SUSE-SU-2026:1555-1: important: Security update for libraw
SUSE-SU-2026:1556-1: important: Security update for libraw
SUSE-SU-2026:1558-1: important: Security update for tomcat11
openSUSE-SU-2026:20609-1: important: Security update for google-guest-agent
openSUSE-SU-2026:20607-1: important: Security update for erlang
openSUSE-SU-2026:20612-1: important: Security update for tomcat10
openSUSE-SU-2026:20611-1: important: Security update for tomcat
openSUSE-SU-2026:20606-1: important: Security update for ImageMagick
openSUSE-SU-2026:20605-1: important: Security update for openexr
openSUSE-SU-2026:20603-1: important: Security update for ignition
openSUSE-SU-2026:20601-1: moderate: Security update for giflib
SUSE-SU-2026:1562-1: moderate: Security update for openssl-1_1
SUSE-SU-2026:1563-1: important: Security update for the Linux Kernel
SUSE-SU-2026:1565-1: moderate: Security update for libssh
SUSE-SU-2026:1560-1: important: Security update for the Linux Kernel (Live Patch 32 for SUSE Linux Enterprise 15 SP5)
openSUSE-SU-2026:0145-1: moderate: Security update for ocaml-patch, opam
openSUSE-SU-2026:0147-1: moderate: Security update for tor
openSUSE-SU-2026:10599-1: moderate: cacti-1.2.30+git306.82d5aef5-1.1 on GA media
openSUSE-SU-2026:10600-1: moderate: csync2-2.0+git.1600444747.83b3644-3.1 on GA media
openSUSE-SU-2026:10598-1: moderate: libtree-sitter0_26-0.26.8-1.1 on GA media
openSUSE-SU-2026:0151-1: critical: Security update for rclone
openSUSE-SU-2026:0150-1: important: Security update for flannel
openSUSE-SU-2026:0149-1: important: Security update for flannel
openSUSE-SU-2026:0148-1: critical: Security update for cacti, cacti-spine
SUSE-SU-2026:1568-1: moderate: Security update for haproxy
SUSE-SU-2026:1574-1: important: Security update for the Linux Kernel
SUSE-SU-2026:1577-1: important: Security update for openssl-1_1
SUSE-SU-2026:1576-1: important: Security update for gdk-pixbuf
SUSE-SU-2026:1555-1: important: Security update for libraw
# Security update for libraw
Announcement ID: SUSE-SU-2026:1555-1
Release Date: 2026-04-22T16:23:21Z
Rating: important
References:
* bsc#1261499
* bsc#1261671
* bsc#1261672
* bsc#1261673
* bsc#1261674
* bsc#1261675
* bsc#1261676
Cross-References:
* CVE-2026-20884
* CVE-2026-20889
* CVE-2026-20911
* CVE-2026-21413
* CVE-2026-24450
* CVE-2026-24660
* CVE-2026-5342
CVSS scores:
* CVE-2026-20884 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20884 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20884 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20884 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20889 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20889 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20889 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20911 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20911 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20911 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-21413 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21413 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-21413 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-24450 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-24450 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-24450 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-24450 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-24660 ( SUSE ): 7.5
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-24660 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-24660 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-24660 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-5342 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-5342 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-5342 ( NVD ): 5.5
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-5342 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Linux Enterprise Workstation Extension 15 SP7
* SUSE Package Hub 15 15-SP7
An update that solves seven vulnerabilities can now be installed.
## Description:
This update for libraw fixes the following issues:
* CVE-2026-5342: out-of-bounds read via `LibRaw::nikon_load_padded_packed_raw`
(bsc#1261499).
* CVE-2026-20884: integer overflow and heap buffer overflow via
`deflate_dng_load_raw` (bsc#1261671).
* CVE-2026-20889: heap-based buffer overflow in
`x3f_thumb_loader`(bsc#1261672).
* CVE-2026-20911: heap-based buffer overflow in
`HuffTable::initval`(bsc#1261673).
* CVE-2026-21413: heap-based buffer overflow in `lossless_jpeg_load_raw`
(bsc#1261674).
* CVE-2026-24450: integer overflow and heap buffer overflow via
`uncompressed_fp_dng_load_raw` (bsc#1261675).
* CVE-2026-24660: heap-based buffer overflow in `x3f_load_huffman`
(bsc#1261676).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1555=1
* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-1555=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-1555=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1555=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1555=1
* SUSE Linux Enterprise Workstation Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-1555=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libraw-debugsource-0.21.1-150600.3.10.1
* libraw-tools-0.21.1-150600.3.10.1
* libraw-devel-0.21.1-150600.3.10.1
* libraw23-0.21.1-150600.3.10.1
* libraw23-debuginfo-0.21.1-150600.3.10.1
* libraw-tools-debuginfo-0.21.1-150600.3.10.1
* libraw-devel-static-0.21.1-150600.3.10.1
* openSUSE Leap 15.6 (x86_64)
* libraw23-32bit-0.21.1-150600.3.10.1
* libraw23-32bit-debuginfo-0.21.1-150600.3.10.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libraw23-64bit-0.21.1-150600.3.10.1
* libraw23-64bit-debuginfo-0.21.1-150600.3.10.1
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libraw-debugsource-0.21.1-150600.3.10.1
* libraw23-debuginfo-0.21.1-150600.3.10.1
* libraw23-0.21.1-150600.3.10.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
* libraw-debugsource-0.21.1-150600.3.10.1
* libraw-tools-0.21.1-150600.3.10.1
* libraw-devel-0.21.1-150600.3.10.1
* libraw-tools-debuginfo-0.21.1-150600.3.10.1
* libraw-devel-static-0.21.1-150600.3.10.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libraw-debugsource-0.21.1-150600.3.10.1
* libraw23-debuginfo-0.21.1-150600.3.10.1
* libraw23-0.21.1-150600.3.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libraw-debugsource-0.21.1-150600.3.10.1
* libraw23-debuginfo-0.21.1-150600.3.10.1
* libraw23-0.21.1-150600.3.10.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
* libraw-debugsource-0.21.1-150600.3.10.1
* libraw-devel-0.21.1-150600.3.10.1
## References:
* https://www.suse.com/security/cve/CVE-2026-20884.html
* https://www.suse.com/security/cve/CVE-2026-20889.html
* https://www.suse.com/security/cve/CVE-2026-20911.html
* https://www.suse.com/security/cve/CVE-2026-21413.html
* https://www.suse.com/security/cve/CVE-2026-24450.html
* https://www.suse.com/security/cve/CVE-2026-24660.html
* https://www.suse.com/security/cve/CVE-2026-5342.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261499
* https://bugzilla.suse.com/show_bug.cgi?id=1261671
* https://bugzilla.suse.com/show_bug.cgi?id=1261672
* https://bugzilla.suse.com/show_bug.cgi?id=1261673
* https://bugzilla.suse.com/show_bug.cgi?id=1261674
* https://bugzilla.suse.com/show_bug.cgi?id=1261675
* https://bugzilla.suse.com/show_bug.cgi?id=1261676
SUSE-SU-2026:1556-1: important: Security update for libraw
# Security update for libraw
Announcement ID: SUSE-SU-2026:1556-1
Release Date: 2026-04-22T16:24:03Z
Rating: important
References:
* bsc#1261499
* bsc#1261671
* bsc#1261672
* bsc#1261673
* bsc#1261674
* bsc#1261676
Cross-References:
* CVE-2026-20884
* CVE-2026-20889
* CVE-2026-20911
* CVE-2026-21413
* CVE-2026-24660
* CVE-2026-5342
CVSS scores:
* CVE-2026-20884 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20884 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20884 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20884 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20889 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20889 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20889 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20911 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20911 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20911 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-21413 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21413 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-21413 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-24660 ( SUSE ): 7.5
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-24660 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-24660 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-24660 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-5342 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-5342 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-5342 ( NVD ): 5.5
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-5342 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves six vulnerabilities can now be installed.
## Description:
This update for libraw fixes the following issues:
* CVE-2026-5342: out-of-bounds read via `LibRaw::nikon_load_padded_packed_raw`
(bsc#1261499).
* CVE-2026-20884: integer overflow and heap buffer overflow via
`deflate_dng_load_raw` (bsc#1261671).
* CVE-2026-20889: heap-based buffer overflow in
`x3f_thumb_loader`(bsc#1261672).
* CVE-2026-20911: heap-based buffer overflow in
`HuffTable::initval`(bsc#1261673).
* CVE-2026-21413: heap-based buffer overflow in `lossless_jpeg_load_raw`
(bsc#1261674).
* CVE-2026-24660: heap-based buffer overflow in `x3f_load_huffman`
(bsc#1261676).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1556=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1556=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1556=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1556=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1556=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1556=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1556=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1556=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1556=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libraw-devel-static-0.20.2-150400.3.21.1
* libraw-tools-debuginfo-0.20.2-150400.3.21.1
* libraw20-0.20.2-150400.3.21.1
* libraw-debugsource-0.20.2-150400.3.21.1
* libraw-devel-0.20.2-150400.3.21.1
* libraw-tools-0.20.2-150400.3.21.1
* libraw20-debuginfo-0.20.2-150400.3.21.1
* openSUSE Leap 15.4 (x86_64)
* libraw20-32bit-debuginfo-0.20.2-150400.3.21.1
* libraw20-32bit-0.20.2-150400.3.21.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libraw20-64bit-0.20.2-150400.3.21.1
* libraw20-64bit-debuginfo-0.20.2-150400.3.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libraw20-0.20.2-150400.3.21.1
* libraw20-debuginfo-0.20.2-150400.3.21.1
* libraw-debugsource-0.20.2-150400.3.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libraw20-0.20.2-150400.3.21.1
* libraw20-debuginfo-0.20.2-150400.3.21.1
* libraw-debugsource-0.20.2-150400.3.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libraw20-0.20.2-150400.3.21.1
* libraw20-debuginfo-0.20.2-150400.3.21.1
* libraw-debugsource-0.20.2-150400.3.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libraw20-0.20.2-150400.3.21.1
* libraw20-debuginfo-0.20.2-150400.3.21.1
* libraw-debugsource-0.20.2-150400.3.21.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libraw20-0.20.2-150400.3.21.1
* libraw20-debuginfo-0.20.2-150400.3.21.1
* libraw-debugsource-0.20.2-150400.3.21.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libraw20-0.20.2-150400.3.21.1
* libraw20-debuginfo-0.20.2-150400.3.21.1
* libraw-debugsource-0.20.2-150400.3.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libraw20-0.20.2-150400.3.21.1
* libraw20-debuginfo-0.20.2-150400.3.21.1
* libraw-debugsource-0.20.2-150400.3.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libraw20-0.20.2-150400.3.21.1
* libraw20-debuginfo-0.20.2-150400.3.21.1
* libraw-debugsource-0.20.2-150400.3.21.1
## References:
* https://www.suse.com/security/cve/CVE-2026-20884.html
* https://www.suse.com/security/cve/CVE-2026-20889.html
* https://www.suse.com/security/cve/CVE-2026-20911.html
* https://www.suse.com/security/cve/CVE-2026-21413.html
* https://www.suse.com/security/cve/CVE-2026-24660.html
* https://www.suse.com/security/cve/CVE-2026-5342.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261499
* https://bugzilla.suse.com/show_bug.cgi?id=1261671
* https://bugzilla.suse.com/show_bug.cgi?id=1261672
* https://bugzilla.suse.com/show_bug.cgi?id=1261673
* https://bugzilla.suse.com/show_bug.cgi?id=1261674
* https://bugzilla.suse.com/show_bug.cgi?id=1261676
SUSE-SU-2026:1558-1: important: Security update for tomcat11
# Security update for tomcat11
Announcement ID: SUSE-SU-2026:1558-1
Release Date: 2026-04-22T16:24:40Z
Rating: important
References:
* bsc#1258371
* bsc#1261850
* bsc#1261851
* bsc#1261852
* bsc#1261853
* bsc#1261854
* bsc#1261855
* bsc#1261856
* bsc#1261857
Cross-References:
* CVE-2025-66614
* CVE-2026-24880
* CVE-2026-25854
* CVE-2026-29129
* CVE-2026-29145
* CVE-2026-29146
* CVE-2026-32990
* CVE-2026-34483
* CVE-2026-34486
* CVE-2026-34487
* CVE-2026-34500
CVSS scores:
* CVE-2025-66614 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-66614 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-66614 ( NVD ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
* CVE-2025-66614 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-24880 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-24880 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-24880 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-25854 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-25854 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-25854 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-29129 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-29129 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-29129 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-29145 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-29145 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-29145 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-29146 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-29146 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-29146 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-32990 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-34483 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34483 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-34483 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-34486 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34486 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-34486 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-34487 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34487 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-34487 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-34500 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34500 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-34500 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* Web and Scripting Module 15-SP7
An update that solves 11 vulnerabilities can now be installed.
## Description:
This update for tomcat11 fixes the following issues:
Security fixes:
* CVE-2026-24880: Request smuggling via invalid chunk extension (bsc#1261850).
* CVE-2026-25854: Occasionally open redirect (bsc#1261851).
* CVE-2026-29129: TLS cipher order is not preserved (bsc#1261852).
* CVE-2026-29145: OCSP checks sometimes soft-fail even when soft-fail is
disabled (bsc#1261853).
* CVE-2026-29146,CVE-2026-34486: Fix for allowed bypass of EncryptInterceptor
(bsc#1261854).
* CVE-2026-34483: Incomplete escaping of JSON access logs (bsc#1261855).
* CVE-2026-34487: Cloud membership for clustering component exposed the
Kubernetes bearer token (bsc#1261856).
* CVE-2026-34500: OCSP checks sometimes soft-fail with FFM even when soft-fail
is disabled (bsc#1261857).
* CVE-2026-32990: The fix for CVE-2025-66614 was incomplete, so this CVE
completes it (bsc#1258371).
Other fixes:
* Update to Tomcat 11.0.21
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1558=1
* Web and Scripting Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2026-1558=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1558=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1558=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* tomcat11-jsp-4_0-api-11.0.21-150600.13.18.1
* tomcat11-webapps-11.0.21-150600.13.18.1
* tomcat11-embed-11.0.21-150600.13.18.1
* tomcat11-jsvc-11.0.21-150600.13.18.1
* tomcat11-lib-11.0.21-150600.13.18.1
* tomcat11-doc-11.0.21-150600.13.18.1
* tomcat11-11.0.21-150600.13.18.1
* tomcat11-docs-webapp-11.0.21-150600.13.18.1
* tomcat11-admin-webapps-11.0.21-150600.13.18.1
* tomcat11-el-6_0-api-11.0.21-150600.13.18.1
* tomcat11-servlet-6_1-api-11.0.21-150600.13.18.1
* Web and Scripting Module 15-SP7 (noarch)
* tomcat11-jsp-4_0-api-11.0.21-150600.13.18.1
* tomcat11-webapps-11.0.21-150600.13.18.1
* tomcat11-lib-11.0.21-150600.13.18.1
* tomcat11-11.0.21-150600.13.18.1
* tomcat11-admin-webapps-11.0.21-150600.13.18.1
* tomcat11-el-6_0-api-11.0.21-150600.13.18.1
* tomcat11-servlet-6_1-api-11.0.21-150600.13.18.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* tomcat11-jsp-4_0-api-11.0.21-150600.13.18.1
* tomcat11-webapps-11.0.21-150600.13.18.1
* tomcat11-lib-11.0.21-150600.13.18.1
* tomcat11-11.0.21-150600.13.18.1
* tomcat11-admin-webapps-11.0.21-150600.13.18.1
* tomcat11-el-6_0-api-11.0.21-150600.13.18.1
* tomcat11-servlet-6_1-api-11.0.21-150600.13.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* tomcat11-jsp-4_0-api-11.0.21-150600.13.18.1
* tomcat11-webapps-11.0.21-150600.13.18.1
* tomcat11-lib-11.0.21-150600.13.18.1
* tomcat11-11.0.21-150600.13.18.1
* tomcat11-admin-webapps-11.0.21-150600.13.18.1
* tomcat11-el-6_0-api-11.0.21-150600.13.18.1
* tomcat11-servlet-6_1-api-11.0.21-150600.13.18.1
## References:
* https://www.suse.com/security/cve/CVE-2025-66614.html
* https://www.suse.com/security/cve/CVE-2026-24880.html
* https://www.suse.com/security/cve/CVE-2026-25854.html
* https://www.suse.com/security/cve/CVE-2026-29129.html
* https://www.suse.com/security/cve/CVE-2026-29145.html
* https://www.suse.com/security/cve/CVE-2026-29146.html
* https://www.suse.com/security/cve/CVE-2026-32990.html
* https://www.suse.com/security/cve/CVE-2026-34483.html
* https://www.suse.com/security/cve/CVE-2026-34486.html
* https://www.suse.com/security/cve/CVE-2026-34487.html
* https://www.suse.com/security/cve/CVE-2026-34500.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258371
* https://bugzilla.suse.com/show_bug.cgi?id=1261850
* https://bugzilla.suse.com/show_bug.cgi?id=1261851
* https://bugzilla.suse.com/show_bug.cgi?id=1261852
* https://bugzilla.suse.com/show_bug.cgi?id=1261853
* https://bugzilla.suse.com/show_bug.cgi?id=1261854
* https://bugzilla.suse.com/show_bug.cgi?id=1261855
* https://bugzilla.suse.com/show_bug.cgi?id=1261856
* https://bugzilla.suse.com/show_bug.cgi?id=1261857
openSUSE-SU-2026:20609-1: important: Security update for google-guest-agent
openSUSE security update: security update for google-guest-agent
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20609-1
Rating: important
References:
* bsc#1234563
* bsc#1236533
* bsc#1239763
* bsc#1239866
* bsc#1243254
* bsc#1243505
Cross-References:
* CVE-2023-45288
* CVE-2024-45337
CVSS scores:
* CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-45337 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 2 vulnerabilities and has 6 bug fixes can now be installed.
Description:
This update for google-guest-agent fixes the following issues:
Update to version 20250506.01 (bsc#1243254, bsc#1243505).
Security issues fixed:
- CVE-2024-45337: golang.org/x/crypto/ssh: misuse of the ServerConfig.PublicKeyCallback callback can lead to
authorization bypass in applications (bsc#1234563).
- CVE-2023-45288: golang.org/x/net/http2: no limit set for number of HTTP/2 CONTINUATION frames that can be read for an
HTTP/2 request can lead to excessive CPU consumption and a DoS (bsc#1236533).
Other updates and bugfixes:
- Version 20250506.01:
* Make sure agent added connections are activated by NM (#534)
- Version 20250506.00:
* Wrap NSS cache refresh in a goroutine (#533)
- Version 20250502.01:
* Wicked: Only reload interfaces for which configurations are written or changed. (#524)
- Version 20250502.00:
* Add AuthorizedKeysCompat to windows packaging (#530)
* Remove error messages from gce_workload_cert_refresh and metadata script runner (#527)
* Update guest-logging-go dependency (#526)
* Add 'created-by' metadata, and pass it as option to logging library (#508)
* Revert "oslogin: Correctly handle newlines at the end of modified files (#520)" (#523)
* Re-enable disabled services if the core plugin was enabled (#522)
* Enable guest services on package upgrade (#519)
* oslogin: Correctly handle newlines at the end of modified files (#520)
* Fix core plugin path (#518)
* Fix package build issues (#517)
* Fix dependencies ran go mod tidy -v (#515)
* Fix debian build path (#514)
* Bundle compat metadata script runner binary in package (#513)
* Bump golang.org/x/net from 0.27.0 to 0.36.0 (#512)
* Update startup/shutdown services to launch compat manager (#503)
* Bundle new gce metadata script runner binary in agent package (#502)
* Revert "Revert bundling new binaries in the package (#509)" (#511)
- Version 20250418.00:
* Re-enable disabled services if the core plugin was enabled (#521)
- Version 20250414.00:
* Add AuthorizedKeysCompat to windows packaging (#530)
* Remove error messages from gce_workload_cert_refresh and metadata script runner (#527)
* Update guest-logging-go dependency (#526)
* Add 'created-by' metadata, and pass it as option to logging library (#508)
* Revert "oslogin: Correctly handle newlines at the end of modified files (#520)" (#523)
* Re-enable disabled services if the core plugin was enabled (#522)
* Enable guest services on package upgrade (#519)
* oslogin: Correctly handle newlines at the end of modified files (#520)
* Fix core plugin path (#518)
* Fix package build issues (#517)
* Fix dependencies ran go mod tidy -v (#515)
* Fix debian build path (#514)
* Bundle compat metadata script runner binary in package (#513)
* Bump golang.org/x/net from 0.27.0 to 0.36.0 (#512)
* Update startup/shutdown services to launch compat manager (#503)
* Bundle new gce metadata script runner binary in agent package (#502)
* Revert "Revert bundling new binaries in the package (#509)" (#511)
- Version 20250327.01 (bsc#1239763, bsc#1239866):
* Remove error messages from gce_workload_cert_refresh and
metadata script runner (#527)
- Version 20250327.00:
* Update guest-logging-go dependency (#526)
* Add 'created-by' metadata, and pass it as option to logging library (#508)
* Revert "oslogin: Correctly handle newlines at the end of
modified files (#520)" (#523)
* Re-enable disabled services if the core plugin was enabled (#522)
* Enable guest services on package upgrade (#519)
* oslogin: Correctly handle newlines at the end of modified files (#520)
* Fix core plugin path (#518)
* Fix package build issues (#517)
* Fix dependencies ran go mod tidy -v (#515)
* Fix debian build path (#514)
* Bundle compat metadata script runner binary in package (#513)
* Bump golang.org/x/net from 0.27.0 to 0.36.0 (#512)
* Update startup/shutdown services to launch compat manager (#503)
* Bundle new gce metadata script runner binary in agent package (#502)
* Revert "Revert bundling new binaries in the package (#509)" (#511)
- Version 20250326.00:
* Re-enable disabled services if the core plugin was enabled (#521)
- Version 20250324.00:
* Enable guest services on package upgrade (#519)
* oslogin: Correctly handle newlines at the end of modified files (#520)
* Fix core plugin path (#518)
* Fix package build issues (#517)
* Fix dependencies ran go mod tidy -v (#515)
* Fix debian build path (#514)
* Bundle compat metadata script runner binary in package (#513)
* Bump golang.org/x/net from 0.27.0 to 0.36.0 (#512)
* Update startup/shutdown services to launch compat manager (#503)
* Bundle new gce metadata script runner binary in agent package (#502)
* Revert "Revert bundling new binaries in the package (#509)" (#511)
* Revert bundling new binaries in the package (#509)
* Fix typo in windows build script (#501)
* Include core plugin binary for all packages (#500)
* Start packaging compat manager (#498)
* Start bundling ggactl_plugin_cleanup binary in all agent packages (#492)
* scripts: introduce a wrapper to locally build deb package (#490)
* Introduce compat-manager systemd unit (#497)
- Version 20250317.00:
* Revert "Revert bundling new binaries in the package (#509)" (#511)
* Revert bundling new binaries in the package (#509)
* Fix typo in windows build script (#501)
* Include core plugin binary for all packages (#500)
* Start packaging compat manager (#498)
* Start bundling ggactl_plugin_cleanup binary in all agent packages (#492)
* scripts: introduce a wrapper to locally build deb package (#490)
* Introduce compat-manager systemd unit (#497)
- Version 20250312.00:
* Revert bundling new binaries in the package (#509)
* Fix typo in windows build script (#501)
* Include core plugin binary for all packages (#500)
* Start packaging compat manager (#498)
* Start bundling ggactl_plugin_cleanup binary in all agent packages (#492)
* scripts: introduce a wrapper to locally build deb package (#490)
* Introduce compat-manager systemd unit (#497)
- