2026-33186 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33186 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for google-guest-agent fixes the following issue
- CVE-2026-33186: google.golang.org/grpc: authorization bypass due to improper validation of the HTTP/2: path pseudo-
header (bsc#1260264).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-757=1
Package List:
- openSUSE Leap 16.0:
google-guest-agent-20250506.01-160000.2.1
References:
* https://www.suse.com/security/cve/CVE-2026-33186.html
openSUSE-SU-2026:20758-1: important: Security update for the Linux Kernel
openSUSE security update: security update for the linux kernel
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20758-1
Rating: important
References:
* bsc#1264013
* bsc#1265209
Cross-References:
* CVE-2025-54518
* CVE-2026-46300
CVSS scores:
* CVE-2025-54518 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-54518 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-46300 ( SUSE ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-46300 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 2 vulnerabilities and has 2 bug fixes can now be installed.
Description:
The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues
The following security issues were fixed:
- CVE-2025-54518: x86/CPU/AMD: Prevent improper isolation of shared resources in Zen2's op cache (bsc#1264013).
- CVE-2026-46300: net: skbuff: propagate shared-frag marker through pskb_copy() (bsc#1265209).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-753=1
Package List:
- openSUSE Leap 16.0:
cluster-md-kmp-64kb-6.12.0-160000.31.1
cluster-md-kmp-azure-6.12.0-160000.31.1
cluster-md-kmp-default-6.12.0-160000.31.1
cluster-md-kmp-rt-6.12.0-160000.31.1
dlm-kmp-64kb-6.12.0-160000.31.1
dlm-kmp-azure-6.12.0-160000.31.1
dlm-kmp-default-6.12.0-160000.31.1
dlm-kmp-rt-6.12.0-160000.31.1
dtb-allwinner-6.12.0-160000.31.1
dtb-altera-6.12.0-160000.31.1
dtb-amazon-6.12.0-160000.31.1
dtb-amd-6.12.0-160000.31.1
dtb-amlogic-6.12.0-160000.31.1
dtb-apm-6.12.0-160000.31.1
dtb-apple-6.12.0-160000.31.1
dtb-arm-6.12.0-160000.31.1
dtb-broadcom-6.12.0-160000.31.1
dtb-cavium-6.12.0-160000.31.1
dtb-exynos-6.12.0-160000.31.1
dtb-freescale-6.12.0-160000.31.1
dtb-hisilicon-6.12.0-160000.31.1
dtb-lg-6.12.0-160000.31.1
dtb-marvell-6.12.0-160000.31.1
dtb-mediatek-6.12.0-160000.31.1
dtb-nvidia-6.12.0-160000.31.1
dtb-qcom-6.12.0-160000.31.1
dtb-renesas-6.12.0-160000.31.1
dtb-rockchip-6.12.0-160000.31.1
dtb-socionext-6.12.0-160000.31.1
dtb-sprd-6.12.0-160000.31.1
dtb-xilinx-6.12.0-160000.31.1
gfs2-kmp-64kb-6.12.0-160000.31.1
gfs2-kmp-azure-6.12.0-160000.31.1
gfs2-kmp-default-6.12.0-160000.31.1
gfs2-kmp-rt-6.12.0-160000.31.1
kernel-64kb-6.12.0-160000.31.1
kernel-64kb-devel-6.12.0-160000.31.1
kernel-64kb-extra-6.12.0-160000.31.1
kernel-64kb-optional-6.12.0-160000.31.1
kernel-azure-6.12.0-160000.31.1
kernel-azure-devel-6.12.0-160000.31.1
kernel-azure-extra-6.12.0-160000.31.1
kernel-azure-optional-6.12.0-160000.31.1
kernel-azure-vdso-6.12.0-160000.31.1
kernel-default-6.12.0-160000.31.1
kernel-default-base-6.12.0-160000.31.1.160000.2.12
kernel-default-devel-6.12.0-160000.31.1
kernel-default-extra-6.12.0-160000.31.1
kernel-default-optional-6.12.0-160000.31.1
kernel-default-vdso-6.12.0-160000.31.1
kernel-devel-6.12.0-160000.31.1
kernel-docs-6.12.0-160000.31.1
kernel-docs-html-6.12.0-160000.31.1
kernel-kvmsmall-6.12.0-160000.31.1
kernel-kvmsmall-devel-6.12.0-160000.31.1
kernel-kvmsmall-vdso-6.12.0-160000.31.1
kernel-macros-6.12.0-160000.31.1
kernel-obs-build-6.12.0-160000.31.1
kernel-obs-qa-6.12.0-160000.31.1
kernel-rt-6.12.0-160000.31.1
kernel-rt-devel-6.12.0-160000.31.1
kernel-rt-extra-6.12.0-160000.31.1
kernel-rt-optional-6.12.0-160000.31.1
kernel-rt-vdso-6.12.0-160000.31.1
kernel-source-6.12.0-160000.31.1
kernel-source-vanilla-6.12.0-160000.31.1
kernel-syms-6.12.0-160000.31.1
kernel-zfcpdump-6.12.0-160000.31.1
kselftests-kmp-64kb-6.12.0-160000.31.1
kselftests-kmp-azure-6.12.0-160000.31.1
kselftests-kmp-default-6.12.0-160000.31.1
kselftests-kmp-rt-6.12.0-160000.31.1
ocfs2-kmp-64kb-6.12.0-160000.31.1
ocfs2-kmp-azure-6.12.0-160000.31.1
ocfs2-kmp-default-6.12.0-160000.31.1
ocfs2-kmp-rt-6.12.0-160000.31.1
References:
* https://www.suse.com/security/cve/CVE-2025-54518.html
* https://www.suse.com/security/cve/CVE-2026-46300.html
openSUSE-SU-2026:20757-1: important: Security update for openssh
openSUSE security update: security update for openssh
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20757-1
Rating: important
References:
* bsc#1252890
* bsc#1261427
* bsc#1261430
* bsc#1262555
Cross-References:
* CVE-2026-35385
* CVE-2026-35414
CVSS scores:
* CVE-2026-35385 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-35385 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-35414 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-35414 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 2 vulnerabilities and has 4 bug fixes can now be installed.
Description:
This update for openssh fixes the following issues
Security issues fixed:
- CVE-2026-35385: a file downloaded by scp may be installed setuid or setgid (bsc#1261427).
- CVE-2026-35414: mishandling of authorized_keys principals option (bsc#1261430).
Other issues fixed:
- SSH port not reachable on SLES-16.0-CHOST-BYOS since build 1.32 for both x86_64 and aarch64 (bsc#1262555).
- OpenSSH audit support causes connection lost with parallel sessions (bsc#1252890).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-752=1
Package List:
- openSUSE Leap 16.0:
openssh-10.0p2-160000.5.1
openssh-askpass-gnome-10.0p2-160000.5.1
openssh-cavs-10.0p2-160000.5.1
openssh-clients-10.0p2-160000.5.1
openssh-common-10.0p2-160000.5.1
openssh-helpers-10.0p2-160000.5.1
openssh-server-10.0p2-160000.5.1
openssh-server-config-rootlogin-10.0p2-160000.5.1
References:
* https://www.suse.com/security/cve/CVE-2026-35385.html
* https://www.suse.com/security/cve/CVE-2026-35414.html
openSUSE-SU-2026:20750-1: moderate: Security update for ibus-rime, librime
openSUSE security update: security update for ibus-rime, librime
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20750-1
Rating: moderate
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves various issues can now be installed.
Description:
This update for ibus-rime and librime fixes the following issues:
ibus-rime is built against the current opencc version.
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-744=1
Package List:
- openSUSE Leap 16.0:
ibus-rime-1.5.0-160000.1.3
librime-devel-1.10.0+git20240229.4ee471e-160000.1.3
librime-private-devel-1.10.0+git20240229.4ee471e-160000.1.3
librime1-1.10.0+git20240229.4ee471e-160000.1.3
rime-1.10.0+git20240229.4ee471e-160000.1.3
openSUSE-SU-2026:20755-1: important: Security update for openexr
openSUSE security update: security update for openexr
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20755-1
Rating: important
References:
* bsc#1264353
* bsc#1264354
* bsc#1264356
Cross-References:
* CVE-2026-41142
* CVE-2026-42216
* CVE-2026-42217
CVSS scores:
* CVE-2026-41142 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-41142 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-42216 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-42216 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-42217 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-42217 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 3 vulnerabilities and has 3 bug fixes can now be installed.
Description:
This update for openexr fixes the following issues
- CVE-2026-41142: integer overflow in `ImageChannel: resize` can lead to a heap out-of-bounds write via OpenEXRUtil
public API (bsc#1264356).
- CVE-2026-42216: missing checks in `IDManifest: init()` can lead to out-of-bounds read during prefix expansion
(bsc#1264354).
- CVE-2026-42217: missing bounds check for shift counter in `readVariableLengthInteger` can lead to shift exponent
overflow and cause undefined behavior (bsc#1264353).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-750=1
Package List:
- openSUSE Leap 16.0:
libIex-3_2-31-3.2.2-160000.8.1
libIex-3_2-31-x86-64-v3-3.2.2-160000.8.1
libIlmThread-3_2-31-3.2.2-160000.8.1
libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.8.1
libOpenEXR-3_2-31-3.2.2-160000.8.1
libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.8.1
libOpenEXRCore-3_2-31-3.2.2-160000.8.1
libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.8.1
libOpenEXRUtil-3_2-31-3.2.2-160000.8.1
libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.8.1
openexr-3.2.2-160000.8.1
openexr-devel-3.2.2-160000.8.1
openexr-doc-3.2.2-160000.8.1
References:
* https://www.suse.com/security/cve/CVE-2026-41142.html
* https://www.suse.com/security/cve/CVE-2026-42216.html
* https://www.suse.com/security/cve/CVE-2026-42217.html
openSUSE-SU-2026:20754-1: important: Security update for rsync
openSUSE security update: security update for rsync
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20754-1
Rating: important
References:
* bsc#1254441
* bsc#1262223
Cross-References:
* CVE-2025-10158
* CVE-2026-41035
CVSS scores:
* CVE-2025-10158 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-41035 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-41035 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 2 vulnerabilities and has 2 bug fixes can now be installed.
Description:
This update for rsync fixes the following issues
- CVE-2025-10158: Out of bounds array access via negative index (bsc#1254441).
- CVE-2026-41035: count of entries mismatch can lead to a use-after-free (bsc#1262223).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-749=1
Package List:
- openSUSE Leap 16.0:
rsync-3.4.1-160000.3.1
References:
* https://www.suse.com/security/cve/CVE-2025-10158.html
* https://www.suse.com/security/cve/CVE-2026-41035.html
openSUSE-SU-2026:20752-1: important: Security update for alloy
openSUSE security update: security update for alloy
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20752-1
Rating: important
References:
* bsc#1258099
* bsc#1258609
* bsc#1259919
* bsc#1260317
Cross-References:
* CVE-2026-25934
* CVE-2026-26958
* CVE-2026-33186
* CVE-2026-4427
CVSS scores:
* CVE-2026-25934 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2026-25934 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-26958 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
* CVE-2026-26958 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2026-33186 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33186 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-4427 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-4427 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 4 vulnerabilities and has 4 bug fixes can now be installed.
