openSUSE-SU-2026:10146-1: moderate: libpainter0-0.9.27-1.1 on GA media
openSUSE-SU-2026:10143-1: moderate: traefik2-2.11.35-1.1 on GA media
openSUSE-SU-2026:10145-1: moderate: python312-Django6-6.0.2-1.1 on GA media
openSUSE-SU-2026:10144-1: moderate: expat-2.7.4-1.1 on GA media
SUSE-SU-2026:0388-1: important: Security update for MozillaThunderbird
SUSE-SU-2026:0389-1: important: Security update for java-1_8_0-openj9
SUSE-SU-2026:0390-1: important: Security update for java-1_8_0-ibm
SUSE-SU-2026:0391-1: low: Security update for libxml2
SUSE-SU-2026:0394-1: moderate: Security update for xen
openSUSE-SU-2026:10146-1: moderate: libpainter0-0.9.27-1.1 on GA media
# libpainter0-0.9.27-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10146-1
Rating: moderate
Cross-References:
* CVE-2025-68670
CVSS scores:
* CVE-2025-68670 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68670 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the libpainter0-0.9.27-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libpainter0 0.9.27-1.1
* librfxencode0 0.9.27-1.1
* xrdp 0.9.27-1.1
* xrdp-devel 0.9.27-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-68670.html
openSUSE-SU-2026:10143-1: moderate: traefik2-2.11.35-1.1 on GA media
# traefik2-2.11.35-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10143-1
Rating: moderate
Cross-References:
* CVE-2025-54386
* CVE-2025-58181
* CVE-2025-66490
* CVE-2026-22045
CVSS scores:
* CVE-2025-58181 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58181 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-66490 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-66490 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* openSUSE Tumbleweed
An update that solves 4 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the traefik2-2.11.35-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* traefik2 2.11.35-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-54386.html
* https://www.suse.com/security/cve/CVE-2025-58181.html
* https://www.suse.com/security/cve/CVE-2025-66490.html
* https://www.suse.com/security/cve/CVE-2026-22045.html
openSUSE-SU-2026:10145-1: moderate: python312-Django6-6.0.2-1.1 on GA media
# python312-Django6-6.0.2-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10145-1
Rating: moderate
Cross-References:
* CVE-2025-13473
* CVE-2025-14550
* CVE-2026-1207
* CVE-2026-1285
* CVE-2026-1287
* CVE-2026-1312
CVSS scores:
* CVE-2025-13473 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-14550 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-1207 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-1285 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-1287 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-1312 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves 6 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the python312-Django6-6.0.2-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python312-Django6 6.0.2-1.1
* python313-Django6 6.0.2-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-13473.html
* https://www.suse.com/security/cve/CVE-2025-14550.html
* https://www.suse.com/security/cve/CVE-2026-1207.html
* https://www.suse.com/security/cve/CVE-2026-1285.html
* https://www.suse.com/security/cve/CVE-2026-1287.html
* https://www.suse.com/security/cve/CVE-2026-1312.html
openSUSE-SU-2026:10144-1: moderate: expat-2.7.4-1.1 on GA media
# expat-2.7.4-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10144-1
Rating: moderate
Cross-References:
* CVE-2026-24515
* CVE-2026-25210
CVSS scores:
* CVE-2026-24515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-24515 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-25210 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
* CVE-2026-25210 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the expat-2.7.4-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* expat 2.7.4-1.1
* libexpat-devel 2.7.4-1.1
* libexpat-devel-32bit 2.7.4-1.1
* libexpat1 2.7.4-1.1
* libexpat1-32bit 2.7.4-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-24515.html
* https://www.suse.com/security/cve/CVE-2026-25210.html
SUSE-SU-2026:0388-1: important: Security update for MozillaThunderbird
# Security update for MozillaThunderbird
Announcement ID: SUSE-SU-2026:0388-1
Release Date: 2026-02-05T11:14:26Z
Rating: important
References:
* bsc#1257397
Cross-References:
* CVE-2026-0818
CVSS scores:
* CVE-2026-0818 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-0818 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-0818 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Linux Enterprise Workstation Extension 15 SP7
* SUSE Package Hub 15 15-SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for MozillaThunderbird fixes the following issues:
Update to Mozilla Thunderbird 140.7.1 MFSA 2026-08 (bsc#1257397):
* CVE-2026-0818: CSS-based exfiltration of the content from partially
encrypted emails when allowing remote content
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-388=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-388=1
* SUSE Linux Enterprise Workstation Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-388=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-debugsource-140.7.1-150200.8.254.1
* MozillaThunderbird-140.7.1-150200.8.254.1
* MozillaThunderbird-debuginfo-140.7.1-150200.8.254.1
* MozillaThunderbird-translations-other-140.7.1-150200.8.254.1
* MozillaThunderbird-translations-common-140.7.1-150200.8.254.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
* MozillaThunderbird-debugsource-140.7.1-150200.8.254.1
* MozillaThunderbird-140.7.1-150200.8.254.1
* MozillaThunderbird-debuginfo-140.7.1-150200.8.254.1
* MozillaThunderbird-translations-other-140.7.1-150200.8.254.1
* MozillaThunderbird-translations-common-140.7.1-150200.8.254.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
* MozillaThunderbird-debugsource-140.7.1-150200.8.254.1
* MozillaThunderbird-140.7.1-150200.8.254.1
* MozillaThunderbird-debuginfo-140.7.1-150200.8.254.1
* MozillaThunderbird-translations-other-140.7.1-150200.8.254.1
* MozillaThunderbird-translations-common-140.7.1-150200.8.254.1
## References:
* https://www.suse.com/security/cve/CVE-2026-0818.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257397
SUSE-SU-2026:0389-1: important: Security update for java-1_8_0-openj9
# Security update for java-1_8_0-openj9
Announcement ID: SUSE-SU-2026:0389-1
Release Date: 2026-02-05T14:22:27Z
Rating: important
References:
* bsc#1257034
* bsc#1257036
* bsc#1257037
* bsc#1257038
* jsc#PED-14507
Cross-References:
* CVE-2026-21925
* CVE-2026-21932
* CVE-2026-21933
* CVE-2026-21945
CVSS scores:
* CVE-2026-21925 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21925 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21932 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
* CVE-2026-21932 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
* CVE-2026-21933 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-21933 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-21945 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-21945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7
An update that solves four vulnerabilities and contains one feature can now be
installed.
## Description:
This update for java-1_8_0-openj9 fixes the following issues:
* CVE-2026-21925: Fixed a vulnerability in the Oracle Java SE component RMI.
(bsc#1257034)
* CVE-2026-21932: Fixed a vulnerability in the Oracle Java SE component AWT
and JavaFX. (bsc#1257036)
* CVE-2026-21933: Fixed a vulnerability in the Oracle Java SE component
Networking. (bsc#1257037)
* CVE-2026-21945: Fixed a vulnerability in the Oracle Java SE component
Security. (bsc#1257038)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-389=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-389=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openj9-src-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-demo-debuginfo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-accessibility-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-devel-debuginfo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-debugsource-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-headless-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-headless-debuginfo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-demo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-devel-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-debuginfo-1.8.0.482-150200.3.63.1
* openSUSE Leap 15.6 (noarch)
* java-1_8_0-openj9-javadoc-1.8.0.482-150200.3.63.1
* SUSE Package Hub 15 15-SP7 (ppc64le s390x)
* java-1_8_0-openj9-src-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-demo-debuginfo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-accessibility-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-devel-debuginfo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-debugsource-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-headless-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-headless-debuginfo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-demo-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-devel-1.8.0.482-150200.3.63.1
* java-1_8_0-openj9-debuginfo-1.8.0.482-150200.3.63.1
## References:
* https://www.suse.com/security/cve/CVE-2026-21925.html
* https://www.suse.com/security/cve/CVE-2026-21932.html
* https://www.suse.com/security/cve/CVE-2026-21933.html
* https://www.suse.com/security/cve/CVE-2026-21945.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257034
* https://bugzilla.suse.com/show_bug.cgi?id=1257036
* https://bugzilla.suse.com/show_bug.cgi?id=1257037
* https://bugzilla.suse.com/show_bug.cgi?id=1257038
* https://jira.suse.com/browse/PED-14507
SUSE-SU-2026:0390-1: important: Security update for java-1_8_0-ibm
# Security update for java-1_8_0-ibm
Announcement ID: SUSE-SU-2026:0390-1
Release Date: 2026-02-05T14:23:31Z
Rating: important
References:
* bsc#1257034
* bsc#1257036
* bsc#1257037
* bsc#1257038
* bsc#1257131
Cross-References:
* CVE-2026-21925
* CVE-2026-21932
* CVE-2026-21933
* CVE-2026-21945
CVSS scores:
* CVE-2026-21925 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21925 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21932 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
* CVE-2026-21932 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
* CVE-2026-21933 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-21933 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-21945 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-21945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Legacy Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves four vulnerabilities and has one security fix can now be
installed.
## Description:
This update for java-1_8_0-ibm fixes the following issues:
Security fixes:
- CVE-2026-21925: Fixed Oracle Java SE component RMI (bsc#1257034)
- CVE-2026-21932: Fixed Oracle Java SE component AWT and JavaFX (bsc#1257036)
- CVE-2026-21933: Fixed Oracle Java SE component Networking (bsc#1257037)
- CVE-2026-21945: Fixed Oracle Java SE component Security (bsc#1257038)
Other fixes:
* Upgrade to Java 8.0 Service Refresh 8 Fix Pack 60 (bsc#1257131)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-390=1
* Legacy Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2026-390=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-390=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-390=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-390=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-390=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-390=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-390=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-390=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-390=1
## Package List:
* openSUSE Leap 15.6 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* openSUSE Leap 15.6 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-devel-32bit-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-32bit-1.8.0_sr8.60-150000.3.112.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-demo-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-src-1.8.0_sr8.60-150000.3.112.1
* Legacy Module 15-SP7 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* Legacy Module 15-SP7 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-demo-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-src-1.8.0_sr8.60-150000.3.112.1
* Legacy Module 15-SP7 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.60-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.60-150000.3.112.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.60-150000.3.112.1
## References:
* https://www.suse.com/security/cve/CVE-2026-21925.html
* https://www.suse.com/security/cve/CVE-2026-21932.html
* https://www.suse.com/security/cve/CVE-2026-21933.html
* https://www.suse.com/security/cve/CVE-2026-21945.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257034
* https://bugzilla.suse.com/show_bug.cgi?id=1257036
* https://bugzilla.suse.com/show_bug.cgi?id=1257037
* https://bugzilla.suse.com/show_bug.cgi?id=1257038
* https://bugzilla.suse.com/show_bug.cgi?id=1257131
SUSE-SU-2026:0391-1: low: Security update for libxml2
# Security update for libxml2
Announcement ID: SUSE-SU-2026:0391-1
Release Date: 2026-02-05T14:23:48Z
Rating: low
References:
* bsc#1256805
Cross-References:
* CVE-2026-0989
CVSS scores:
* CVE-2026-0989 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0989 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-0989 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Micro 5.5
An update that solves one vulnerability can now be installed.
## Description:
This update for libxml2 fixes the following issues:
* CVE-2026-0989: Fixed call stack exhaustion leading to application crash due
to RelaxNG parser not limiting the recursion depth when resolving
`<include>` directives (bsc#1256805)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-391=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-391=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-391=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python311-libxml2-debuginfo-2.10.3-150500.5.35.1
* libxml2-python-debugsource-2.10.3-150500.5.35.1
* libxml2-debugsource-2.10.3-150500.5.35.1
* python3-libxml2-debuginfo-2.10.3-150500.5.35.1
* libxml2-2-2.10.3-150500.5.35.1
* libxml2-tools-2.10.3-150500.5.35.1
* python311-libxml2-2.10.3-150500.5.35.1
* libxml2-tools-debuginfo-2.10.3-150500.5.35.1
* python3-libxml2-2.10.3-150500.5.35.1
* libxml2-2-debuginfo-2.10.3-150500.5.35.1
* libxml2-devel-2.10.3-150500.5.35.1
* openSUSE Leap 15.6 (x86_64)
* libxml2-devel-32bit-2.10.3-150500.5.35.1
* libxml2-2-32bit-2.10.3-150500.5.35.1
* libxml2-2-32bit-debuginfo-2.10.3-150500.5.35.1
* openSUSE Leap 15.6 (noarch)
* libxml2-doc-2.10.3-150500.5.35.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libxml2-python-debugsource-2.10.3-150500.5.35.1
* libxml2-debugsource-2.10.3-150500.5.35.1
* python3-libxml2-debuginfo-2.10.3-150500.5.35.1
* libxml2-2-2.10.3-150500.5.35.1
* libxml2-tools-2.10.3-150500.5.35.1
* libxml2-tools-debuginfo-2.10.3-150500.5.35.1
* python3-libxml2-2.10.3-150500.5.35.1
* libxml2-2-debuginfo-2.10.3-150500.5.35.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* python311-libxml2-debuginfo-2.10.3-150500.5.35.1
* libxml2-python-debugsource-2.10.3-150500.5.35.1
* libxml2-debugsource-2.10.3-150500.5.35.1
* python3-libxml2-debuginfo-2.10.3-150500.5.35.1
* libxml2-2-2.10.3-150500.5.35.1
* libxml2-tools-2.10.3-150500.5.35.1
* python311-libxml2-2.10.3-150500.5.35.1
* libxml2-tools-debuginfo-2.10.3-150500.5.35.1
* python3-libxml2-2.10.3-150500.5.35.1
* libxml2-2-debuginfo-2.10.3-150500.5.35.1
* libxml2-devel-2.10.3-150500.5.35.1
* openSUSE Leap 15.5 (x86_64)
* libxml2-devel-32bit-2.10.3-150500.5.35.1
* libxml2-2-32bit-2.10.3-150500.5.35.1
* libxml2-2-32bit-debuginfo-2.10.3-150500.5.35.1
* openSUSE Leap 15.5 (noarch)
* libxml2-doc-2.10.3-150500.5.35.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libxml2-2-64bit-debuginfo-2.10.3-150500.5.35.1
* libxml2-2-64bit-2.10.3-150500.5.35.1
* libxml2-devel-64bit-2.10.3-150500.5.35.1
## References:
* https://www.suse.com/security/cve/CVE-2026-0989.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256805
SUSE-SU-2026:0394-1: moderate: Security update for xen
# Security update for xen
Announcement ID: SUSE-SU-2026:0394-1
Release Date: 2026-02-05T15:42:11Z
Rating: moderate
References:
* bsc#1252692
* bsc#1254180
* bsc#1256745
* bsc#1256747
Cross-References:
* CVE-2025-58149
* CVE-2025-58150
* CVE-2026-23553
CVSS scores:
* CVE-2025-58149 ( SUSE ): 4.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2025-58149 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2025-58149 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-58150 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58150 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-58150 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-23553 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-23553 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
An update that solves three vulnerabilities and has one security fix can now be
installed.
## Description:
This update for xen fixes the following issues:
Security fixes:
* CVE-2025-58150: Fixed buffer overrun with shadow paging and tracing
(XSA-477) (bsc#1256745)
* CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation (XSA-479)
(bsc#1256747)
* CVE-2025-58149: Fixed incorrect removal od permissions on PCI device unplug
allow PV guests to access memory of devices no longer assigned to it
(XSA-476) (bsc#1252692)
Other fixes:
* Fixed virtxend service restart. Caused by a failure to start xenstored
(bsc#1254180)
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-394=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-394=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-394=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-394=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-394=1
## Package List:
* openSUSE Leap 15.4 (aarch64 x86_64 i586)
* xen-debugsource-4.16.7_06-150400.4.78.1
* xen-tools-domU-debuginfo-4.16.7_06-150400.4.78.1
* xen-libs-4.16.7_06-150400.4.78.1
* xen-tools-domU-4.16.7_06-150400.4.78.1
* xen-devel-4.16.7_06-150400.4.78.1
* xen-libs-debuginfo-4.16.7_06-150400.4.78.1
* openSUSE Leap 15.4 (x86_64)
* xen-libs-32bit-4.16.7_06-150400.4.78.1
* xen-libs-32bit-debuginfo-4.16.7_06-150400.4.78.1
* openSUSE Leap 15.4 (aarch64 x86_64)
* xen-tools-4.16.7_06-150400.4.78.1
* xen-tools-debuginfo-4.16.7_06-150400.4.78.1
* xen-4.16.7_06-150400.4.78.1
* xen-doc-html-4.16.7_06-150400.4.78.1
* openSUSE Leap 15.4 (noarch)
* xen-tools-xendomains-wait-disk-4.16.7_06-150400.4.78.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* xen-libs-64bit-4.16.7_06-150400.4.78.1
* xen-libs-64bit-debuginfo-4.16.7_06-150400.4.78.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* xen-libs-debuginfo-4.16.7_06-150400.4.78.1
* xen-libs-4.16.7_06-150400.4.78.1
* xen-debugsource-4.16.7_06-150400.4.78.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* xen-libs-debuginfo-4.16.7_06-150400.4.78.1
* xen-libs-4.16.7_06-150400.4.78.1
* xen-debugsource-4.16.7_06-150400.4.78.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* xen-libs-debuginfo-4.16.7_06-150400.4.78.1
* xen-libs-4.16.7_06-150400.4.78.1
* xen-debugsource-4.16.7_06-150400.4.78.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* xen-libs-debuginfo-4.16.7_06-150400.4.78.1
* xen-libs-4.16.7_06-150400.4.78.1
* xen-debugsource-4.16.7_06-150400.4.78.1
## References:
* https://www.suse.com/security/cve/CVE-2025-58149.html
* https://www.suse.com/security/cve/CVE-2025-58150.html
* https://www.suse.com/security/cve/CVE-2026-23553.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252692
* https://bugzilla.suse.com/show_bug.cgi?id=1254180
* https://bugzilla.suse.com/show_bug.cgi?id=1256745
* https://bugzilla.suse.com/show_bug.cgi?id=1256747