openSUSE-SU-2026:10793-1: moderate: kernel-devel-7.0.7-1.1 on GA media
openSUSE-SU-2026:10784-1: moderate: apache-commons-configuration2-2.15.0-1.1 on GA media
openSUSE-SU-2026:10792-1: moderate: java-25-openj9-25.0.3.0-2.1 on GA media
openSUSE-SU-2026:10789-1: moderate: java-17-openj9-17.0.19.0-2.1 on GA media
openSUSE-SU-2026:10788-1: moderate: java-11-openj9-11.0.31.0-2.1 on GA media
openSUSE-SU-2026:10785-1: moderate: apache2-2.4.67-1.1 on GA media
openSUSE-SU-2026:10790-1: moderate: java-1_8_0-openj9-1.8.0.492-2.1 on GA media
openSUSE-SU-2026:10786-1: moderate: chromedriver-148.0.7778.167-2.1 on GA media
openSUSE-SU-2026:10787-1: moderate: expat-2.8.1-1.1 on GA media
openSUSE-SU-2026:10791-1: moderate: java-21-openj9-21.0.11.0-2.1 on GA media
openSUSE-SU-2026:10793-1: moderate: kernel-devel-7.0.7-1.1 on GA media
# kernel-devel-7.0.7-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10793-1
Rating: moderate
Cross-References:
* CVE-2026-31694
* CVE-2026-31696
* CVE-2026-31697
* CVE-2026-31698
* CVE-2026-31699
* CVE-2026-31700
* CVE-2026-31701
* CVE-2026-31702
* CVE-2026-31703
* CVE-2026-31704
* CVE-2026-31705
* CVE-2026-31706
* CVE-2026-31707
* CVE-2026-31708
* CVE-2026-31709
* CVE-2026-31710
* CVE-2026-31711
* CVE-2026-31712
* CVE-2026-31713
* CVE-2026-31714
* CVE-2026-31715
* CVE-2026-31716
* CVE-2026-31717
* CVE-2026-31718
* CVE-2026-31719
* CVE-2026-43058
* CVE-2026-43071
* CVE-2026-43072
* CVE-2026-43073
* CVE-2026-43284
* CVE-2026-43348
* CVE-2026-43349
* CVE-2026-43350
* CVE-2026-43490
* CVE-2026-43500
CVSS scores:
* CVE-2026-31694 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31694 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-31696 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31697 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31697 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31698 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31698 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31699 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31699 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31700 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31700 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-31701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-31702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31703 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-31703 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-31704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31705 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31705 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31706 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31706 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31707 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-31707 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31708 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
* CVE-2026-31708 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31709 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-31709 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31710 ( SUSE ): 8.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-31710 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:N/SA:N
* CVE-2026-31711 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-31711 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31712 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2026-31712 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-31713 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31714 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-31714 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-31715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-31715 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31716 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-31716 ( SUSE ): 7 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31717 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31717 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31718 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-31718 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31719 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31719 