Description:
This update for alloy fixes the following issues
Security issues:
- CVE-2026-4427: github.com/jackc/pgproto3/v2: improper validation of field length allows a malicious PostgreSQL server
to crash a client application via a DataRow message (bsc#1259919).
- CVE-2026-25934: github.com/go-git/go-git/v5: improper verification of data integrity values for .pack and .idx files
can lead to the consumption of corrupted files (bsc#1258099).
- CVE-2026-26958: filippo.io/edwards25519: failure to initialize receiver in MultiScalarMult can produce invalid results
and lead to undefined behavior (bsc#1258609).
- CVE-2026-33186: google.golang.org/grpc: authorization bypass due to improper validation of the HTTP/2: path pseudo-
header (bsc#1260317).
Non security issue:
- Updated to 1.16.0
- Use systemd tmpfiles.d to create /var/lib/alloy hierarchy (jsc#PED-14815)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-747=1
Package List:
- openSUSE Leap 16.0:
alloy-1.16.0-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2026-25934.html
* https://www.suse.com/security/cve/CVE-2026-26958.html
* https://www.suse.com/security/cve/CVE-2026-33186.html
* https://www.suse.com/security/cve/CVE-2026-4427.html
openSUSE-SU-2026:20749-1: important: Security update for tree-sitter
openSUSE security update: security update for tree-sitter
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20749-1
Rating: important
References:
* bsc#1259205
* bsc#1261839
* bsc#1261871
* bsc#1261894
* bsc#1261954
* bsc#1261963
* bsc#1261968
* bsc#1261974
* bsc#1262007
* bsc#1262032
* bsc#1262036
* bsc#1262040
Cross-References:
* CVE-2026-34941
* CVE-2026-34942
* CVE-2026-34943
* CVE-2026-34944
* CVE-2026-34945
* CVE-2026-34946
* CVE-2026-34987
* CVE-2026-34988
* CVE-2026-35186
* CVE-2026-35195
CVSS scores:
* CVE-2026-34941 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-34941 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-34942 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-34942 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34943 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-34943 ( SUSE ): 6 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34944 ( SUSE ): 5 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-34944 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34945 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2026-34945 ( SUSE ): 7 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2026-34946 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-34987 ( SUSE ): 8.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-34987 ( SUSE ): 9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2026-34988 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2026-34988 ( SUSE ): 7 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2026-35186 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-35186 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-35195 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-35195 ( SUSE ): 6 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 10 vulnerabilities and has 12 bug fixes can now be installed.
Description:
This update for tree-sitter fixes the following issues
Security issues:
- CVE-2026-34941: wasmtime: crafted input string can lead to an out-of-bound read (bsc#1261871).
- CVE-2026-34942: wasmtime: unaligned pointers can lead to a denial of service (bsc#1261894).
- CVE-2026-34943: wasmtime: lifting `flags` component value can lead to a denial of service (bsc#1261954).
- CVE-2026-34944: wasmtime: out-of-bounds read during WebAssembly compilation can lead to a denial of service
(bsc#1261963).
- CVE-2026-34945: wasmtime: incorrectly translated table.size could lead to disclosing data (bsc#1262007).
- CVE-2026-34946: wasmtime: denial of service due to WebAssembly compilation error (bsc#1261974).
- CVE-2026-34987: wasmtime: winch compiler backend may allow a sandbox-escaping memory access (bsc#1262032).
- CVE-2026-34988: wasmtime: pooling allocator instances can cause data leakage (bsc#1261968).
- CVE-2026-35186: wasmtime: translating the table.grow operator can cause a masked return value (bsc#1262036).
- CVE-2026-35195: wasmtime: transcoding strings can lead to an out of bound write or a crash (bsc#1262040).
Changes for tree-sitter:
- update to 0.26.8:
* fix(generate): allow disabling qjs-rt feature from CLI by @WillLillis in
#5448
* fix(lib): document invariants that must be upheld for TSInputEdit by
@WillLillis in #5452
* fix(cli): correct typo in parse command's help text by @WillLillis in #5465
* perf(cli): misc. improvements by @tree-sitter-ci-bot[bot] in #5476
* Fix wasm loading of languages w/ multiple reserved word sets by
@tree-sitter-ci-bot[bot] in #5477
* generate: avoid panicking when a supertype only has hidden external token
children by @tree-sitter-ci-bot[bot] in #5478
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-743=1
Package List:
- openSUSE Leap 16.0:
libtree-sitter0_26-0.26.8-160000.1.1
libtree-sitter0_26-x86-64-v3-0.26.8-160000.1.1
tree-sitter-0.26.8-160000.1.1
tree-sitter-devel-0.26.8-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2026-34941.html
* https://www.suse.com/security/cve/CVE-2026-34942.html
* https://www.suse.com/security/cve/CVE-2026-34943.html
* https://www.suse.com/security/cve/CVE-2026-34944.html
* https://www.suse.com/security/cve/CVE-2026-34945.html
* https://www.suse.com/security/cve/CVE-2026-34946.html
* https://www.suse.com/security/cve/CVE-2026-34987.html
* https://www.suse.com/security/cve/CVE-2026-34988.html
* https://www.suse.com/security/cve/CVE-2026-35186.html
* https://www.suse.com/security/cve/CVE-2026-35195.html
openSUSE-SU-2026:20745-1: critical: Security update for php8
openSUSE security update: security update for php8
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20745-1
Rating: critical
References:
* bsc#1264769
* bsc#1264770
* bsc#1264771
* bsc#1264772
* bsc#1264773
* bsc#1264774
* bsc#1264775
* bsc#1264776
* bsc#1264777
* bsc#1264778
Cross-References:
* CVE-2025-14179
* CVE-2026-6104
* CVE-2026-6722
* CVE-2026-6735
* CVE-2026-7258
* CVE-2026-7259
* CVE-2026-7261
* CVE-2026-7262
* CVE-2026-7263
* CVE-2026-7568
CVSS scores:
* CVE-2025-14179 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-14179 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-6104 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-6104 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-6722 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-6722 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-6735 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-6735 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-7258 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-7258 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-7259 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-7259 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-7261 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-7261 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-7262 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-7262 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-7263 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-7263 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-7568 ( SUSE ): 7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-7568 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 10 vulnerabilities and has 10 bug fixes can now be installed.
Description:
This update for php8 fixes the following issues
- CVE-2025-14179: improper handling of NULL bytes by the PDO Firebird driver when preparing SQL queries can lead to SQL
injection (bsc#1264778).
- CVE-2026-6104: out-of-bounds read when processing an encoding name containing an embedded NULL byte in
`mb_convert_encoding()` can lead to information disclosure and denial of service (bsc#1264777).
- CVE-2026-6722: use-after-free in SOAP using Apache map can lead to remote code execution (bsc#1264776).
- CVE-2026-6735: improper validation of the request URI within the PHP-FPM status page can lead to XSS (bsc#1264775).
- CVE-2026-7258: signed `char` values passed to `ctype` functions like `isxdigit` can lead to OOB access and denial of
service (bsc#1264774).
- CVE-2026-7259: NULL pointer dereference in `php_mb_check_encoding()` via `mb_ereg_search_init()` can lead to a denial
of service (bsc#1264773).
- CVE-2026-7261: use-after-free due to incorrectly handled persistence of handler objects when SOAP_PERSISTENCE_SESSION
is configured can lead to memory corruption, information disclosure and process crashes (bsc#1264772).
- CVE-2026-7262: NULL pointer dereference caused by mistake in the SOAP decoding process when a typemap is configured
can lead to a denial of service (bsc#1264771).
- CVE-2026-7263: incorrect processing of XML data in the `DOMNode: C14N()` method can lead to an infinite loop and a
denial of service (bsc#1264770).
- CVE-2026-7568: integer overflow in the `metaphone` function can lead to undefined behavior and affect the availability
of the PHPprocess (bsc#1264769).
Other updates:
- Updated to 8.4.21.
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-738=1
Package List:
- openSUSE Leap 16.0:
apache2-mod_php8-8.4.21-160000.1.1
php8-8.4.21-160000.1.1
php8-bcmath-8.4.21-160000.1.1
php8-bz2-8.4.21-160000.1.1
php8-calendar-8.4.21-160000.1.1
php8-cli-8.4.21-160000.1.1
php8-ctype-8.4.21-160000.1.1
php8-curl-8.4.21-160000.1.1
php8-dba-8.4.21-160000.1.1
php8-devel-8.4.21-160000.1.1
php8-dom-8.4.21-160000.1.1
php8-embed-8.4.21-160000.1.1
php8-enchant-8.4.21-160000.1.1
php8-exif-8.4.21-160000.1.1
php8-fastcgi-8.4.21-160000.1.1
php8-ffi-8.4.21-160000.1.1
php8-fileinfo-8.4.21-160000.1.1
php8-fpm-8.4.21-160000.1.1
php8-fpm-apache-8.4.21-160000.1.1
php8-ftp-8.4.21-160000.1.1
php8-gd-8.4.21-160000.1.1
php8-gettext-8.4.21-160000.1.1
php8-gmp-8.4.21-160000.1.1
php8-iconv-8.4.21-160000.1.1
php8-intl-8.4.21-160000.1.1
php8-ldap-8.4.21-160000.1.1
php8-mbstring-8.4.21-160000.1.1
php8-mysql-8.4.21-160000.1.1
php8-odbc-8.4.21-160000.1.1
php8-opcache-8.4.21-160000.1.1
php8-openssl-8.4.21-160000.1.1
php8-pcntl-8.4.21-160000.1.1
php8-pdo-8.4.21-160000.1.1
php8-pgsql-8.4.21-160000.1.1
php8-phar-8.4.21-160000.1.1
php8-posix-8.4.21-160000.1.1
php8-readline-8.4.21-160000.1.1
php8-shmop-8.4.21-160000.1.1
php8-snmp-8.4.21-160000.1.1
php8-soap-8.4.21-160000.1.1
php8-sockets-8.4.21-160000.1.1
php8-sodium-8.4.21-160000.1.1
php8-sqlite-8.4.21-160000.1.1
php8-sysvmsg-8.4.21-160000.1.1
php8-sysvsem-8.4.21-160000.1.1
php8-sysvshm-8.4.21-160000.1.1
php8-test-8.4.21-160000.1.1
php8-tidy-8.4.21-160000.1.1
php8-tokenizer-8.4.21-160000.1.1
php8-xmlreader-8.4.21-160000.1.1
php8-xmlwriter-8.4.21-160000.1.1
php8-xsl-8.4.21-160000.1.1
php8-zip-8.4.21-160000.1.1
php8-zlib-8.4.21-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2025-14179.html
* https://www.suse.com/security/cve/CVE-2026-6104.html
* https://www.suse.com/security/cve/CVE-2026-6722.html
* https://www.suse.com/security/cve/CVE-2026-6735.html
* https://www.suse.com/security/cve/CVE-2026-7258.html
* https://www.suse.com/security/cve/CVE-2026-7259.html
* https://www.suse.com/security/cve/CVE-2026-7261.html
* https://www.suse.com/security/cve/CVE-2026-7262.html
* https://www.suse.com/security/cve/CVE-2026-7263.html
* https://www.suse.com/security/cve/CVE-2026-7568.html
openSUSE-SU-2026:20747-1: important: Security update for ImageMagick
openSUSE security update: security update for imagemagick
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20747-1
Rating: important
References:
* bsc#1259528
Cross-References:
* CVE-2026-31853
CVSS scores:
* CVE-2026-31853 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-31853 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for ImageMagick fixes the following issue
- CVE-2026-31853: heap buffer overflow leads to crash in the SFW decoder of 32-bit systems when processing extremely
large images (bsc#1259528).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-740=1
Package List:
- openSUSE Leap 16.0:
ImageMagick-7.1.2.0-160000.9.1
ImageMagick-config-7-SUSE-7.1.2.0-160000.9.1
ImageMagick-config-7-upstream-limited-7.1.2.0-160000.9.1
ImageMagick-config-7-upstream-open-7.1.2.0-160000.9.1
ImageMagick-config-7-upstream-secure-7.1.2.0-160000.9.1
ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.9.1
ImageMagick-devel-7.1.2.0-160000.9.1
ImageMagick-doc-7.1.2.0-160000.9.1
ImageMagick-extra-7.1.2.0-160000.9.1
libMagick++-7_Q16HDRI5-7.1.2.0-160000.9.1
libMagick++-devel-7.1.2.0-160000.9.1
libMagickCore-7_Q16HDRI10-7.1.2.0-160000.9.1
libMagickWand-7_Q16HDRI10-7.1.2.0-160000.9.1
perl-PerlMagick-7.1.2.0-160000.9.1
References:
* https://www.suse.com/security/cve/CVE-2026-31853.html
openSUSE-SU-2026:20743-1: important: Security update for the Linux Kernel
openSUSE security update: security update for the linux kernel
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20743-1
Rating: important
References:
* bsc#1264449
* bsc#1264450
Cross-References:
* CVE-2026-43284
* CVE-2026-43500
CVSS scores:
* CVE-2026-43284 ( SUSE ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-43500 ( SUSE ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 2 vulnerabilities and has 2 bug fixes can now be installed.
