SUSE 5644 Published by

Recent SUSE security bulletins address numerous vulnerabilities across their Linux distributions and associated software packages. These patches cover the Linux kernel, php-composer2, libmodsecurity3, Java OpenJ9, mcphost, and krb5 authentication libraries to resolve flaws that could enable unauthorized access or service disruptions. Many of the referenced CVEs carry high severity scores, with specific mitigations targeting memory corruption in network schedulers and command injection vulnerabilities within development tools.

SUSE-SU-2026:1787-1: important: Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1784-1: important: Security update for php-composer2
SUSE-SU-2026:1793-1: important: Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1802-1: important: Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1801-1: important: Security update for the Linux Kernel (Live Patch 19 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1798-1: important: Security update for the Linux Kernel (Live Patch 32 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:1804-1: important: Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5)
openSUSE-SU-2026:10732-1: moderate: libmodsecurity3-3.0.15-1.1 on GA media
openSUSE-SU-2026:10728-1: moderate: java-25-openj9-25.0.3.0-1.1 on GA media
openSUSE-SU-2026:10731-1: moderate: mcphost-0.34.0-1.1 on GA media
openSUSE-SU-2026:10729-1: moderate: krb5-1.22.2-3.1 on GA media




SUSE-SU-2026:1787-1: important: Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6)


# Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise
15 SP6)

Announcement ID: SUSE-SU-2026:1787-1
Release Date: 2026-05-09T03:34:11Z
Rating: important
References:

* bsc#1252048
* bsc#1258005
* bsc#1258655
* bsc#1259126
* bsc#1263689

Cross-References:

* CVE-2025-39977
* CVE-2025-71066
* CVE-2026-23004
* CVE-2026-23204
* CVE-2026-31431

CVSS scores:

* CVE-2025-39977 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71066 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23004 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23204 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23204 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-31431 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31431 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves five vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.81 fixes
various security issues

The following security issues were fixed:

* CVE-2025-39977: futex: Prevent use-after-free during requeue-PI
(bsc#1252048).
* CVE-2025-71066: net/sched: ets: Always remove class from active list before
deleting in ets_qdisc_change (bsc#1258005).
* CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and
rt_del_uncached_list() (bsc#1258655).
* CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful()
(bsc#1259126).
* CVE-2026-31431: crypto: algif_aead - Revert to operating out-of-place
(bsc#1263689).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1787=1 SUSE-2026-1788=1 SUSE-2026-1789=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-1787=1 SUSE-SLE-
Module-Live-Patching-15-SP6-2026-1788=1 SUSE-SLE-Module-Live-
Patching-15-SP6-2026-1789=1

## Package List:

* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_14-debugsource-10-150600.2.1
* kernel-livepatch-6_4_0-150600_23_81-default-debuginfo-5-150600.2.1
* kernel-livepatch-6_4_0-150600_23_70-default-debuginfo-10-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_15-debugsource-10-150600.2.1
* kernel-livepatch-6_4_0-150600_23_81-default-5-150600.2.1
* kernel-livepatch-6_4_0-150600_23_70-default-10-150600.2.1
* kernel-livepatch-6_4_0-150600_23_65-default-10-150600.2.1
* kernel-livepatch-6_4_0-150600_23_65-default-debuginfo-10-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_18-debugsource-5-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_14-debugsource-10-150600.2.1
* kernel-livepatch-6_4_0-150600_23_81-default-debuginfo-5-150600.2.1
* kernel-livepatch-6_4_0-150600_23_70-default-debuginfo-10-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_15-debugsource-10-150600.2.1
* kernel-livepatch-6_4_0-150600_23_81-default-5-150600.2.1
* kernel-livepatch-6_4_0-150600_23_70-default-10-150600.2.1
* kernel-livepatch-6_4_0-150600_23_65-default-10-150600.2.1
* kernel-livepatch-6_4_0-150600_23_65-default-debuginfo-10-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_18-debugsource-5-150600.2.1

## References:

* https://www.suse.com/security/cve/CVE-2025-39977.html
* https://www.suse.com/security/cve/CVE-2025-71066.html
* https://www.suse.com/security/cve/CVE-2026-23004.html
* https://www.suse.com/security/cve/CVE-2026-23204.html
* https://www.suse.com/security/cve/CVE-2026-31431.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252048
* https://bugzilla.suse.com/show_bug.cgi?id=1258005
* https://bugzilla.suse.com/show_bug.cgi?id=1258655
* https://bugzilla.suse.com/show_bug.cgi?id=1259126
* https://bugzilla.suse.com/show_bug.cgi?id=1263689



SUSE-SU-2026:1784-1: important: Security update for php-composer2


# Security update for php-composer2

Announcement ID: SUSE-SU-2026:1784-1
Release Date: 2026-05-08T17:05:56Z
Rating: important
References:

* bsc#1262254
* bsc#1262255

Cross-References:

* CVE-2026-40176
* CVE-2026-40261

CVSS scores:

* CVE-2026-40176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-40176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-40261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-40261 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* Web and Scripting Module 15-SP7

An update that solves two vulnerabilities can now be installed.

## Description:

This update for php-composer2 fixes the following issues:

* CVE-2026-40176: arbitrary command injection via malicious Perforce
repository definition (bsc#1262254).
* CVE-2026-40261: arbitrary command injection via malicious Perforce source
reference/url (bsc#1262255).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1784=1

* Web and Scripting Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2026-1784=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1784=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1784=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* php-composer2-2.6.4-150600.3.9.1
* Web and Scripting Module 15-SP7 (noarch)
* php-composer2-2.6.4-150600.3.9.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* php-composer2-2.6.4-150600.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* php-composer2-2.6.4-150600.3.9.1

## References:

* https://www.suse.com/security/cve/CVE-2026-40176.html
* https://www.suse.com/security/cve/CVE-2026-40261.html
* https://bugzilla.suse.com/show_bug.cgi?id=1262254
* https://bugzilla.suse.com/show_bug.cgi?id=1262255



SUSE-SU-2026:1793-1: important: Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6)


# Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise
15 SP6)

Announcement ID: SUSE-SU-2026:1793-1
Release Date: 2026-05-09T11:34:27Z
Rating: important
References:

* bsc#1252048
* bsc#1258005
* bsc#1258073
* bsc#1258655
* bsc#1259126
* bsc#1263689

Cross-References:

* CVE-2025-38375
* CVE-2025-39977
* CVE-2025-71066
* CVE-2026-23004
* CVE-2026-23204
* CVE-2026-31431

CVSS scores:

* CVE-2025-38375 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38375 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38375 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39977 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71066 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23004 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23204 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-31431 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31431 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves six vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.60 fixes
various security issues

The following security issues were fixed:

* CVE-2025-38375: virtio-net: ensure the received length does not exceed
allocated size (bsc#1258073).
* CVE-2025-39977: futex: Prevent use-after-free during requeue-PI
(bsc#1252048).
* CVE-2025-71066: net/sched: ets: Always remove class from active list before
deleting in ets_qdisc_change (bsc#1258005).
* CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and
rt_del_uncached_list() (bsc#1258655).
* CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful()
(bsc#1259126).
* CVE-2026-31431: crypto: algif_aead - Revert to operating out-of-place
(bsc#1263689).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1793=1

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-1793=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1794=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-1794=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1795=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-1795=1

## Package List:

* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_43-debugsource-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-13-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_43-debugsource-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-13-150400.2.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-18-150500.2.1
* kernel-livepatch-5_14_21-150500_55_100-default-18-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_25-debugsource-18-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-18-150500.2.1
* kernel-livepatch-5_14_21-150500_55_100-default-18-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_25-debugsource-18-150500.2.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_13-debugsource-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_60-default-debuginfo-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_60-default-14-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_13-debugsource-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_60-default-debuginfo-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_60-default-14-150600.2.1

## References:

* https://www.suse.com/security/cve/CVE-2025-38375.html
* https://www.suse.com/security/cve/CVE-2025-39977.html
* https://www.suse.com/security/cve/CVE-2025-71066.html
* https://www.suse.com/security/cve/CVE-2026-23004.html
* https://www.suse.com/security/cve/CVE-2026-23204.html
* https://www.suse.com/security/cve/CVE-2026-31431.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252048
* https://bugzilla.suse.com/show_bug.cgi?id=1258005
* https://bugzilla.suse.com/show_bug.cgi?id=1258073
* https://bugzilla.suse.com/show_bug.cgi?id=1258655
* https://bugzilla.suse.com/show_bug.cgi?id=1259126
* https://bugzilla.suse.com/show_bug.cgi?id=1263689



SUSE-SU-2026:1802-1: important: Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP6)


# Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise
15 SP6)

Announcement ID: SUSE-SU-2026:1802-1
Release Date: 2026-05-09T13:05:31Z
Rating: important
References:

* bsc#1263689

Cross-References:

* CVE-2026-31431

CVSS scores:

* CVE-2026-31431 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31431 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.92 fixes one
security issue

The following security issue was fixed:

* CVE-2026-31431: crypto: algif_aead - Revert to operating out-of-place
(bsc#1263689).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1802=1 SUSE-2026-1803=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-1802=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2026-1803=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1797=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-1797=1

## Package List:

* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_144-default-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_144-default-debuginfo-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_141-default-debuginfo-2-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_36-debugsource-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_141-default-2-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_37-debugsource-2-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_144-default-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_144-default-debuginfo-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_141-default-debuginfo-2-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_36-debugsource-2-150500.2.1
* kernel-livepatch-5_14_21-150500_55_141-default-2-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_37-debugsource-2-150500.2.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_92-default-debuginfo-2-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_21-debugsource-2-150600.2.1
* kernel-livepatch-6_4_0-150600_23_92-default-2-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_92-default-debuginfo-2-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_21-debugsource-2-150600.2.1
* kernel-livepatch-6_4_0-150600_23_92-default-2-150600.2.1

## References:

* https://www.suse.com/security/cve/CVE-2026-31431.html
* https://bugzilla.suse.com/show_bug.cgi?id=1263689



SUSE-SU-2026:1801-1: important: Security update for the Linux Kernel (Live Patch 19 for SUSE Linux Enterprise 15 SP6)


# Security update for the Linux Kernel (Live Patch 19 for SUSE Linux Enterprise
15 SP6)

Announcement ID: SUSE-SU-2026:1801-1
Release Date: 2026-05-09T13:05:07Z
Rating: important
References:

* bsc#1258005
* bsc#1258655
* bsc#1259126
* bsc#1263689

Cross-References:

* CVE-2025-71066
* CVE-2026-23004
* CVE-2026-23204
* CVE-2026-31431

CVSS scores:

* CVE-2025-71066 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23004 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23204 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-31431 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31431 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves four vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.84 fixes
various security issues

The following security issues were fixed:

* CVE-2025-71066: net/sched: ets: Always remove class from active list before
deleting in ets_qdisc_change (bsc#1258005).
* CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and
rt_del_uncached_list() (bsc#1258655).
* CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful()
(bsc#1259126).
* CVE-2026-31431: crypto: algif_aead - Revert to operating out-of-place
(bsc#1263689).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1801=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-1801=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1796=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-1796=1

## Package List:

* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_35-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_136-default-debuginfo-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_136-default-5-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_35-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_136-default-debuginfo-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_136-default-5-150500.2.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_84-default-debuginfo-5-150600.2.1
* kernel-livepatch-6_4_0-150600_23_84-default-5-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_19-debugsource-5-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_84-default-debuginfo-5-150600.2.1
* kernel-livepatch-6_4_0-150600_23_84-default-5-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_19-debugsource-5-150600.2.1

## References:

* https://www.suse.com/security/cve/CVE-2025-71066.html
* https://www.suse.com/security/cve/CVE-2026-23004.html
* https://www.suse.com/security/cve/CVE-2026-23204.html
* https://www.suse.com/security/cve/CVE-2026-31431.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258005
* https://bugzilla.suse.com/show_bug.cgi?id=1258655
* https://bugzilla.suse.com/show_bug.cgi?id=1259126
* https://bugzilla.suse.com/show_bug.cgi?id=1263689



SUSE-SU-2026:1798-1: important: Security update for the Linux Kernel (Live Patch 32 for SUSE Linux Enterprise 15 SP5)


# Security update for the Linux Kernel (Live Patch 32 for SUSE Linux Enterprise
15 SP5)

Announcement ID: SUSE-SU-2026:1798-1
Release Date: 2026-05-09T13:04:52Z
Rating: important
References:

* bsc#1252048
* bsc#1258005
* bsc#1258073
* bsc#1258655
* bsc#1259126
* bsc#1263689

Cross-References:

* CVE-2025-38375
* CVE-2025-39977
* CVE-2025-71066
* CVE-2026-23004
* CVE-2026-23204
* CVE-2026-31431

CVSS scores:

* CVE-2025-38375 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38375 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38375 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39977 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71066 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23004 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23204 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-31431 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31431 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves six vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.127 fixes
various security issues

The following security issues were fixed:

* CVE-2025-38375: virtio-net: ensure the received length does not exceed
allocated size (bsc#1258073).
* CVE-2025-39977: futex: Prevent use-after-free during requeue-PI
(bsc#1252048).
* CVE-2025-71066: net/sched: ets: Always remove class from active list before
deleting in ets_qdisc_change (bsc#1258005).
* CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and
rt_del_uncached_list() (bsc#1258655).
* CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful()
(bsc#1259126).
* CVE-2026-31431: crypto: algif_aead - Revert to operating out-of-place
(bsc#1263689).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1799=1 SUSE-2026-1798=1

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-1799=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2026-1798=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1800=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-1800=1

## Package List:

* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_179-default-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_47-debugsource-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_179-default-debuginfo-10-150400.2.1
* kernel-livepatch-5_14_21-150400_24_187-default-debuginfo-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_187-default-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_45-debugsource-10-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_179-default-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_47-debugsource-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_179-default-debuginfo-10-150400.2.1
* kernel-livepatch-5_14_21-150400_24_187-default-debuginfo-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_187-default-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_45-debugsource-10-150400.2.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_127-default-debuginfo-6-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_32-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_127-default-6-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_127-default-debuginfo-6-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_32-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_127-default-6-150500.2.1

## References:

* https://www.suse.com/security/cve/CVE-2025-38375.html
* https://www.suse.com/security/cve/CVE-2025-39977.html
* https://www.suse.com/security/cve/CVE-2025-71066.html
* https://www.suse.com/security/cve/CVE-2026-23004.html
* https://www.suse.com/security/cve/CVE-2026-23204.html
* https://www.suse.com/security/cve/CVE-2026-31431.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252048
* https://bugzilla.suse.com/show_bug.cgi?id=1258005
* https://bugzilla.suse.com/show_bug.cgi?id=1258073
* https://bugzilla.suse.com/show_bug.cgi?id=1258655
* https://bugzilla.suse.com/show_bug.cgi?id=1259126
* https://bugzilla.suse.com/show_bug.cgi?id=1263689



SUSE-SU-2026:1804-1: important: Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5)


# Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise
15 SP5)

Announcement ID: SUSE-SU-2026:1804-1
Release Date: 2026-05-09T16:04:42Z
Rating: important
References:

* bsc#1252048
* bsc#1258005
* bsc#1258073
* bsc#1258655
* bsc#1259126
* bsc#1263689

Cross-References:

* CVE-2025-38375
* CVE-2025-39977
* CVE-2025-71066
* CVE-2026-23004
* CVE-2026-23204
* CVE-2026-31431

CVSS scores:

* CVE-2025-38375 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38375 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38375 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39977 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71066 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23004 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23204 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-31431 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31431 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves six vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.130 fixes
various security issues

The following security issues were fixed:

* CVE-2025-38375: virtio-net: ensure the received length does not exceed
allocated size (bsc#1258073).
* CVE-2025-39977: futex: Prevent use-after-free during requeue-PI
(bsc#1252048).
* CVE-2025-71066: net/sched: ets: Always remove class from active list before
deleting in ets_qdisc_change (bsc#1258005).
* CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and
rt_del_uncached_list() (bsc#1258655).
* CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful()
(bsc#1259126).
* CVE-2026-31431: crypto: algif_aead - Revert to operating out-of-place
(bsc#1263689).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1804=1 SUSE-2026-1805=1 SUSE-2026-1806=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-1804=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2026-1805=1 SUSE-SLE-Module-Live-
Patching-15-SP5-2026-1806=1

## Package List:

* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_130-default-debuginfo-6-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_33-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-9-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_31-debugsource-9-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-9-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_28-debugsource-16-150500.2.1
* kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-16-150500.2.1
* kernel-livepatch-5_14_21-150500_55_130-default-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_113-default-16-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_130-default-debuginfo-6-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_33-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-9-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_31-debugsource-9-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-9-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_28-debugsource-16-150500.2.1
* kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-16-150500.2.1
* kernel-livepatch-5_14_21-150500_55_130-default-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_113-default-16-150500.2.1