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-43058 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-43058 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-43071 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-43071 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-43072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-43072 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-43073 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-43073 ( SUSE ): 7.2 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-43284 ( SUSE ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-43348 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-43349 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L
* CVE-2026-43349 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2026-43350 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
* CVE-2026-43350 ( SUSE ): 7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-43490 ( SUSE ): 5.5 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-43490 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-43500 ( SUSE ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves 35 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the kernel-devel-7.0.7-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* kernel-devel 7.0.7-1.1
* kernel-macros 7.0.7-1.1
* kernel-source 7.0.7-1.1
* kernel-source-vanilla 7.0.7-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-31694.html
* https://www.suse.com/security/cve/CVE-2026-31696.html
* https://www.suse.com/security/cve/CVE-2026-31697.html
* https://www.suse.com/security/cve/CVE-2026-31698.html
* https://www.suse.com/security/cve/CVE-2026-31699.html
* https://www.suse.com/security/cve/CVE-2026-31700.html
* https://www.suse.com/security/cve/CVE-2026-31701.html
* https://www.suse.com/security/cve/CVE-2026-31702.html
* https://www.suse.com/security/cve/CVE-2026-31703.html
* https://www.suse.com/security/cve/CVE-2026-31704.html
* https://www.suse.com/security/cve/CVE-2026-31705.html
* https://www.suse.com/security/cve/CVE-2026-31706.html
* https://www.suse.com/security/cve/CVE-2026-31707.html
* https://www.suse.com/security/cve/CVE-2026-31708.html
* https://www.suse.com/security/cve/CVE-2026-31709.html
* https://www.suse.com/security/cve/CVE-2026-31710.html
* https://www.suse.com/security/cve/CVE-2026-31711.html
* https://www.suse.com/security/cve/CVE-2026-31712.html
* https://www.suse.com/security/cve/CVE-2026-31713.html
* https://www.suse.com/security/cve/CVE-2026-31714.html
* https://www.suse.com/security/cve/CVE-2026-31715.html
* https://www.suse.com/security/cve/CVE-2026-31716.html
* https://www.suse.com/security/cve/CVE-2026-31717.html
* https://www.suse.com/security/cve/CVE-2026-31718.html
* https://www.suse.com/security/cve/CVE-2026-31719.html
* https://www.suse.com/security/cve/CVE-2026-43058.html
* https://www.suse.com/security/cve/CVE-2026-43071.html
* https://www.suse.com/security/cve/CVE-2026-43072.html
* https://www.suse.com/security/cve/CVE-2026-43073.html
* https://www.suse.com/security/cve/CVE-2026-43284.html
* https://www.suse.com/security/cve/CVE-2026-43348.html
* https://www.suse.com/security/cve/CVE-2026-43349.html
* https://www.suse.com/security/cve/CVE-2026-43350.html
* https://www.suse.com/security/cve/CVE-2026-43490.html
* https://www.suse.com/security/cve/CVE-2026-43500.html
openSUSE-SU-2026:10784-1: moderate: apache-commons-configuration2-2.15.0-1.1 on GA media
# apache-commons-configuration2-2.15.0-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10784-1
Rating: moderate
Cross-References:
* CVE-2025-48924
* CVE-2026-45205
CVSS scores:
* CVE-2025-48924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-48924 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-45205 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-45205 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the apache-commons-configuration2-2.15.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* apache-commons-configuration2 2.15.0-1.1
* apache-commons-configuration2-javadoc 2.15.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-48924.html
* https://www.suse.com/security/cve/CVE-2026-45205.html
openSUSE-SU-2026:10792-1: moderate: java-25-openj9-25.0.3.0-2.1 on GA media
# java-25-openj9-25.0.3.0-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10792-1
Rating: moderate
Cross-References:
* CVE-2026-1188
CVSS scores:
* CVE-2026-1188 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the java-25-openj9-25.0.3.0-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* java-25-openj9 25.0.3.0-2.1
* java-25-openj9-demo 25.0.3.0-2.1
* java-25-openj9-devel 25.0.3.0-2.1
* java-25-openj9-headless 25.0.3.0-2.1
* java-25-openj9-javadoc 25.0.3.0-2.1
* java-25-openj9-jmods 25.0.3.0-2.1
* java-25-openj9-src 25.0.3.0-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-1188.html
openSUSE-SU-2026:10789-1: moderate: java-17-openj9-17.0.19.0-2.1 on GA media
# java-17-openj9-17.0.19.0-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10789-1
Rating: moderate
Cross-References:
* CVE-2026-1188
CVSS scores:
* CVE-2026-1188 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the java-17-openj9-17.0.19.0-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* java-17-openj9 17.0.19.0-2.1
* java-17-openj9-demo 17.0.19.0-2.1
* java-17-openj9-devel 17.0.19.0-2.1
* java-17-openj9-headless 17.0.19.0-2.1
* java-17-openj9-javadoc 17.0.19.0-2.1
* java-17-openj9-jmods 17.0.19.0-2.1
* java-17-openj9-src 17.0.19.0-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-1188.html
openSUSE-SU-2026:10788-1: moderate: java-11-openj9-11.0.31.0-2.1 on GA media
# java-11-openj9-11.0.31.0-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10788-1
Rating: moderate
Cross-References:
* CVE-2026-1188
CVSS scores:
* CVE-2026-1188 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the java-11-openj9-11.0.31.0-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* java-11-openj9 11.0.31.0-2.1
* java-11-openj9-demo 11.0.31.0-2.1
* java-11-openj9-devel 11.0.31.0-2.1
* java-11-openj9-headless 11.0.31.0-2.1
* java-11-openj9-javadoc 11.0.31.0-2.1
* java-11-openj9-jmods 11.0.31.0-2.1
* java-11-openj9-src 11.0.31.0-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-1188.html
openSUSE-SU-2026:10785-1: moderate: apache2-2.4.67-1.1 on GA media
# apache2-2.4.67-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10785-1
Rating: moderate
Cross-References:
* CVE-2026-23918
* CVE-2026-24072
* CVE-2026-28780
* CVE-2026-29168
* CVE-2026-29169
* CVE-2026-33006
* CVE-2026-33007
* CVE-2026-33523
* CVE-2026-33857
* CVE-2026-34032
* CVE-2026-34059
CVSS scores:
* CVE-2026-23918 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23918 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-24072 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-28780 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-28780 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-29168 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-29168 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-29169 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-29169 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33006 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33006 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-33007 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33007 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-33523 ( SUSE ): 8.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
* CVE-2026-33523 ( SUSE ): 9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:N
* CVE-2026-33857 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-33857 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34032 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-34032 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34059 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-34059 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 11 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the apache2-2.4.67-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* apache2 2.4.67-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-23918.html
* https://www.suse.com/security/cve/CVE-2026-24072.html
* https://www.suse.com/security/cve/CVE-2026-28780.html
* https://www.suse.com/security/cve/CVE-2026-29168.html
* https://www.suse.com/security/cve/CVE-2026-29169.html
* https://www.suse.com/security/cve/CVE-2026-33006.html
* https://www.suse.com/security/cve/CVE-2026-33007.html
