SUSE 5552 Published by

Multiple security updates are available for various packages, including libpainter0, traefik2, python312-Django6, expat, and others. The updates address several vulnerabilities, ranging from moderate to important severity, and affect various products such as openSUSE Tumbleweed, openSUSE Leap 15.6, SUSE Linux Enterprise Desktop 15 SP7, and others. Some of the specific security fixes include CVE-2025-68670 in libpainter0, CVE-2025-54386 and others in traefik2, and CVE-2026-21925 and others in java-1_8_0-openj9. The updates are available for installation via YaST online_update or "zypper patch" commands.

openSUSE-SU-2026:10146-1: moderate: libpainter0-0.9.27-1.1 on GA media
openSUSE-SU-2026:10143-1: moderate: traefik2-2.11.35-1.1 on GA media
openSUSE-SU-2026:10145-1: moderate: python312-Django6-6.0.2-1.1 on GA media
openSUSE-SU-2026:10144-1: moderate: expat-2.7.4-1.1 on GA media
SUSE-SU-2026:0388-1: important: Security update for MozillaThunderbird
SUSE-SU-2026:0389-1: important: Security update for java-1_8_0-openj9
SUSE-SU-2026:0390-1: important: Security update for java-1_8_0-ibm
SUSE-SU-2026:0391-1: low: Security update for libxml2
SUSE-SU-2026:0394-1: moderate: Security update for xen




openSUSE-SU-2026:10146-1: moderate: libpainter0-0.9.27-1.1 on GA media


# libpainter0-0.9.27-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10146-1
Rating: moderate

Cross-References:

* CVE-2025-68670

CVSS scores:

* CVE-2025-68670 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68670 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the libpainter0-0.9.27-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libpainter0 0.9.27-1.1
* librfxencode0 0.9.27-1.1
* xrdp 0.9.27-1.1
* xrdp-devel 0.9.27-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-68670.html



openSUSE-SU-2026:10143-1: moderate: traefik2-2.11.35-1.1 on GA media


# traefik2-2.11.35-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10143-1
Rating: moderate

Cross-References:

* CVE-2025-54386
* CVE-2025-58181
* CVE-2025-66490
* CVE-2026-22045

CVSS scores:

* CVE-2025-58181 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58181 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-66490 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-66490 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Tumbleweed

An update that solves 4 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the traefik2-2.11.35-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* traefik2 2.11.35-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-54386.html
* https://www.suse.com/security/cve/CVE-2025-58181.html
* https://www.suse.com/security/cve/CVE-2025-66490.html
* https://www.suse.com/security/cve/CVE-2026-22045.html



openSUSE-SU-2026:10145-1: moderate: python312-Django6-6.0.2-1.1 on GA media


# python312-Django6-6.0.2-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10145-1
Rating: moderate

Cross-References:

* CVE-2025-13473
* CVE-2025-14550
* CVE-2026-1207
* CVE-2026-1285
* CVE-2026-1287
* CVE-2026-1312

CVSS scores:

* CVE-2025-13473 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-14550 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-1207 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-1285 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-1287 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-1312 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Tumbleweed

An update that solves 6 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the python312-Django6-6.0.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python312-Django6 6.0.2-1.1
* python313-Django6 6.0.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-13473.html
* https://www.suse.com/security/cve/CVE-2025-14550.html
* https://www.suse.com/security/cve/CVE-2026-1207.html
* https://www.suse.com/security/cve/CVE-2026-1285.html
* https://www.suse.com/security/cve/CVE-2026-1287.html
* https://www.suse.com/security/cve/CVE-2026-1312.html



openSUSE-SU-2026:10144-1: moderate: expat-2.7.4-1.1 on GA media


# expat-2.7.4-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10144-1
Rating: moderate

Cross-References:

* CVE-2026-24515
* CVE-2026-25210

CVSS scores:

* CVE-2026-24515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-24515 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-25210 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
* CVE-2026-25210 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the expat-2.7.4-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* expat 2.7.4-1.1
* libexpat-devel 2.7.4-1.1
* libexpat-devel-32bit 2.7.4-1.1
* libexpat1 2.7.4-1.1
* libexpat1-32bit 2.7.4-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-24515.html
* https://www.suse.com/security/cve/CVE-2026-25210.html



SUSE-SU-2026:0388-1: important: Security update for MozillaThunderbird


# Security update for MozillaThunderbird

Announcement ID: SUSE-SU-2026:0388-1
Release Date: 2026-02-05T11:14:26Z
Rating: important
References:

* bsc#1257397

Cross-References:

* CVE-2026-0818

CVSS scores:

* CVE-2026-0818 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-0818 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-0818 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Linux Enterprise Workstation Extension 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for MozillaThunderbird fixes the following issues:

Update to Mozilla Thunderbird 140.7.1 MFSA 2026-08 (bsc#1257397):

* CVE-2026-0818: CSS-based exfiltration of the content from partially
encrypted emails when allowing remote content

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-388=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-388=1

* SUSE Linux Enterprise Workstation Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-388=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-debugsource-140.7.1-150200.8.254.1
* MozillaThunderbird-140.7.1-150200.8.254.1
* MozillaThunderbird-debuginfo-140.7.1-150200.8.254.1
* MozillaThunderbird-translations-other-140.7.1-150200.8.254.1
* MozillaThunderbird-translations-common-140.7.1-150200.8.254.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
* MozillaThunderbird-debugsource-140.7.1-150200.8.254.1
* MozillaThunderbird-140.7.1-150200.8.254.1
* MozillaThunderbird-debuginfo-140.7.1-150200.8.254.1
* MozillaThunderbird-translations-other-140.7.1-150200.8.254.1
* MozillaThunderbird-translations-common-140.7.1-150200.8.254.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
* MozillaThunderbird-debugsource-140.7.1-150200.8.254.1
* MozillaThunderbird-140.7.1-150200.8.254.1
* MozillaThunderbird-debuginfo-140.7.1-150200.8.254.1
* MozillaThunderbird-translations-other-140.7.1-150200.8.254.1
* MozillaThunderbird-translations-common-140.7.1-150200.8.254.1

## References:

* https://www.suse.com/security/cve/CVE-2026-0818.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257397



SUSE-SU-2026:0389-1: important: Security update for java-1_8_0-openj9


# Security update for java-1_8_0-openj9

Announcement ID: SUSE-SU-2026:0389-1
Release Date: 2026-02-05T14:22:27Z
Rating: important
References:

* bsc#1257034
* bsc#1257036
* bsc#1257037
* bsc#1257038
* jsc#PED-14507

Cross-References:

* CVE-2026-21925
* CVE-2026-21932
* CVE-2026-21933
* CVE-2026-21945

CVSS scores:

* CVE-2026-21925 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21925 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21932 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
* CVE-2026-21932 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
* CVE-2026-21933 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-21933 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-21945 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-21945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves four vulnerabilities and contains one feature can now be
installed.

## Description:

This update for java-1_8_0-openj9 fixes the following issues:

* CVE-2026-21925: Fixed a vulnerability in the Oracle Java SE component RMI.
(bsc#1257034)
* CVE-2026-21932: Fixed a vulnerability in the Oracle Java SE component AWT
and JavaFX. (bsc#1257036)
* CVE-2026-21933: Fixed a vulnerability in the Oracle Java SE component
Networking. (bsc#1257037)
* CVE-2026-21945: Fixed a vulnerability in the Oracle Java SE component
Security. (bsc#1257038)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-389=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-389=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openj9-src-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-demo-debuginfo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-accessibility-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-devel-debuginfo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-debugsource-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-headless-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-headless-debuginfo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-demo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-devel-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-debuginfo-1.8.0.482-150200.3.63.1
* openSUSE Leap 15.6 (noarch)
* java-1_8_0-openj9-javadoc-1.8.0.482-150200.3.63.1
* SUSE Package Hub 15 15-SP7 (ppc64le s390x)
* java-1_8_0-openj9-src-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-demo-debuginfo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-accessibility-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-devel-debuginfo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-debugsource-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-headless-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-headless-debuginfo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-demo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-devel-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-debuginfo-1.8.0.482-150200.3.63.1

## References:

* https://www.suse.com/security/cve/CVE-2026-21925.html
* https://www.suse.com/security/cve/CVE-2026-21932.html
* https://www.suse.com/security/cve/CVE-2026-21933.html
* https://www.suse.com/security/cve/CVE-2026-21945.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257034
* https://bugzilla.suse.com/show_bug.cgi?id=1257036
* https://bugzilla.suse.com/show_bug.cgi?id=1257037
* https://bugzilla.suse.com/show_bug.cgi?id=1257038
* https://jira.suse.com/browse/PED-14507



SUSE-SU-2026:0390-1: important: Security update for java-1_8_0-ibm


# Security update for java-1_8_0-ibm

Announcement ID: SUSE-SU-2026:0390-1
Release Date: 2026-02-05T14:23:31Z
Rating: important
References:

* bsc#1257034
* bsc#1257036
* bsc#1257037
* bsc#1257038
* bsc#1257131

Cross-References:

* CVE-2026-21925
* CVE-2026-21932
* CVE-2026-21933
* CVE-2026-21945

CVSS scores:

* CVE-2026-21925 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21925 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21932 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
* CVE-2026-21932 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
* CVE-2026-21933 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-21933 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-21945 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-21945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Legacy Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves four vulnerabilities and has one security fix can now be
installed.