## References:

* https://www.suse.com/security/cve/CVE-2025-38375.html
* https://www.suse.com/security/cve/CVE-2025-39977.html
* https://www.suse.com/security/cve/CVE-2025-71066.html
* https://www.suse.com/security/cve/CVE-2026-23004.html
* https://www.suse.com/security/cve/CVE-2026-23204.html
* https://www.suse.com/security/cve/CVE-2026-31431.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252048
* https://bugzilla.suse.com/show_bug.cgi?id=1258005
* https://bugzilla.suse.com/show_bug.cgi?id=1258073
* https://bugzilla.suse.com/show_bug.cgi?id=1258655
* https://bugzilla.suse.com/show_bug.cgi?id=1259126
* https://bugzilla.suse.com/show_bug.cgi?id=1263689



openSUSE-SU-2026:10732-1: moderate: libmodsecurity3-3.0.15-1.1 on GA media


# libmodsecurity3-3.0.15-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10732-1
Rating: moderate

Cross-References:

* CVE-2026-30923
* CVE-2026-42268

CVSS scores:

* CVE-2026-30923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-30923 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the libmodsecurity3-3.0.15-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libmodsecurity3 3.0.15-1.1
* modsecurity 3.0.15-1.1
* modsecurity-devel 3.0.15-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-30923.html
* https://www.suse.com/security/cve/CVE-2026-42268.html



openSUSE-SU-2026:10728-1: moderate: java-25-openj9-25.0.3.0-1.1 on GA media


# java-25-openj9-25.0.3.0-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10728-1
Rating: moderate

Cross-References:

* CVE-2026-22007
* CVE-2026-22013
* CVE-2026-22018
* CVE-2026-23865
* CVE-2026-34282

CVSS scores:

* CVE-2026-22007 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-22007 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-22013 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2026-22013 ( SUSE ): 6 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-22018 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22018 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-23865 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-23865 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-34282 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-34282 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 5 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the java-25-openj9-25.0.3.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* java-25-openj9 25.0.3.0-1.1
* java-25-openj9-demo 25.0.3.0-1.1
* java-25-openj9-devel 25.0.3.0-1.1
* java-25-openj9-headless 25.0.3.0-1.1
* java-25-openj9-javadoc 25.0.3.0-1.1
* java-25-openj9-jmods 25.0.3.0-1.1
* java-25-openj9-src 25.0.3.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-22007.html
* https://www.suse.com/security/cve/CVE-2026-22013.html
* https://www.suse.com/security/cve/CVE-2026-22018.html
* https://www.suse.com/security/cve/CVE-2026-23865.html
* https://www.suse.com/security/cve/CVE-2026-34282.html



openSUSE-SU-2026:10731-1: moderate: mcphost-0.34.0-1.1 on GA media


# mcphost-0.34.0-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10731-1
Rating: moderate

Cross-References:

* CVE-2025-30153
* CVE-2026-32285
* CVE-2026-33186

CVSS scores:

* CVE-2025-30153 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-32285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-32285 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33186 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33186 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 3 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the mcphost-0.34.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* mcphost 0.34.0-1.1
* mcphost-bash-completion 0.34.0-1.1
* mcphost-fish-completion 0.34.0-1.1
* mcphost-zsh-completion 0.34.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-30153.html
* https://www.suse.com/security/cve/CVE-2026-32285.html
* https://www.suse.com/security/cve/CVE-2026-33186.html



openSUSE-SU-2026:10729-1: moderate: krb5-1.22.2-3.1 on GA media


# krb5-1.22.2-3.1 on GA media

Announcement ID: openSUSE-SU-2026:10729-1
Rating: moderate

Cross-References:

* CVE-2026-40355
* CVE-2026-40356

CVSS scores:

* CVE-2026-40355 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-40356 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the krb5-1.22.2-3.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* krb5 1.22.2-3.1
* krb5-32bit 1.22.2-3.1
* krb5-client 1.22.2-3.1
* krb5-devel 1.22.2-3.1
* krb5-devel-32bit 1.22.2-3.1
* krb5-plugin-kdb-ldap 1.22.2-3.1
* krb5-plugin-preauth-otp 1.22.2-3.1
* krb5-plugin-preauth-pkinit 1.22.2-3.1
* krb5-plugin-preauth-spake 1.22.2-3.1
* krb5-server 1.22.2-3.1

## References:

* https://www.suse.com/security/cve/CVE-2026-40355.html
* https://www.suse.com/security/cve/CVE-2026-40356.html