Description:
The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues
The following security issues were fixed:
Dirty Frag fixes:
- CVE-2026-43500: supported.conf: drop rxrpc completely (bsc#1264450)
- CVE-2026-43284: xfrm: esp: avoid in-place decrypt on shared skb frags (bsc#1264449).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-734=1
Package List:
- openSUSE Leap 16.0:
cluster-md-kmp-64kb-6.12.0-160000.30.1
cluster-md-kmp-azure-6.12.0-160000.30.1
cluster-md-kmp-default-6.12.0-160000.30.1
cluster-md-kmp-rt-6.12.0-160000.30.1
dlm-kmp-64kb-6.12.0-160000.30.1
dlm-kmp-azure-6.12.0-160000.30.1
dlm-kmp-default-6.12.0-160000.30.1
dlm-kmp-rt-6.12.0-160000.30.1
dtb-allwinner-6.12.0-160000.30.1
dtb-altera-6.12.0-160000.30.1
dtb-amazon-6.12.0-160000.30.1
dtb-amd-6.12.0-160000.30.1
dtb-amlogic-6.12.0-160000.30.1
dtb-apm-6.12.0-160000.30.1
dtb-apple-6.12.0-160000.30.1
dtb-arm-6.12.0-160000.30.1
dtb-broadcom-6.12.0-160000.30.1
dtb-cavium-6.12.0-160000.30.1
dtb-exynos-6.12.0-160000.30.1
dtb-freescale-6.12.0-160000.30.1
dtb-hisilicon-6.12.0-160000.30.1
dtb-lg-6.12.0-160000.30.1
dtb-marvell-6.12.0-160000.30.1
dtb-mediatek-6.12.0-160000.30.1
dtb-nvidia-6.12.0-160000.30.1
dtb-qcom-6.12.0-160000.30.1
dtb-renesas-6.12.0-160000.30.1
dtb-rockchip-6.12.0-160000.30.1
dtb-socionext-6.12.0-160000.30.1
dtb-sprd-6.12.0-160000.30.1
dtb-xilinx-6.12.0-160000.30.1
gfs2-kmp-64kb-6.12.0-160000.30.1
gfs2-kmp-azure-6.12.0-160000.30.1
gfs2-kmp-default-6.12.0-160000.30.1
gfs2-kmp-rt-6.12.0-160000.30.1
kernel-64kb-6.12.0-160000.30.1
kernel-64kb-devel-6.12.0-160000.30.1
kernel-64kb-extra-6.12.0-160000.30.1
kernel-64kb-optional-6.12.0-160000.30.1
kernel-azure-6.12.0-160000.30.1
kernel-azure-devel-6.12.0-160000.30.1
kernel-azure-extra-6.12.0-160000.30.1
kernel-azure-optional-6.12.0-160000.30.1
kernel-azure-vdso-6.12.0-160000.30.1
kernel-default-6.12.0-160000.30.1
kernel-default-base-6.12.0-160000.30.1.160000.2.11
kernel-default-devel-6.12.0-160000.30.1
kernel-default-extra-6.12.0-160000.30.1
kernel-default-optional-6.12.0-160000.30.1
kernel-default-vdso-6.12.0-160000.30.1
kernel-devel-6.12.0-160000.30.1
kernel-docs-6.12.0-160000.30.1
kernel-docs-html-6.12.0-160000.30.1
kernel-kvmsmall-6.12.0-160000.30.1
kernel-kvmsmall-devel-6.12.0-160000.30.1
kernel-kvmsmall-vdso-6.12.0-160000.30.1
kernel-macros-6.12.0-160000.30.1
kernel-obs-build-6.12.0-160000.30.1
kernel-obs-qa-6.12.0-160000.30.1
kernel-rt-6.12.0-160000.30.1
kernel-rt-devel-6.12.0-160000.30.1
kernel-rt-extra-6.12.0-160000.30.1
kernel-rt-optional-6.12.0-160000.30.1
kernel-rt-vdso-6.12.0-160000.30.1
kernel-source-6.12.0-160000.30.1
kernel-source-vanilla-6.12.0-160000.30.1
kernel-syms-6.12.0-160000.30.1
kernel-zfcpdump-6.12.0-160000.30.1
kselftests-kmp-64kb-6.12.0-160000.30.1
kselftests-kmp-azure-6.12.0-160000.30.1
kselftests-kmp-default-6.12.0-160000.30.1
kselftests-kmp-rt-6.12.0-160000.30.1
ocfs2-kmp-64kb-6.12.0-160000.30.1
ocfs2-kmp-azure-6.12.0-160000.30.1
ocfs2-kmp-default-6.12.0-160000.30.1
ocfs2-kmp-rt-6.12.0-160000.30.1
References:
* https://www.suse.com/security/cve/CVE-2026-43284.html
* https://www.suse.com/security/cve/CVE-2026-43500.html
openSUSE-SU-2026:20742-1: moderate: Security update for ongres-scram, ongres-stringprep, plexus-testing, maven, maven-doxia, mojo-parent, sisu
openSUSE security update: security update for ongres-scram, ongres-stringprep, plexus-testing, maven, maven-doxia, mojo-parent, sisu
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20742-1
Rating: moderate
References:
* bsc#1250399
Cross-References:
* CVE-2025-59432
CVSS scores:
* CVE-2025-59432 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
* CVE-2025-59432 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for ongres-scram, ongres-stringprep, plexus-testing, maven, maven-doxia, mojo-parent, sisu fixes the following issues:
Changes in ongres-scram:
- Version 3.2
* Fix Timing Attack Vulnerability in SCRAM Authentication
(bsc#1250399, CVE-2025-59432)
* Updated dependencies and maven plugins
* Use central-publishing-maven-plugin to deploy to Maven Central.
- Do not create multirelease jar if the only Java 9+ class file is
module-info.class
Changes in ongres-stringprep:
- Do not create multirelease jar if the only Java 9+ class file is
module-info.class
Changes in plexus-testing:
- The build without tests does not need the full junit5; the
junit5-minimal (built with ant) is enough
Changes in maven:
- Upgrade to upstream version 3.9.14
* Bug Fixes
+ plexus-testing dependencies should be used in test scope
- Upgrade to upstream version 3.9.13
* Bug Fixes
+ Bug: SecDispatcher is managed by legacy Plexus DI
+ [3.9.x] MavenPluginJavaPrerequisiteChecker: Handle 8/1.8
Java version in ranges as well
* Maintenance
+ Update Maven plugin versions in default-bindings.xml
+ Migrate to JUnit 5 - avoid using TestCase
Changes in maven-doxia:
Upgrade to upstream version 2.1.0:
* New features and improvements
+ Distinguish between linebreaks for formatting markup and
linebreaks in output
+ Return SinkEventAttributes instead of super class
MutableAttributeSet for filterAttributes
+ Optionally leave fragments of internal links untouched
Support strikethrough for Markdown sink
+ DOXIA-770: Only escape when necessary
+ DOXIA-760: Clarify table justification semantics and introduce
new "JUSTIFY_DEFAULT" alignment
+ DOXIA-756: Allow to customize macro execution
+ DOXIA-759: Support anchors in MarkdownSink
* Bug Fixes
+ MarkdownSink: Fix verbatim inside table cell
+ Make sure to emit metadata prior everything else
+ Convert all globally available attributes to HTML5 compliant
ones
+ Html5BaseSink: Convert non-compliant HTML5 attributes to
compliant ones
+ Support "name" attribute in "a" element still in XHTML5
+ Never emit Markdown inside HTML context
+ Use JSoup to convert HTML to XHTML after parsing with Flexmark
+ DOXIA-764: Strip leading newline after
+ DOXIA-763: Distinguish between verbatim source and non-source
in MarkdownSink
+ DOXIA-758: Consider emitComments flag in MarkdownSink
+ DOXIA-757: Don't strip leading "#" from link names
+ DOXIA-753: Do not end lists with a blank line
+ DOXIA-751: Linked inline code must be emitted in right order
+ DOXIA-749: Correctly indent and separate blocks inside list
items
+ DOXIA-750: Properly apply inlines inside HTML blocks
+ DOXIA-747: Emit headings at beginning of line for Markdown
* Documentation updates
+ Site: Convert APT to Markdown
+ Improve documentation of supported extensions
+ (doc) Fix missing references in JavaDocs
* Maintenance
+ Cleanup tests
+ JUnit Jupiter best practices
+ Remove commons-lang3 and commons-text dependencies
+ feat: enable prevent branch protection rules
+ Cleanup pom, remove redundant dependencies
+ Drop almost all usages of plexus-utils
+ Remove not used and outdated clirr-maven-plugin
+ Enable Github Issues
+ DOXIA-772: Deprecate Sink.sectionTitle() and sectionTitle_()
+ DOXIA-754: Clarify method order for nested lists
Changes in mojo-parent:
- Do not import junit-bom in the parent. This creates unnecessary
build cycles with junit5.