## Description:

This update for java-1_8_0-ibm fixes the following issues:

Security fixes:

- CVE-2026-21925: Fixed Oracle Java SE component RMI (bsc#1257034)
- CVE-2026-21932: Fixed Oracle Java SE component AWT and JavaFX (bsc#1257036)
- CVE-2026-21933: Fixed Oracle Java SE component Networking (bsc#1257037)
- CVE-2026-21945: Fixed Oracle Java SE component Security (bsc#1257038)

Other fixes:

* Upgrade to Java 8.0 Service Refresh 8 Fix Pack 60 (bsc#1257131)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-390=1

* Legacy Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2026-390=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-390=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-390=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-390=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-390=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-390=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-390=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-390=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-390=1

## Package List:

* openSUSE Leap 15.6 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* openSUSE Leap 15.6 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-devel-32bit-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-32bit-1.8.0_sr8.60-150000.3.112.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-demo-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-src-1.8.0_sr8.60-150000.3.112.1
* Legacy Module 15-SP7 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* Legacy Module 15-SP7 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-demo-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-src-1.8.0_sr8.60-150000.3.112.1
* Legacy Module 15-SP7 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1

## References:

* https://www.suse.com/security/cve/CVE-2026-21925.html
* https://www.suse.com/security/cve/CVE-2026-21932.html
* https://www.suse.com/security/cve/CVE-2026-21933.html
* https://www.suse.com/security/cve/CVE-2026-21945.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257034
* https://bugzilla.suse.com/show_bug.cgi?id=1257036
* https://bugzilla.suse.com/show_bug.cgi?id=1257037
* https://bugzilla.suse.com/show_bug.cgi?id=1257038
* https://bugzilla.suse.com/show_bug.cgi?id=1257131



SUSE-SU-2026:0391-1: low: Security update for libxml2


# Security update for libxml2

Announcement ID: SUSE-SU-2026:0391-1
Release Date: 2026-02-05T14:23:48Z
Rating: low
References:

* bsc#1256805

Cross-References:

* CVE-2026-0989

CVSS scores:

* CVE-2026-0989 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0989 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-0989 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Micro 5.5

An update that solves one vulnerability can now be installed.

## Description:

This update for libxml2 fixes the following issues:

* CVE-2026-0989: Fixed call stack exhaustion leading to application crash due
to RelaxNG parser not limiting the recursion depth when resolving
`<include>` directives (bsc#1256805)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-391=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-391=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-391=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python311-libxml2-debuginfo-2.10.3-150500.5.35.1
* libxml2-python-debugsource-2.10.3-150500.5.35.1
* libxml2-debugsource-2.10.3-150500.5.35.1
* python3-libxml2-debuginfo-2.10.3-150500.5.35.1
* libxml2-2-2.10.3-150500.5.35.1
* libxml2-tools-2.10.3-150500.5.35.1
* python311-libxml2-2.10.3-150500.5.35.1
* libxml2-tools-debuginfo-2.10.3-150500.5.35.1
* python3-libxml2-2.10.3-150500.5.35.1
* libxml2-2-debuginfo-2.10.3-150500.5.35.1
* libxml2-devel-2.10.3-150500.5.35.1
* openSUSE Leap 15.6 (x86_64)
* libxml2-devel-32bit-2.10.3-150500.5.35.1
* libxml2-2-32bit-2.10.3-150500.5.35.1
* libxml2-2-32bit-debuginfo-2.10.3-150500.5.35.1
* openSUSE Leap 15.6 (noarch)
* libxml2-doc-2.10.3-150500.5.35.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libxml2-python-debugsource-2.10.3-150500.5.35.1
* libxml2-debugsource-2.10.3-150500.5.35.1
* python3-libxml2-debuginfo-2.10.3-150500.5.35.1
* libxml2-2-2.10.3-150500.5.35.1
* libxml2-tools-2.10.3-150500.5.35.1
* libxml2-tools-debuginfo-2.10.3-150500.5.35.1
* python3-libxml2-2.10.3-150500.5.35.1
* libxml2-2-debuginfo-2.10.3-150500.5.35.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* python311-libxml2-debuginfo-2.10.3-150500.5.35.1
* libxml2-python-debugsource-2.10.3-150500.5.35.1
* libxml2-debugsource-2.10.3-150500.5.35.1
* python3-libxml2-debuginfo-2.10.3-150500.5.35.1
* libxml2-2-2.10.3-150500.5.35.1
* libxml2-tools-2.10.3-150500.5.35.1
* python311-libxml2-2.10.3-150500.5.35.1
* libxml2-tools-debuginfo-2.10.3-150500.5.35.1
* python3-libxml2-2.10.3-150500.5.35.1
* libxml2-2-debuginfo-2.10.3-150500.5.35.1
* libxml2-devel-2.10.3-150500.5.35.1
* openSUSE Leap 15.5 (x86_64)
* libxml2-devel-32bit-2.10.3-150500.5.35.1
* libxml2-2-32bit-2.10.3-150500.5.35.1
* libxml2-2-32bit-debuginfo-2.10.3-150500.5.35.1
* openSUSE Leap 15.5 (noarch)
* libxml2-doc-2.10.3-150500.5.35.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libxml2-2-64bit-debuginfo-2.10.3-150500.5.35.1
* libxml2-2-64bit-2.10.3-150500.5.35.1
* libxml2-devel-64bit-2.10.3-150500.5.35.1