* https://www.suse.com/security/cve/CVE-2026-33523.html
* https://www.suse.com/security/cve/CVE-2026-33857.html
* https://www.suse.com/security/cve/CVE-2026-34032.html
* https://www.suse.com/security/cve/CVE-2026-34059.html
openSUSE-SU-2026:10790-1: moderate: java-1_8_0-openj9-1.8.0.492-2.1 on GA media
# java-1_8_0-openj9-1.8.0.492-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10790-1
Rating: moderate
Cross-References:
* CVE-2026-1188
CVSS scores:
* CVE-2026-1188 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the java-1_8_0-openj9-1.8.0.492-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* java-1_8_0-openj9 1.8.0.492-2.1
* java-1_8_0-openj9-accessibility 1.8.0.492-2.1
* java-1_8_0-openj9-demo 1.8.0.492-2.1
* java-1_8_0-openj9-devel 1.8.0.492-2.1
* java-1_8_0-openj9-headless 1.8.0.492-2.1
* java-1_8_0-openj9-javadoc 1.8.0.492-2.1
* java-1_8_0-openj9-src 1.8.0.492-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-1188.html
openSUSE-SU-2026:10786-1: moderate: chromedriver-148.0.7778.167-2.1 on GA media
# chromedriver-148.0.7778.167-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10786-1
Rating: moderate
Cross-References:
* CVE-2026-8509
* CVE-2026-8510
* CVE-2026-8511
* CVE-2026-8512
* CVE-2026-8513
* CVE-2026-8514
* CVE-2026-8515
* CVE-2026-8516
* CVE-2026-8517
* CVE-2026-8518
* CVE-2026-8519
* CVE-2026-8520
* CVE-2026-8521
* CVE-2026-8522
* CVE-2026-8523
* CVE-2026-8524
* CVE-2026-8525
* CVE-2026-8526
* CVE-2026-8527
* CVE-2026-8528
* CVE-2026-8529
* CVE-2026-8530
* CVE-2026-8531
* CVE-2026-8532
* CVE-2026-8533
* CVE-2026-8534
* CVE-2026-8535
* CVE-2026-8536
* CVE-2026-8537
* CVE-2026-8538
* CVE-2026-8539
* CVE-2026-8540
* CVE-2026-8541
* CVE-2026-8542
* CVE-2026-8543
* CVE-2026-8544
* CVE-2026-8545
* CVE-2026-8546
* CVE-2026-8547
* CVE-2026-8548
* CVE-2026-8549
* CVE-2026-8550
* CVE-2026-8551
* CVE-2026-8552
* CVE-2026-8553
* CVE-2026-8554
* CVE-2026-8555
* CVE-2026-8556
* CVE-2026-8557
* CVE-2026-8558
* CVE-2026-8559
* CVE-2026-8560
* CVE-2026-8561
* CVE-2026-8562
* CVE-2026-8563
* CVE-2026-8564
* CVE-2026-8565
* CVE-2026-8566
* CVE-2026-8567
* CVE-2026-8568
* CVE-2026-8569
* CVE-2026-8570
* CVE-2026-8571
* CVE-2026-8572
* CVE-2026-8573
* CVE-2026-8574
* CVE-2026-8575
* CVE-2026-8576
* CVE-2026-8577
* CVE-2026-8578
* CVE-2026-8579
* CVE-2026-8580
* CVE-2026-8581
* CVE-2026-8582
* CVE-2026-8583
* CVE-2026-8584
* CVE-2026-8585
* CVE-2026-8586
* CVE-2026-8587
Affected Products:
* openSUSE Tumbleweed
An update that solves 79 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the chromedriver-148.0.7778.167-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* chromedriver 148.0.7778.167-2.1
* chromium 148.0.7778.167-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-8509.html
* https://www.suse.com/security/cve/CVE-2026-8510.html
* https://www.suse.com/security/cve/CVE-2026-8511.html
* https://www.suse.com/security/cve/CVE-2026-8512.html
* https://www.suse.com/security/cve/CVE-2026-8513.html
* https://www.suse.com/security/cve/CVE-2026-8514.html
* https://www.suse.com/security/cve/CVE-2026-8515.html
* https://www.suse.com/security/cve/CVE-2026-8516.html
* https://www.suse.com/security/cve/CVE-2026-8517.html
* https://www.suse.com/security/cve/CVE-2026-8518.html
* https://www.suse.com/security/cve/CVE-2026-8519.html
* https://www.suse.com/security/cve/CVE-2026-8520.html
* https://www.suse.com/security/cve/CVE-2026-8521.html
* https://www.suse.com/security/cve/CVE-2026-8522.html
* https://www.suse.com/security/cve/CVE-2026-8523.html
* https://www.suse.com/security/cve/CVE-2026-8524.html
* https://www.suse.com/security/cve/CVE-2026-8525.html
* https://www.suse.com/security/cve/CVE-2026-8526.html
* https://www.suse.com/security/cve/CVE-2026-8527.html
* https://www.suse.com/security/cve/CVE-2026-8528.html
* https://www.suse.com/security/cve/CVE-2026-8529.html
* https://www.suse.com/security/cve/CVE-2026-8530.html
* https://www.suse.com/security/cve/CVE-2026-8531.html
* https://www.suse.com/security/cve/CVE-2026-8532.html
* https://www.suse.com/security/cve/CVE-2026-8533.html
* https://www.suse.com/security/cve/CVE-2026-8534.html
* https://www.suse.com/security/cve/CVE-2026-8535.html
* https://www.suse.com/security/cve/CVE-2026-8536.html
* https://www.suse.com/security/cve/CVE-2026-8537.html
* https://www.suse.com/security/cve/CVE-2026-8538.html
* https://www.suse.com/security/cve/CVE-2026-8539.html
* https://www.suse.com/security/cve/CVE-2026-8540.html
* https://www.suse.com/security/cve/CVE-2026-8541.html
* https://www.suse.com/security/cve/CVE-2026-8542.html
* https://www.suse.com/security/cve/CVE-2026-8543.html
* https://www.suse.com/security/cve/CVE-2026-8544.html
* https://www.suse.com/security/cve/CVE-2026-8545.html
* https://www.suse.com/security/cve/CVE-2026-8546.html
* https://www.suse.com/security/cve/CVE-2026-8547.html
* https://www.suse.com/security/cve/CVE-2026-8548.html
* https://www.suse.com/security/cve/CVE-2026-8549.html
* https://www.suse.com/security/cve/CVE-2026-8550.html
* https://www.suse.com/security/cve/CVE-2026-8551.html
* https://www.suse.com/security/cve/CVE-2026-8552.html
* https://www.suse.com/security/cve/CVE-2026-8553.html
* https://www.suse.com/security/cve/CVE-2026-8554.html
* https://www.suse.com/security/cve/CVE-2026-8555.html
* https://www.suse.com/security/cve/CVE-2026-8556.html
* https://www.suse.com/security/cve/CVE-2026-8557.html
* https://www.suse.com/security/cve/CVE-2026-8558.html
* https://www.suse.com/security/cve/CVE-2026-8559.html
* https://www.suse.com/security/cve/CVE-2026-8560.html
* https://www.suse.com/security/cve/CVE-2026-8561.html
* https://www.suse.com/security/cve/CVE-2026-8562.html
* https://www.suse.com/security/cve/CVE-2026-8563.html
* https://www.suse.com/security/cve/CVE-2026-8564.html
* https://www.suse.com/security/cve/CVE-2026-8565.html
* https://www.suse.com/security/cve/CVE-2026-8566.html
* https://www.suse.com/security/cve/CVE-2026-8567.html
* https://www.suse.com/security/cve/CVE-2026-8568.html
* https://www.suse.com/security/cve/CVE-2026-8569.html
* https://www.suse.com/security/cve/CVE-2026-8570.html
* https://www.suse.com/security/cve/CVE-2026-8571.html
* https://www.suse.com/security/cve/CVE-2026-8572.html
* https://www.suse.com/security/cve/CVE-2026-8573.html
* https://www.suse.com/security/cve/CVE-2026-8574.html
* https://www.suse.com/security/cve/CVE-2026-8575.html
* https://www.suse.com/security/cve/CVE-2026-8576.html
* https://www.suse.com/security/cve/CVE-2026-8577.html
* https://www.suse.com/security/cve/CVE-2026-8578.html
* https://www.suse.com/security/cve/CVE-2026-8579.html
* https://www.suse.com/security/cve/CVE-2026-8580.html
* https://www.suse.com/security/cve/CVE-2026-8581.html
* https://www.suse.com/security/cve/CVE-2026-8582.html
* https://www.suse.com/security/cve/CVE-2026-8583.html
* https://www.suse.com/security/cve/CVE-2026-8584.html
* https://www.suse.com/security/cve/CVE-2026-8585.html
* https://www.suse.com/security/cve/CVE-2026-8586.html
* https://www.suse.com/security/cve/CVE-2026-8587.html
openSUSE-SU-2026:10787-1: moderate: expat-2.8.1-1.1 on GA media
# expat-2.8.1-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10787-1
Rating: moderate
Cross-References:
* CVE-2026-41080
* CVE-2026-45186
CVSS scores:
* CVE-2026-41080 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-41080 ( SUSE ): 2 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-45186 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the expat-2.8.1-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* expat 2.8.1-1.1
* libexpat-devel 2.8.1-1.1
* libexpat-devel-32bit 2.8.1-1.1
* libexpat1 2.8.1-1.1
* libexpat1-32bit 2.8.1-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-41080.html
* https://www.suse.com/security/cve/CVE-2026-45186.html
openSUSE-SU-2026:10791-1: moderate: java-21-openj9-21.0.11.0-2.1 on GA media
# java-21-openj9-21.0.11.0-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10791-1
Rating: moderate
Cross-References:
* CVE-2026-1188
CVSS scores:
* CVE-2026-1188 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the java-21-openj9-21.0.11.0-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* java-21-openj9 21.0.11.0-2.1
* java-21-openj9-demo 21.0.11.0-2.1
* java-21-openj9-devel 21.0.11.0-2.1
* java-21-openj9-headless 21.0.11.0-2.1
* java-21-openj9-javadoc 21.0.11.0-2.1
* java-21-openj9-jmods 21.0.11.0-2.1
* java-21-openj9-src 21.0.11.0-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-1188.html