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-733=1
Package List:
- openSUSE Leap 16.0:
maven-3.9.14-160000.1.1
maven-doxia-core-2.1.0-160000.1.1
maven-doxia-javadoc-2.1.0-160000.1.1
maven-doxia-module-apt-2.1.0-160000.1.1
maven-doxia-module-fml-2.1.0-160000.1.1
maven-doxia-module-xdoc-2.1.0-160000.1.1
maven-doxia-module-xhtml5-2.1.0-160000.1.1
maven-doxia-sink-api-2.1.0-160000.1.1
maven-doxia-test-docs-2.1.0-160000.1.1
maven-javadoc-3.9.14-160000.1.1
maven-lib-3.9.14-160000.1.1
mojo-parent-82-160000.3.1
ongres-scram-3.2-160000.4.1
ongres-scram-client-3.2-160000.4.1
ongres-scram-javadoc-3.2-160000.4.1
ongres-stringprep-2.2-160000.3.1
ongres-stringprep-javadoc-2.2-160000.3.1
plexus-testing-2.1.0-160000.2.1
plexus-testing-javadoc-2.1.0-160000.2.1
sisu-inject-1.0.0-160000.2.1
sisu-inject-extender-1.0.0-160000.2.1
sisu-javadoc-1.0.0-160000.2.1
sisu-mojos-1.0.0-160000.2.1
sisu-mojos-javadoc-1.0.0-160000.2.1
sisu-plexus-1.0.0-160000.2.1
sisu-plexus-extender-1.0.0-160000.2.1
xmvn-4.3.0-160000.3.3
xmvn-api-4.3.0-160000.3.1
xmvn-connector-4.3.0-160000.3.1
xmvn-connector-javadoc-4.3.0-160000.3.1
xmvn-core-4.3.0-160000.3.1
xmvn-install-4.3.0-160000.3.1
xmvn-minimal-4.3.0-160000.3.3
xmvn-mojo-4.3.0-160000.3.1
xmvn-mojo-javadoc-4.3.0-160000.3.1
xmvn-parent-4.3.0-160000.3.1
xmvn-resolve-4.3.0-160000.3.1
xmvn-subst-4.3.0-160000.3.1
xmvn-tools-javadoc-4.3.0-160000.3.1
References:
* https://www.suse.com/security/cve/CVE-2025-59432.html
openSUSE-SU-2026:20737-1: moderate: Security update for python-lxml
openSUSE security update: security update for python-lxml
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20737-1
Rating: moderate
References:
* bsc#1263254
Cross-References:
* CVE-2026-41066
CVSS scores:
* CVE-2026-41066 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-41066 ( SUSE ): 6 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for python-lxml fixes the following issue
- CVE-2026-41066: Information disclosure via untrusted XML input leading to local file read (bsc#1263254).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-728=1
Package List:
- openSUSE Leap 16.0:
python-lxml-doc-5.4.0-160000.3.1
python313-lxml-5.4.0-160000.3.1
python313-lxml-devel-5.4.0-160000.3.1
References:
* https://www.suse.com/security/cve/CVE-2026-41066.html
openSUSE-SU-2026:20748-1: important: Security update for dnsmasq
openSUSE security update: security update for dnsmasq
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20748-1
Rating: important
References:
* bsc#1235517
* bsc#1235834
* bsc#1247812
* bsc#1257934
* bsc#1258251
* bsc#1262487
* bsc#1265001
* bsc#1265002
* bsc#1265003
* bsc#1265004
* bsc#1265006
Cross-References:
* CVE-2026-2291
* CVE-2026-4890
* CVE-2026-4891
* CVE-2026-4892
* CVE-2026-4893
* CVE-2026-5172
* CVE-2026-6507
CVSS scores:
* CVE-2026-2291 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-2291 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-4890 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-4891 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-4892 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-4893 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-5172 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-6507 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-6507 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 7 vulnerabilities and has 11 bug fixes can now be installed.
Description:
This update for dnsmasq fixes the following issues
Security issues:
- CVE-2026-2291: dnsmasq can be abused to record false cached data enabling DoS or attacker redirect
(bsc#1258251).
- CVE-2026-4890: DoS vulnerability in the DNSSEC validation (bsc#1265001).
- CVE-2026-4891: heap-based out-of-bounds read vulnerability in the DNSSEC validation (bsc#1265002).
- CVE-2026-4892: heap-based out-of-bounds write vulnerability in the DHCPv6 implementation (bsc#1265003).
- CVE-2026-4893: information disclosure vulnerability in dnsmasq allows remote attackers to bypass source checks
(bsc#1265004).
- CVE-2026-5172: buffer overflow in dnsmasq's extract_addresses() function (bsc#1265006).
- CVE-2026-6507: out-of-bounds write in DHCP BOOTREPLY processing can lead to denial of service (bsc#1262487).
Non security issues:
- aardvark-dns upstream tests make dnsmasq dump core (bsc#1247812).
- Drop rcFOO symlinks for CODE16 (jsc#PED-266.
- libnettle: update to 4.0 breaks dnsmasq and gnutls (bsc#1257934).
- unknown user or group: dnsmasq with latest proposed dnsmasq update when doing virsh net-start (bsc#1235517).
- Update to security release 2.92rel2.
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-742=1
Package List:
- openSUSE Leap 16.0:
dnsmasq-2.92rel2-160000.1.1
dnsmasq-utils-2.92rel2-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2026-2291.html
* https://www.suse.com/security/cve/CVE-2026-4890.html
* https://www.suse.com/security/cve/CVE-2026-4891.html
* https://www.suse.com/security/cve/CVE-2026-4892.html
* https://www.suse.com/security/cve/CVE-2026-4893.html
* https://www.suse.com/security/cve/CVE-2026-5172.html
* https://www.suse.com/security/cve/CVE-2026-6507.html
openSUSE-SU-2026:20741-1: moderate: Security update for MozillaFirefox
openSUSE security update: security update for mozillafirefox
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20741-1
Rating: moderate
References:
* bsc#1264378
Cross-References:
* CVE-2026-8090
* CVE-2026-8091
* CVE-2026-8092
* CVE-2026-8094
CVSS scores:
* CVE-2026-8090 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-8091 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-8092 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-8094 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 4 vulnerabilities and has one bug fix can now be installed.
Description:
This update for MozillaFirefox fixes the following issues
Updated to Firefox Extended Support Release 140.10.2 ESR (bsc#1264378,MFSA 2026-41):
- CVE-2026-8090: Use-after-free in the DOM: Networking component.
- CVE-2026-8091: Incorrect boundary conditions in the Audio/Video: Playback component.
- CVE-2026-8092: Memory safety bugs fixed in Firefox ESR 115.35.2, Firefox ESR 140.10.2 and Firefox 150.0.2.
- CVE-2026-8094: Other issue in the WebRTC component.
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-732=1
Package List:
- openSUSE Leap 16.0:
MozillaFirefox-140.10.2-160000.1.1
MozillaFirefox-branding-upstream-140.10.2-160000.1.1
MozillaFirefox-devel-140.10.2-160000.1.2
MozillaFirefox-translations-common-140.10.2-160000.1.1
MozillaFirefox-translations-other-140.10.2-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2026-8090.html
* https://www.suse.com/security/cve/CVE-2026-8091.html
* https://www.suse.com/security/cve/CVE-2026-8092.html
* https://www.suse.com/security/cve/CVE-2026-8094.html
openSUSE-SU-2026:10805-1: moderate: perl-HTTP-Tiny-0.094-1.1 on GA media
# perl-HTTP-Tiny-0.094-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10805-1
Rating: moderate
Cross-References:
* CVE-2026-7010
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the perl-HTTP-Tiny-0.094-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* perl-HTTP-Tiny 0.094-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-7010.html
openSUSE-SU-2026:10808-1: moderate: postgresql16-16.14-1.1 on GA media
# postgresql16-16.14-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10808-1
Rating: moderate
Cross-References:
* CVE-2026-6472
* CVE-2026-6473
* CVE-2026-6474
* CVE-2026-6475
* CVE-2026-6477
* CVE-2026-6478
* CVE-2026-6479
* CVE-2026-6637
* CVE-2026-6638
CVSS scores:
* CVE-2026-6472 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-6473 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-6474 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-6475 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-6477 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-6478 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-6479 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-6637 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-6638 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 9 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the postgresql16-16.14-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* postgresql16 16.14-1.1
* postgresql16-contrib 16.14-1.1
* postgresql16-devel 16.14-1.1
* postgresql16-docs 16.14-1.1
* postgresql16-llvmjit 16.14-1.1
* postgresql16-llvmjit-devel 16.14-1.1
* postgresql16-plperl 16.14-1.1
* postgresql16-plpython 16.14-1.1
* postgresql16-pltcl 16.14-1.1
* postgresql16-server 16.14-1.1
* postgresql16-server-devel 16.14-1.1
* postgresql16-test 16.14-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-6472.html
* https://www.suse.com/security/cve/CVE-2026-6473.html
* https://www.suse.com/security/cve/CVE-2026-6474.html
* https://www.suse.com/security/cve/CVE-2026-6475.html
* https://www.suse.com/security/cve/CVE-2026-6477.html
* https://www.suse.com/security/cve/CVE-2026-6478.html
* https://www.suse.com/security/cve/CVE-2026-6479.html
* https://www.suse.com/security/cve/CVE-2026-6637.html
* https://www.suse.com/security/cve/CVE-2026-6638.html
openSUSE-SU-2026:10806-1: moderate: postgresql14-14.23-1.1 on GA media
# postgresql14-14.23-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10806-1
Rating: moderate
Cross-References:
* CVE-2026-6472
* CVE-2026-6473
* CVE-2026-6474
* CVE-2026-6475
* CVE-2026-6477
* CVE-2026-6478
* CVE-2026-6479
* CVE-2026-6637
CVSS scores:
* CVE-2026-6472 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-6473 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-6474 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-6475 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-6477 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-6478 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-6479 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-6637 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves 8 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the postgresql14-14.23-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* postgresql14 14.23-1.1
* postgresql14-contrib 14.23-1.1
* postgresql14-devel 14.23-1.1
* postgresql14-docs 14.23-1.1
* postgresql14-llvmjit 14.23-1.1
* postgresql14-llvmjit-devel 14.23-1.1
* postgresql14-plperl 14.23-1.1
* postgresql14-plpython 14.23-1.1
* postgresql14-pltcl 14.23-1.1
* postgresql14-server 14.23-1.1
* postgresql14-server-devel 14.23-1.1
* postgresql14-test 14.23-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-6472.html
* https://www.suse.com/security/cve/CVE-2026-6473.html
* https://www.suse.com/security/cve/CVE-2026-6474.html
* https://www.suse.com/security/cve/CVE-2026-6475.html
* https://www.suse.com/security/cve/CVE-2026-6477.html
* https://www.suse.com/security/cve/CVE-2026-6478.html
* https://www.suse.com/security/cve/CVE-2026-6479.html
* https://www.suse.com/security/cve/CVE-2026-6637.html
openSUSE-SU-2026:10810-1: moderate: traefik-3.6.17-1.1 on GA media
# traefik-3.6.17-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10810-1
Rating: moderate
Cross-References:
* CVE-2026-44774
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the traefik-3.6.17-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* traefik 3.6.17-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-44774.html
openSUSE-SU-2026:10804-1: moderate: openssh-10.3p1-4.1 on GA media
# openssh-10.3p1-4.1 on GA media
Announcement ID: openSUSE-SU-2026:10804-1
Rating: moderate
Cross-References:
* CVE-2026-35385
* CVE-2026-35414
CVSS scores:
* CVE-2026-35385 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-35385 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-35414 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-35414 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the openssh-10.3p1-4.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* openssh 10.3p1-4.1
* openssh-cavs 10.3p1-4.1
* openssh-clients 10.3p1-4.1
* openssh-common 10.3p1-4.1
* openssh-helpers 10.3p1-4.1
* openssh-server 10.3p1-4.1
* openssh-server-config-rootlogin 10.3p1-4.1
## References:
* https://www.suse.com/security/cve/CVE-2026-35385.html
* https://www.suse.com/security/cve/CVE-2026-35414.html
SUSE-SU-2026:1999-1: important: Security update for postgresql15
# Security update for postgresql15
Announcement ID: SUSE-SU-2026:1999-1
Release Date: 2026-05-19T08:19:36Z
Rating: important
References:
* bsc#1263804
* bsc#1265172
* bsc#1265173
* bsc#1265174
* bsc#1265175
* bsc#1265177
* bsc#1265178
* bsc#1265179
* bsc#1265181
* jsc#PED-14823
Cross-References:
* CVE-2026-6472
* CVE-2026-6473
* CVE-2026-6474
* CVE-2026-6475
* CVE-2026-6477
* CVE-2026-6478
* CVE-2026-6479
* CVE-2026-6637
CVSS scores:
* CVE-2026-6472 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-6472 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-6473 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-6473 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-6474 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-6474 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-6475 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-6475 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-6477 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-6477 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-6478 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-6478 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-6479 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-6479 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-6637 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-6637 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Legacy Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves eight vulnerabilities, contains one feature and has one
security fix can now be installed.
## Description:
This update for postgresql15 fixes the following issues
Update to version 15.18.
Security issues:
* CVE-2026-6472: ensure the user has CREATE privilege on the schema specified
(bsc#1265172).
* CVE-2026-6473: integer overflows in memory-allocation calculations
(bsc#1265173).
* CVE-2026-6474: Guard against malicious time zone names (bsc#1265174).
* CVE-2026-6475: Prevent path traversal in pg_basebackup and pg_rewind
(bsc#1265175).
* CVE-2026-6477: Mark PQfn() as unsafe, and avoid using it within libpq
(bsc#1265177).
* CVE-2026-6478: Use timing-safe string comparisons in authentication code
(bsc#1265178).
* CVE-2026-6479: Prevent unbounded recursion while processing startup packets
(bsc#1265179).
* CVE-2026-6637: Prevent SQL injection and buffer overruns in contrib/spi
(bsc#1265181).
Non security issue:
* Get rid of update-alternatives for openSUSE/SLE 16.0 and newer to support
immutable systems and transactional updates (jsc#PED-14823).
* /usr/bin/pg_config is missing after migrating away from update-alternatives
(bsc#1263804).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1999=1
* Legacy Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2026-1999=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1999=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1999=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* postgresql15-server-debuginfo-15.18-150600.16.31.1
* postgresql15-llvmjit-debuginfo-15.18-150600.16.31.1
* postgresql15-test-15.18-150600.16.31.1
* postgresql15-plpython-debuginfo-15.18-150600.16.31.1
* postgresql15-server-devel-debuginfo-15.18-150600.16.31.1
* postgresql15-pltcl-debuginfo-15.18-150600.16.31.1
* postgresql15-plpython-15.18-150600.16.31.1
* postgresql15-debugsource-15.18-150600.16.31.1
* postgresql15-server-15.18-150600.16.31.1
* postgresql15-15.18-150600.16.31.1
* postgresql15-debuginfo-15.18-150600.16.31.1
* postgresql15-plperl-debuginfo-15.18-150600.16.31.1
* postgresql15-devel-15.18-150600.16.31.1
* postgresql15-pltcl-15.18-150600.16.31.1
* postgresql15-contrib-debuginfo-15.18-150600.16.31.1
* postgresql15-devel-debuginfo-15.18-150600.16.31.1
* postgresql15-contrib-15.18-150600.16.31.1
* postgresql15-server-devel-15.18-150600.16.31.1
* postgresql15-plperl-15.18-150600.16.31.1
* postgresql15-llvmjit-15.18-150600.16.31.1
* postgresql15-llvmjit-devel-15.18-150600.16.31.1
* openSUSE Leap 15.6 (noarch)
* postgresql15-docs-15.18-150600.16.31.1
* Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* postgresql15-server-debuginfo-15.18-150600.16.31.1
* postgresql15-server-15.18-150600.16.31.1
* postgresql15-devel-15.18-150600.16.31.1
* postgresql15-plperl-debuginfo-15.18-150600.16.31.1
* postgresql15-pltcl-15.18-150600.16.31.1
* postgresql15-plpython-debuginfo-15.18-150600.16.31.1
* postgresql15-15.18-150600.16.31.1
* postgresql15-contrib-debuginfo-15.18-150600.16.31.1
* postgresql15-devel-debuginfo-15.18-150600.16.31.1
* postgresql15-server-devel-debuginfo-15.18-150600.16.31.1
* postgresql15-contrib-15.18-150600.16.31.1
* postgresql15-pltcl-debuginfo-15.18-150600.16.31.1
* postgresql15-server-devel-15.18-150600.16.31.1
* postgresql15-plpython-15.18-150600.16.31.1
* postgresql15-debuginfo-15.18-150600.16.31.1
* postgresql15-plperl-15.18-150600.16.31.1
* postgresql15-debugsource-15.18-150600.16.31.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* postgresql15-server-debuginfo-15.18-150600.16.31.1
* postgresql15-server-15.18-150600.16.31.1
* postgresql15-devel-15.18-150600.16.31.1
* postgresql15-plperl-debuginfo-15.18-150600.16.31.1
* postgresql15-pltcl-15.18-150600.16.31.1
* postgresql15-plpython-debuginfo-15.18-150600.16.31.1
* postgresql15-15.18-150600.16.31.1
* postgresql15-contrib-debuginfo-15.18-150600.16.31.1
* postgresql15-devel-debuginfo-15.18-150600.16.31.1
* postgresql15-server-devel-debuginfo-15.18-150600.16.31.1
* postgresql15-contrib-15.18-150600.16.31.1
* postgresql15-pltcl-debuginfo-15.18-150600.16.31.1
* postgresql15-server-devel-15.18-150600.16.31.1
* postgresql15-plpython-15.18-150600.16.31.1
* postgresql15-debuginfo-15.18-150600.16.31.1
* postgresql15-plperl-15.18-150600.16.31.1
* postgresql15-debugsource-15.18-150600.16.31.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* postgresql15-docs-15.18-150600.16.31.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* postgresql15-server-debuginfo-15.18-150600.16.31.1
* postgresql15-server-15.18-150600.16.31.1
* postgresql15-devel-15.18-150600.16.31.1
* postgresql15-plperl-debuginfo-15.18-150600.16.31.1
* postgresql15-pltcl-15.18-150600.16.31.1
* postgresql15-plpython-debuginfo-15.18-150600.16.31.1
* postgresql15-15.18-150600.16.31.1
* postgresql15-contrib-debuginfo-15.18-150600.16.31.1
* postgresql15-devel-debuginfo-15.18-150600.16.31.1
* postgresql15-server-devel-debuginfo-15.18-150600.16.31.1
* postgresql15-contrib-15.18-150600.16.31.1
* postgresql15-pltcl-debuginfo-15.18-150600.16.31.1
* postgresql15-server-devel-15.18-150600.16.31.1
* postgresql15-plpython-15.18-150600.16.31.1
* postgresql15-debuginfo-15.18-150600.16.31.1
* postgresql15-plperl-15.18-150600.16.31.1
* postgresql15-debugsource-15.18-150600.16.31.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* postgresql15-docs-15.18-150600.16.31.1
## References:
* https://www.suse.com/security/cve/CVE-2026-6472.html
* https://www.suse.com/security/cve/CVE-2026-6473.html
* https://www.suse.com/security/cve/CVE-2026-6474.html
* https://www.suse.com/security/cve/CVE-2026-6475.html
* https://www.suse.com/security/cve/CVE-2026-6477.html
* https://www.suse.com/security/cve/CVE-2026-6478.html
* https://www.suse.com/security/cve/CVE-2026-6479.html
* https://www.suse.com/security/cve/CVE-2026-6637.html
* https://bugzilla.suse.com/show_bug.cgi?id=1263804
* https://bugzilla.suse.com/show_bug.cgi?id=1265172
* https://bugzilla.suse.com/show_bug.cgi?id=1265173
* https://bugzilla.suse.com/show_bug.cgi?id=1265174
* https://bugzilla.suse.com/show_bug.cgi?id=1265175
* https://bugzilla.suse.com/show_bug.cgi?id=1265177
* https://bugzilla.suse.com/show_bug.cgi?id=1265178
* https://bugzilla.suse.com/show_bug.cgi?id=1265179
* https://bugzilla.suse.com/show_bug.cgi?id=1265181
* https://jira.suse.com/browse/PED-14823
SUSE-SU-2026:2003-1: moderate: Security update for GraphicsMagick
# Security update for GraphicsMagick
Announcement ID: SUSE-SU-2026:2003-1
Release Date: 2026-05-19T08:22:18Z
Rating: moderate
References:
* bsc#1265048
Cross-References:
* CVE-2026-42050
CVSS scores:
* CVE-2026-42050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-42050 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for GraphicsMagick fixes the following issue
* CVE-2026-42050: Stack buffer overflow in XTileImage (bsc#1265048).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-2003=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-2003=1
## Package List:
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
* libGraphicsMagick++-devel-1.3.42-150600.3.24.1
* GraphicsMagick-devel-1.3.42-150600.3.24.1
* libGraphicsMagick++-Q16-12-1.3.42-150600.3.24.1
* GraphicsMagick-debuginfo-1.3.42-150600.3.24.1
* GraphicsMagick-debugsource-1.3.42-150600.3.24.1
* libGraphicsMagick++-Q16-12-debuginfo-1.3.42-150600.3.24.1
* libGraphicsMagickWand-Q16-2-debuginfo-1.3.42-150600.3.24.1
* perl-GraphicsMagick-1.3.42-150600.3.24.1
* libGraphicsMagick3-config-1.3.42-150600.3.24.1
* perl-GraphicsMagick-debuginfo-1.3.42-150600.3.24.1
* libGraphicsMagickWand-Q16-2-1.3.42-150600.3.24.1
* libGraphicsMagick-Q16-3-debuginfo-1.3.42-150600.3.24.1
* libGraphicsMagick-Q16-3-1.3.42-150600.3.24.1
* GraphicsMagick-1.3.42-150600.3.24.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libGraphicsMagick++-devel-1.3.42-150600.3.24.1
* GraphicsMagick-devel-1.3.42-150600.3.24.1
* libGraphicsMagick++-Q16-12-1.3.42-150600.3.24.1
* GraphicsMagick-debuginfo-1.3.42-150600.3.24.1
* GraphicsMagick-debugsource-1.3.42-150600.3.24.1
* libGraphicsMagick++-Q16-12-debuginfo-1.3.42-150600.3.24.1
* libGraphicsMagickWand-Q16-2-debuginfo-1.3.42-150600.3.24.1
* perl-GraphicsMagick-1.3.42-150600.3.24.1
* libGraphicsMagick3-config-1.3.42-150600.3.24.1
* perl-GraphicsMagick-debuginfo-1.3.42-150600.3.24.1
* libGraphicsMagickWand-Q16-2-1.3.42-150600.3.24.1
* libGraphicsMagick-Q16-3-debuginfo-1.3.42-150600.3.24.1
* libGraphicsMagick-Q16-3-1.3.42-150600.3.24.1
* GraphicsMagick-1.3.42-150600.3.24.1
## References:
* https://www.suse.com/security/cve/CVE-2026-42050.html
* https://bugzilla.suse.com/show_bug.cgi?id=1265048
SUSE-SU-2026:2001-1: important: Security update for postgresql16
# Security update for postgresql16
Announcement ID: SUSE-SU-2026:2001-1
Release Date: 2026-05-19T08:21:21Z
Rating: important
References:
* bsc#1263804
* bsc#1265172
* bsc#1265173
* bsc#1265174
* bsc#1265175
* bsc#1265177
* bsc#1265178
* bsc#1265179
* bsc#1265181
* bsc#1265182
* jsc#PED-14824
Cross-References:
* CVE-2026-6472
* CVE-2026-6473
* CVE-2026-6474
* CVE-2026-6475
* CVE-2026-6477
* CVE-2026-6478
* CVE-2026-6479
* CVE-2026-6637
* CVE-2026-6638
CVSS scores:
* CVE-2026-6472 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-6472 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-6473 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-6473 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-6474 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-6474 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-6475 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-6475 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-6477 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-6477 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-6478 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-6478 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-6479 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-6479 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-6637 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-6637 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-6638 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
* CVE-2026-6638 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
* CVE-2026-6638 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Legacy Module 15-SP7
* openSUSE Leap 15.6
* Server Applications Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7
An update that solves nine vulnerabilities, contains one feature and has one
security fix can now be installed.
## Description:
This update for postgresql16 fixes the following issues
Update to version 16.13.
Security issues:
* CVE-2026-6472: ensure the user has CREATE privilege on the schema specified
(bsc#1265172).
* CVE-2026-6473: integer overflows in memory-allocation calculations
(bsc#1265173).
* CVE-2026-6474: Guard against malicious time zone names (bsc#1265174).
* CVE-2026-6475: Prevent path traversal in pg_basebackup and pg_rewind
(bsc#1265175).
* CVE-2026-6477: Mark PQfn() as unsafe, and avoid using it within libpq
(bsc#1265177).
* CVE-2026-6478: Use timing-safe string comparisons in authentication code
(bsc#1265178).
* CVE-2026-6479: Prevent unbounded recursion while processing startup packets
(bsc#1265179).
* CVE-2026-6637: Prevent SQL injection and buffer overruns in contrib/spi
(bsc#1265181).
* CVE-2026-6638: Properly quote object names in logical replication origin
checks (bsc#1265182).
Non security issue:
* Get rid of update-alternatives for openSUSE/SLE 16.0 and newer to support
immutable systems and transactional updates (jsc#PED-14824).
* /usr/bin/pg_config is missing after migrating away from update-alternatives
(bsc#1263804).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-2001=1
* Server Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-2001=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-2001=1
* Legacy Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2026-2001=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-2001=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-2001=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* postgresql16-pltcl-16.14-150600.16.33.1
* postgresql16-devel-debuginfo-16.14-150600.16.33.1
* postgresql16-server-devel-16.14-150600.16.33.1
* postgresql16-contrib-16.14-150600.16.33.1
* postgresql16-16.14-150600.16.33.1
* postgresql16-server-16.14-150600.16.33.1
* postgresql16-server-devel-debuginfo-16.14-150600.16.33.1
* postgresql16-contrib-debuginfo-16.14-150600.16.33.1
* postgresql16-server-debuginfo-16.14-150600.16.33.1
* postgresql16-llvmjit-devel-16.14-150600.16.33.1
* postgresql16-plpython-debuginfo-16.14-150600.16.33.1
* postgresql16-devel-16.14-150600.16.33.1
* postgresql16-test-16.14-150600.16.33.1
* postgresql16-pltcl-debuginfo-16.14-150600.16.33.1
* postgresql16-plperl-16.14-150600.16.33.1
* postgresql16-plperl-debuginfo-16.14-150600.16.33.1
* postgresql16-llvmjit-debuginfo-16.14-150600.16.33.1
* postgresql16-debuginfo-16.14-150600.16.33.1
* postgresql16-llvmjit-16.14-150600.16.33.1
* postgresql16-plpython-16.14-150600.16.33.1
* postgresql16-debugsource-16.14-150600.16.33.1
* openSUSE Leap 15.6 (noarch)
* postgresql16-docs-16.14-150600.16.33.1
* Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* postgresql16-server-16.14-150600.16.33.1
* postgresql16-debuginfo-16.14-150600.16.33.1
* postgresql16-server-devel-16.14-150600.16.33.1
* postgresql16-server-debuginfo-16.14-150600.16.33.1
* postgresql16-debugsource-16.14-150600.16.33.1
* postgresql16-16.14-150600.16.33.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* postgresql16-debuginfo-16.14-150600.16.33.1
* postgresql16-server-16.14-150600.16.33.1
* postgresql16-contrib-debuginfo-16.14-150600.16.33.1
* postgresql16-server-devel-debuginfo-16.14-150600.16.33.1
* postgresql16-devel-16.14-150600.16.33.1
* postgresql16-pltcl-16.14-150600.16.33.1
* postgresql16-devel-debuginfo-16.14-150600.16.33.1
* postgresql16-pltcl-debuginfo-16.14-150600.16.33.1
* postgresql16-server-devel-16.14-150600.16.33.1
* postgresql16-contrib-16.14-150600.16.33.1
* postgresql16-server-debuginfo-16.14-150600.16.33.1
* postgresql16-plpython-debuginfo-16.14-150600.16.33.1
* postgresql16-plperl-16.14-150600.16.33.1
* postgresql16-debugsource-16.14-150600.16.33.1
* postgresql16-16.14-150600.16.33.1
* postgresql16-plperl-debuginfo-16.14-150600.16.33.1
* postgresql16-plpython-16.14-150600.16.33.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* postgresql16-docs-16.14-150600.16.33.1
* Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* postgresql16-debuginfo-16.14-150600.16.33.1
* postgresql16-contrib-debuginfo-16.14-150600.16.33.1
* postgresql16-devel-16.14-150600.16.33.1
* postgresql16-devel-debuginfo-16.14-150600.16.33.1
* postgresql16-contrib-16.14-150600.16.33.1
* postgresql16-debugsource-16.14-150600.16.33.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* postgresql16-debuginfo-16.14-150600.16.33.1
* postgresql16-server-16.14-150600.16.33.1
* postgresql16-contrib-debuginfo-16.14-150600.16.33.1
* postgresql16-server-devel-debuginfo-16.14-150600.16.33.1
* postgresql16-devel-16.14-150600.16.33.1
* postgresql16-pltcl-16.14-150600.16.33.1
* postgresql16-devel-debuginfo-16.14-150600.16.33.1
* postgresql16-pltcl-debuginfo-16.14-150600.16.33.1
* postgresql16-server-devel-16.14-150600.16.33.1
* postgresql16-contrib-16.14-150600.16.33.1
* postgresql16-server-debuginfo-16.14-150600.16.33.1
* postgresql16-plpython-debuginfo-16.14-150600.16.33.1
* postgresql16-plperl-16.14-150600.16.33.1
* postgresql16-debugsource-16.14-150600.16.33.1
* postgresql16-16.14-150600.16.33.1
* postgresql16-plperl-debuginfo-16.14-150600.16.33.1
* postgresql16-plpython-16.14-150600.16.33.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* postgresql16-docs-16.14-150600.16.33.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
* postgresql16-debuginfo-16.14-150600.16.33.1
* postgresql16-llvmjit-16.14-150600.16.33.1
* postgresql16-test-16.14-150600.16.33.1
* postgresql16-llvmjit-devel-16.14-150600.16.33.1
* postgresql16-debugsource-16.14-150600.16.33.1
* postgresql16-llvmjit-debuginfo-16.14-150600.16.33.1
## References:
* https://www.suse.com/security/cve/CVE-2026-6472.html
* https://www.suse.com/security/cve/CVE-2026-6473.html
* https://www.suse.com/security/cve/CVE-2026-6474.html
* https://www.suse.com/security/cve/CVE-2026-6475.html
* https://www.suse.com/security/cve/CVE-2026-6477.html
* https://www.suse.com/security/cve/CVE-2026-6478.html
* https://www.suse.com/security/cve/CVE-2026-6479.html
* https://www.suse.com/security/cve/CVE-2026-6637.html
* https://www.suse.com/security/cve/CVE-2026-6638.html
* https://bugzilla.suse.com/show_bug.cgi?id=1263804
* https://bugzilla.suse.com/show_bug.cgi?id=1265172
* https://bugzilla.suse.com/show_bug.cgi?id=1265173
* https://bugzilla.suse.com/show_bug.cgi?id=1265174
* https://bugzilla.suse.com/show_bug.cgi?id=1265175
* https://bugzilla.suse.com/show_bug.cgi?id=1265177
* https://bugzilla.suse.com/show_bug.cgi?id=1265178
* https://bugzilla.suse.com/show_bug.cgi?id=1265179
* https://bugzilla.suse.com/show_bug.cgi?id=1265181
* https://bugzilla.suse.com/show_bug.cgi?id=1265182
* https://jira.suse.com/browse/PED-14824
SUSE-SU-2026:2004-1: important: Security update for python-Pillow
# Security update for python-Pillow
Announcement ID: SUSE-SU-2026:2004-1
Release Date: 2026-05-19T08:23:00Z
Rating: important
References:
* bsc#1265359
Cross-References:
* CVE-2026-42308
CVSS scores:
* CVE-2026-42308 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-42308 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-42308 ( NVD ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for python-Pillow fixes the following issue
* CVE-2026-42308: integer overflow in font processing can lead to denial of
service (bsc#1265359).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-2004=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-2004=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python3-Pillow-tk-7.2.0-150300.3.24.1
* python-Pillow-debuginfo-7.2.0-150300.3.24.1
* python3-Pillow-tk-debuginfo-7.2.0-150300.3.24.1
* python3-Pillow-7.2.0-150300.3.24.1
* python3-Pillow-debuginfo-7.2.0-150300.3.24.1
* python-Pillow-debugsource-7.2.0-150300.3.24.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
* python-Pillow-debugsource-7.2.0-150300.3.24.1
* python3-Pillow-7.2.0-150300.3.24.1
* python3-Pillow-debuginfo-7.2.0-150300.3.24.1
* python-Pillow-debuginfo-7.2.0-150300.3.24.1
## References:
* https://www.suse.com/security/cve/CVE-2026-42308.html
* https://bugzilla.suse.com/show_bug.cgi?id=1265359
SUSE-SU-2026:2008-1: important: Security update for haveged
# Security update for haveged
Announcement ID: SUSE-SU-2026:2008-1
Release Date: 2026-05-19T11:55:08Z
Rating: important
References:
* bsc#1264086
Cross-References:
* CVE-2026-41054
CVSS scores:
* CVE-2026-41054 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for haveged fixes the following issue
* CVE-2026-41054: missing exit out of permission check could lead to root
exploit (bsc#1264086).
Changes for haveged:
* Improvements on the linux kernel random subsystem have made move forward to
socket communication within private network
* Fix "stop" of service, the daemon in foreground actually see daemon(7) for
the rationale. Only "simple" (default) and the help of udev, as starting
services while starved of entropy
* Add ppc64le support
* update to 1.8
* Correct additional run-time test aligment problems on mips.
* haveged 1.7a
* Correct VPATH issues and modify check target to support parallel builds and
changes in automake 1.13 test harness.
* Remove all sysvinit compatibility.
* fix powerpc detection
* Current version does support ARM, remove the ExcludeArch need network and
can use PrivateNetwork=yes
* Add online tests based on AIS-31
* Fix install target, move to bin and eliminate script if not daemon, now use
sysv and systemd templates
* use -F with no arguments in haveged.service
* build with -fpie
* Use Service type "simple" in systemd unit
* fix build on ia64, s390, s390x
* fix ppc64 build present in old versions have been fixed in different ways.
* run spec cleaner
* Link with full RELRO (-Wl,-z,relro,-z,now)
* add systemd support
* Drop as much capabilitites as possible using libcap-ng
* I meant Enhances not Supplements
* Implement hack to start by default only in VMs
* use O_CLOEXEC on fds
* add proper Requires(pre)
* add a SUSE standard init script
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-2008=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-2008=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-2008=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-2008=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-2008=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-2008=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-2008=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-2008=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-2008=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-2008=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-2008=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-2008=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-2008=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-2008=1
## Package List:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libhavege2-1.9.14-150400.3.11.1
* haveged-1.9.14-150400.3.11.1
* haveged-devel-1.9.14-150400.3.11.1
* haveged-debuginfo-1.9.14-150400.3.11.1
* haveged-debugsource-1.9.14-150400.3.11.1
* libhavege2-debuginfo-1.9.14-150400.3.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libhavege2-1.9.14-150400.3.11.1
* libhavege2-debuginfo-1.9.14-150400.3.11.1
* haveged-1.9.14-150400.3.11.1
* haveged-devel-1.9.14-150400.3.11.1
* haveged-debuginfo-1.9.14-150400.3.11.1
* haveged-debugsource-1.9.14-150400.3.11.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libhavege2-1.9.14-150400.3.11.1
* libhavege2-debuginfo-1.9.14-150400.3.11.1
* haveged-1.9.14-150400.3.11.1
* haveged-devel-1.9.14-150400.3.11.1
* haveged-debuginfo-1.9.14-150400.3.11.1
* haveged-debugsource-1.9.14-150400.3.11.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libhavege2-1.9.14-150400.3.11.1
* haveged-1.9.14-150400.3.11.1
* haveged-debuginfo-1.9.14-150400.3.11.1
* haveged-debugsource-1.9.14-150400.3.11.1
* libhavege2-debuginfo-1.9.14-150400.3.11.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libhavege2-1.9.14-150400.3.11.1
* haveged-1.9.14-150400.3.11.1
* haveged-debuginfo-1.9.14-150400.3.11.1
* haveged-debugsource-1.9.14-150400.3.11.1
* libhavege2-debuginfo-1.9.14-150400.3.11.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libhavege2-1.9.14-150400.3.11.1
* haveged-1.9.14-150400.3.11.1
* haveged-debuginfo-1.9.14-150400.3.11.1
* haveged-debugsource-1.9.14-150400.3.11.1
* libhavege2-debuginfo-1.9.14-150400.3.11.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libhavege2-1.9.14-150400.3.11.1
* haveged-1.9.14-150400.3.11.1
* haveged-debuginfo-1.9.14-150400.3.11.1
* haveged-debugsource-1.9.14-150400.3.11.1
* libhavege2-debuginfo-1.9.14-150400.3.11.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libhavege2-1.9.14-150400.3.11.1
* haveged-1.9.14-150400.3.11.1
* haveged-debuginfo-1.9.14-150400.3.11.1
* haveged-debugsource-1.9.14-150400.3.11.1
* libhavege2-debuginfo-1.9.14-150400.3.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libhavege2-1.9.14-150400.3.11.1
* haveged-1.9.14-150400.3.11.1
* haveged-devel-1.9.14-150400.3.11.1
* haveged-debuginfo-1.9.14-150400.3.11.1
* haveged-debugsource-1.9.14-150400.3.11.1
* libhavege2-debuginfo-1.9.14-150400.3.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libhavege2-1.9.14-150400.3.11.1
* libhavege2-debuginfo-1.9.14-150400.3.11.1
* haveged-1.9.14-150400.3.11.1
* haveged-devel-1.9.14-150400.3.11.1
* haveged-debuginfo-1.9.14-150400.3.11.1
* haveged-debugsource-1.9.14-150400.3.11.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libhavege2-1.9.14-150400.3.11.1
* libhavege2-debuginfo-1.9.14-150400.3.11.1
* haveged-1.9.14-150400.3.11.1
* haveged-devel-1.9.14-150400.3.11.1
* haveged-debuginfo-1.9.14-150400.3.11.1
* haveged-debugsource-1.9.14-150400.3.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libhavege2-1.9.14-150400.3.11.1
* libhavege2-debuginfo-1.9.14-150400.3.11.1
* haveged-1.9.14-150400.3.11.1
* haveged-devel-1.9.14-150400.3.11.1
* haveged-debuginfo-1.9.14-150400.3.11.1
* haveged-debugsource-1.9.14-150400.3.11.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libhavege2-1.9.14-150400.3.11.1
* libhavege2-debuginfo-1.9.14-150400.3.11.1
* haveged-1.9.14-150400.3.11.1
* haveged-devel-1.9.14-150400.3.11.1
* haveged-debuginfo-1.9.14-150400.3.11.1
* haveged-debugsource-1.9.14-150400.3.11.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libhavege2-1.9.14-150400.3.11.1
* libhavege2-debuginfo-1.9.14-150400.3.11.1
* haveged-1.9.14-150400.3.11.1
* haveged-devel-1.9.14-150400.3.11.1
* haveged-debuginfo-1.9.14-150400.3.11.1
* haveged-debugsource-1.9.14-150400.3.11.1
## References:
* https://www.suse.com/security/cve/CVE-2026-41054.html
* https://bugzilla.suse.com/show_bug.cgi?id=1264086
SUSE-SU-2026:2010-1: important: Security update for erlang26
# Security update for erlang26
Announcement ID: SUSE-SU-2026:2010-1
Release Date: 2026-05-19T11:56:06Z
Rating: important
References:
* bsc#1258663
* bsc#1259681
* bsc#1259682
* bsc#1259687
* bsc#1261728
* bsc#1262503
* jsc#PED-15166
Cross-References:
* CVE-2026-21620
* CVE-2026-23941
* CVE-2026-23942
* CVE-2026-23943
* CVE-2026-28808
* CVE-2026-32147
CVSS scores:
* CVE-2026-21620 ( SUSE ): 7.6
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-21620 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-21620 ( NVD ): 2.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23941 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23941 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-23941 ( NVD ): 7.0
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23942 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23942 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-23942 ( NVD ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23943 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-23943 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-23943 ( NVD ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-28808 ( SUSE ): 9.1
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-28808 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-28808 ( NVD ): 8.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-28808 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-32147 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-32147 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-32147 ( NVD ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* openSUSE Leap 15.3
* Server Applications Module 15-SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves six vulnerabilities and contains one feature can now be
installed.
## Description:
This update for erlang26 fixes the following issues
Security issues:
* CVE-2026-21620: remote arbitrary read/write via TFTP relative path traversal
(bsc#1258663).
* CVE-2026-23941: HTTP Request Smuggling in Erlang OTP (bsc#1259687).
* CVE-2026-23942: path traversal vulnerability in Erlang OTP (bsc#1259681).
* CVE-2026-23943: denial of service due to improper handling of highly
compressed data in Erlang OTP ssh (bsc#1259682).
* CVE-2026-28808: incorrect authorization can lead to unauthenticated access
to protected CGI scripts (bsc#1261728).
* CVE-2026-32147: Improper Limitation of a Pathname to a Restricted Directory
('Path Traversal') in SFTP chroot (bsc#1262503).
Non security issue:
* Fixes for FIPS mode (jsc#PED-15166.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-2010=1
* Server Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-2010=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-2010=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-2010=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* erlang26-diameter-src-26.2.1-150300.7.25.1
* erlang26-et-src-26.2.1-150300.7.25.1
* erlang26-diameter-26.2.1-150300.7.25.1
* erlang26-observer-src-26.2.1-150300.7.25.1
* erlang26-debugger-src-26.2.1-150300.7.25.1
* erlang26-reltool-src-26.2.1-150300.7.25.1
* erlang26-dialyzer-debuginfo-26.2.1-150300.7.25.1
* erlang26-jinterface-src-26.2.1-150300.7.25.1
* erlang26-src-26.2.1-150300.7.25.1
* erlang26-dialyzer-26.2.1-150300.7.25.1
* erlang26-debugger-26.2.1-150300.7.25.1
* erlang26-et-26.2.1-150300.7.25.1
* erlang26-reltool-26.2.1-150300.7.25.1
* erlang26-dialyzer-src-26.2.1-150300.7.25.1
* erlang26-wx-debuginfo-26.2.1-150300.7.25.1
* erlang26-debuginfo-26.2.1-150300.7.25.1
* erlang26-debugsource-26.2.1-150300.7.25.1
* erlang26-doc-26.2.1-150300.7.25.1
* erlang26-epmd-debuginfo-26.2.1-150300.7.25.1
* erlang26-epmd-26.2.1-150300.7.25.1
* erlang26-jinterface-26.2.1-150300.7.25.1
* erlang26-26.2.1-150300.7.25.1
* erlang26-wx-26.2.1-150300.7.25.1
* erlang26-wx-src-26.2.1-150300.7.25.1
* erlang26-observer-26.2.1-150300.7.25.1
* Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* erlang26-26.2.1-150300.7.25.1
* erlang26-epmd-26.2.1-150300.7.25.1
* erlang26-debuginfo-26.2.1-150300.7.25.1
* erlang26-debugsource-26.2.1-150300.7.25.1
* erlang26-epmd-debuginfo-26.2.1-150300.7.25.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* erlang26-26.2.1-150300.7.25.1
* erlang26-epmd-26.2.1-150300.7.25.1
* erlang26-debuginfo-26.2.1-150300.7.25.1
* erlang26-debugsource-26.2.1-150300.7.25.1
* erlang26-epmd-debuginfo-26.2.1-150300.7.25.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* erlang26-26.2.1-150300.7.25.1
* erlang26-epmd-26.2.1-150300.7.25.1
* erlang26-debuginfo-26.2.1-150300.7.25.1
* erlang26-debugsource-26.2.1-150300.7.25.1
* erlang26-epmd-debuginfo-26.2.1-150300.7.25.1
## References:
* https://www.suse.com/security/cve/CVE-2026-21620.html
* https://www.suse.com/security/cve/CVE-2026-23941.html
* https://www.suse.com/security/cve/CVE-2026-23942.html
* https://www.suse.com/security/cve/CVE-2026-23943.html
* https://www.suse.com/security/cve/CVE-2026-28808.html
* https://www.suse.com/security/cve/CVE-2026-32147.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258663
* https://bugzilla.suse.com/show_bug.cgi?id=1259681
* https://bugzilla.suse.com/show_bug.cgi?id=1259682
* https://bugzilla.suse.com/show_bug.cgi?id=1259687
* https://bugzilla.suse.com/show_bug.cgi?id=1261728
* https://bugzilla.suse.com/show_bug.cgi?id=1262503
* https://jira.suse.com/browse/PED-15166
SUSE-SU-2026:2009-1: important: Security update for haveged
# Security update for haveged
Announcement ID: SUSE-SU-2026:2009-1
Release Date: 2026-05-19T11:55:29Z
Rating: important
References:
* bsc#1264086
Cross-References:
* CVE-2026-41054
CVSS scores:
* CVE-2026-41054 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for haveged fixes the following issue
* CVE-2026-41054: missing exit out of permission check could lead to root
exploit (bsc#1264086).
Changes for haveged:
* Improvements on the linux kernel random subsystem have made move forward to
socket communication within private network
* Fix "stop" of service, the daemon in foreground actually see daemon(7) for
the rationale. Only "simple" (default) and the help of udev, as starting
services while starved of entropy
* Add ppc64le support
* update to 1.8
* Correct additional run-time test aligment problems on mips.
* haveged 1.7a
* Correct VPATH issues and modify check target to support parallel builds and
changes in automake 1.13 test harness.
* Remove all sysvinit compatibility.
* fix powerpc detection
* Current version does support ARM, remove the ExcludeArch need network and
can use PrivateNetwork=yes
* Add online tests based on AIS-31
* Fix install target, move to bin and eliminate script if not daemon, now use
sysv and systemd templates
* use -F with no arguments in haveged.service
* build with -fpie
* Use Service type "simple" in systemd unit
* fix build on ia64, s390, s390x
* fix ppc64 build present in old versions have been fixed in different ways.
* run spec cleaner
* Link with full RELRO (-Wl,-z,relro,-z,now)
* add systemd support
* Drop as much capabilitites as possible using libcap-ng
* I meant Enhances not Supplements
* Implement hack to start by default only in VMs
* use O_CLOEXEC on fds
* add proper Requires(pre)
* add a SUSE standard init script
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-2009=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-2009=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-2009=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-2009=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* haveged-debugsource-1.9.14-150600.11.6.1
* libhavege2-1.9.14-150600.11.6.1
* libhavege2-debuginfo-1.9.14-150600.11.6.1
* haveged-devel-1.9.14-150600.11.6.1
* haveged-1.9.14-150600.11.6.1
* haveged-debuginfo-1.9.14-150600.11.6.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* haveged-debugsource-1.9.14-150600.11.6.1
* libhavege2-1.9.14-150600.11.6.1
* libhavege2-debuginfo-1.9.14-150600.11.6.1
* haveged-devel-1.9.14-150600.11.6.1
* haveged-1.9.14-150600.11.6.1
* haveged-debuginfo-1.9.14-150600.11.6.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* haveged-debugsource-1.9.14-150600.11.6.1
* libhavege2-1.9.14-150600.11.6.1
* libhavege2-debuginfo-1.9.14-150600.11.6.1
* haveged-devel-1.9.14-150600.11.6.1
* haveged-1.9.14-150600.11.6.1
* haveged-debuginfo-1.9.14-150600.11.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* haveged-debugsource-1.9.14-150600.11.6.1
* libhavege2-1.9.14-150600.11.6.1
* libhavege2-debuginfo-1.9.14-150600.11.6.1
* haveged-devel-1.9.14-150600.11.6.1
* haveged-1.9.14-150600.11.6.1
* haveged-debuginfo-1.9.14-150600.11.6.1
## References:
* https://www.suse.com/security/cve/CVE-2026-41054.html
* https://bugzilla.suse.com/show_bug.cgi?id=1264086
openSUSE-SU-2026:0171-1: important: Security update for git-bug
openSUSE Security Update: Security update for git-bug
_______________________________
Announcement ID: openSUSE-SU-2026:0171-1
Rating: important
References: #1253506 #1253930 #1254084 #1264955 #1265416
Cross-References: CVE-2025-47913 CVE-2025-47914 CVE-2025-58181
CVE-2026-1229 CVE-2026-41506
CVSS scores:
CVE-2025-47913 (SUSE): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVE-2025-47914 (SUSE): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CVE-2025-58181 (SUSE): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CVE-2026-1229 (SUSE): 8.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
CVE-2026-41506 (SUSE): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that fixes 5 vulnerabilities is now available.
Description:
This update for git-bug fixes the following issues:
- Fix CVE-2026-1229 and CVE-2026-41506
- CVE-2026-1229: CIRCL has an incorrect calculation in secp384r1
CombinedMult (boo#1265416, GO-2026-4550) update
github.com/cloudflare/circl to v1.6.3
- CVE-2026-41506: HTTP authentication credential leak when following
redirects during smart-HTTP clone and fetch
operations (boo#1264955, GO-2026-4910), update
github.com/go-git/go-git/v5 to v5.17.1
- Revendor to include fixed version of depending libraries:
- GO-2025-4116 (CVE-2025-47913, boo#1253506) upgrade golang.org/x/crypto
to v0.43.0
- GO-2025-3900 (GHSA-2464-8j7c-4cjm) upgrade
github.com/go-viper/mapstructure/v2 to v2.4.0
- GO-2025-3787 (GHSA-fv92-fjc5-jj9h) included in the previous
- GO-2025-3754 (GHSA-2x5j-vhc8-9cwm) upgrade github.com/cloudflare/circl
to v1.6.1
- GO-2025-4134 (CVE-2025-58181, boo#1253930) upgrade
golang.org/x/crypto/ssh to v0.45.0
- GO-2025-4135 (CVE-2025-47914, boo#1254084) upgrade
golang.org/x/crypto/ssh/agent to v0.45.0
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-171=1
Package List:
- openSUSE Backports SLE-15-SP7 (aarch64 i586 ppc64le s390x x86_64):
git-bug-0.10.1-bp157.2.6.1
- openSUSE Backports SLE-15-SP7 (noarch):
git-bug-bash-completion-0.10.1-bp157.2.6.1
git-bug-fish-completion-0.10.1-bp157.2.6.1
git-bug-zsh-completion-0.10.1-bp157.2.6.1
References:
https://www.suse.com/security/cve/CVE-2025-47913.html
https://www.suse.com/security/cve/CVE-2025-47914.html
https://www.suse.com/security/cve/CVE-2025-58181.html
https://www.suse.com/security/cve/CVE-2026-1229.html
https://www.suse.com/security/cve/CVE-2026-41506.html
https://bugzilla.suse.com/1253506
https://bugzilla.suse.com/1253930
https://bugzilla.suse.com/1254084
https://bugzilla.suse.com/1264955
https://bugzilla.suse.com/1265416
openSUSE-SU-2026:0170-1: important: Security update for perl-CryptX
openSUSE Security Update: Security update for perl-CryptX
_______________________________
Announcement ID: openSUSE-SU-2026:0170-1
Rating: important
References: #1244472 #1262697
Cross-References: CVE-2025-40914 CVE-2026-41564
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for perl-CryptX fixes the following issues:
- updated to 0.89.0 (0.089) 0.089 2026-05-10
- new: Crypt::ASN1
- new: Crypt::AuthEnc::SIV
- new: Crypt::AuthEnc::XChaCha20Poly1305
- new: Crypt::Cipher::SM4
- new: Crypt::Digest::TurboSHAKE
- new: Crypt::Digest::KangarooTwelve
- new: Crypt::PK::Ed448
- new: Crypt::PK::X448
- new: Crypt::Stream::XChaCha
- new: Crypt::Stream::XSalsa20
- Crypt::PK::Ed25519 - new functions: sign_message_ctx,
verify_message_ctx, sign_message_ph, verify_message_ph
- Crypt::Digest: object digest accessors now finalize the
object; use reset() before reuse
- Crypt::Mac + Crypt::AuthEnc: finalized-object lifecycle is now
enforced consistently
- security/hardening fixes across
Digest/Mac/AuthEnc/Mode/Stream/PK/PRNG
- fixes related to wycheproof test suite
- documentation cleanup & improvements
- support for RFC 8702 RSA-PSS-SHAKE128/256 and
ECDSA-SHAKE128/256
- support for FRP256v1 elliptic-curve
- bundled libtomcrypt update branch:develop (commit: 8b5af49b
2026-05-06) 0.088 2026-04-23
- Crypt::KeyDerivation - new functions: pbkdf1_openssl,
bcrypt_pbkdf, scrypt_pbkdf, argon2_pbkdf
- Crypt::Misc - new functions: random_v7uuid, is_uuid
- bundled libtomcrypt update branch:develop (commit: 2e441a17
2026-04-15)
- bundled libtommath update branch:develop (commit: ae40a87
2026-04-20)
- security fix CVE-2026-41564
https://github.com/DCIT/perl-CryptX/security/advisories/GHSA-24c2-gp6c-24c6
(boo#1262697)
- updated to 0.87.0 (0.087) 0.087 2025-06-11
- bundled libtomcrypt update branch:develop (commit: d448df1
2025-05-06)
- bundled libtommath update branch:develop (commit: 839ae9e
2025-06-11)
- fix #120 Create SECURITY.md
- fix #121 Failures on ARM after upgrading libtommath
- security fix CVE-2025-40914
https://github.com/DCIT/perl-CryptX/security/advisories/GHSA-6fh3-7qjq-8v22
(boo#1244472)
- updated to 0.86.0 (0.086) 0.086 2025-05-02
- fixe #118 Syncing with recent Math-BigInt
- bundled libtomcrypt update branch:develop (commit:3905c289
2025-04-23)
- updated to 0.85.0 (0.085) 0.085 2025-02-08
- fix #114 #113 #112 (improved detection of Apple+x86_64 / AESNI)
- fix #115 Crypt::PRNG - fix typo and specify ChaCha20 is the
default
- updated to 0.84.0 (0.084) 0.084 2024-10-16
- libtommath: fix cpantesters crash on freebsd/i386
- updated ppport.h 0.083 2024-10-15
- fix #110 regression: 0.081 fails to parse PEMs that 0.080
parsed fine
- bundled libtomcrypt update branch:develop (commit:cbb01b37
2024-10-14) 0.082 2024-10-07
- fix #111 libcryptx-perl: t/sshkey.t fails on some architectures
- CHANGE: Crypt::Cipher::Blowfish max key size increased to 72
bytes
- bundled libtomcrypt update branch:develop (commit:29af8922
2024-10-07) 0.081 2024-09-08
- fix #107 Drop -msse4.1 -maes for libtomcrypt
- fix #105 Several functions in CryptX::AuthEnc deal weirdly
with non-simple-string plaintext
- fix #104 Add ethereum format signature
- fix #103 Use standard __asm__ blocks instead of asm
- fix #99 ltc: fix aesni flag handling
- fix #87 Add possibility to use different hash algorithms in
RSAES-OAEP
- BIG CHANGE switch to PEM/SSH key loading via libtomcrypt
- bundled libtomcrypt update branch:develop (commit:ce904c86
2024-09-02)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-170=1
Package List:
- openSUSE Backports SLE-15-SP7 (aarch64 i586 ppc64le s390x x86_64):
perl-CryptX-0.89.0-bp157.2.3.1
References:
https://www.suse.com/security/cve/CVE-2025-40914.html
https://www.suse.com/security/cve/CVE-2026-41564.html
https://bugzilla.suse.com/1244472
https://bugzilla.suse.com/1262697