## References:

* https://www.suse.com/security/cve/CVE-2026-0989.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256805



SUSE-SU-2026:0394-1: moderate: Security update for xen


# Security update for xen

Announcement ID: SUSE-SU-2026:0394-1
Release Date: 2026-02-05T15:42:11Z
Rating: moderate
References:

* bsc#1252692
* bsc#1254180
* bsc#1256745
* bsc#1256747

Cross-References:

* CVE-2025-58149
* CVE-2025-58150
* CVE-2026-23553

CVSS scores:

* CVE-2025-58149 ( SUSE ): 4.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2025-58149 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2025-58149 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-58150 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58150 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-58150 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-23553 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-23553 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4

An update that solves three vulnerabilities and has one security fix can now be
installed.

## Description:

This update for xen fixes the following issues:

Security fixes:

* CVE-2025-58150: Fixed buffer overrun with shadow paging and tracing
(XSA-477) (bsc#1256745)
* CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation (XSA-479)
(bsc#1256747)
* CVE-2025-58149: Fixed incorrect removal od permissions on PCI device unplug
allow PV guests to access memory of devices no longer assigned to it
(XSA-476) (bsc#1252692)

Other fixes:

* Fixed virtxend service restart. Caused by a failure to start xenstored
(bsc#1254180)

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-394=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-394=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-394=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-394=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-394=1

## Package List:

* openSUSE Leap 15.4 (aarch64 x86_64 i586)
* xen-debugsource-4.16.7_06-150400.4.78.1
* xen-tools-domU-debuginfo-4.16.7_06-150400.4.78.1
* xen-libs-4.16.7_06-150400.4.78.1
* xen-tools-domU-4.16.7_06-150400.4.78.1
* xen-devel-4.16.7_06-150400.4.78.1
* xen-libs-debuginfo-4.16.7_06-150400.4.78.1
* openSUSE Leap 15.4 (x86_64)
* xen-libs-32bit-4.16.7_06-150400.4.78.1
* xen-libs-32bit-debuginfo-4.16.7_06-150400.4.78.1
* openSUSE Leap 15.4 (aarch64 x86_64)
* xen-tools-4.16.7_06-150400.4.78.1
* xen-tools-debuginfo-4.16.7_06-150400.4.78.1
* xen-4.16.7_06-150400.4.78.1
* xen-doc-html-4.16.7_06-150400.4.78.1
* openSUSE Leap 15.4 (noarch)
* xen-tools-xendomains-wait-disk-4.16.7_06-150400.4.78.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* xen-libs-64bit-4.16.7_06-150400.4.78.1
* xen-libs-64bit-debuginfo-4.16.7_06-150400.4.78.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* xen-libs-debuginfo-4.16.7_06-150400.4.78.1
* xen-libs-4.16.7_06-150400.4.78.1
* xen-debugsource-4.16.7_06-150400.4.78.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* xen-libs-debuginfo-4.16.7_06-150400.4.78.1
* xen-libs-4.16.7_06-150400.4.78.1
* xen-debugsource-4.16.7_06-150400.4.78.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* xen-libs-debuginfo-4.16.7_06-150400.4.78.1
* xen-libs-4.16.7_06-150400.4.78.1
* xen-debugsource-4.16.7_06-150400.4.78.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* xen-libs-debuginfo-4.16.7_06-150400.4.78.1
* xen-libs-4.16.7_06-150400.4.78.1
* xen-debugsource-4.16.7_06-150400.4.78.1

## References:

* https://www.suse.com/security/cve/CVE-2025-58149.html
* https://www.suse.com/security/cve/CVE-2025-58150.html
* https://www.suse.com/security/cve/CVE-2026-23553.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252692
* https://bugzilla.suse.com/show_bug.cgi?id=1254180
* https://bugzilla.suse.com/show_bug.cgi?id=1256745
* https://bugzilla.suse.com/show_bug.cgi?id=1256747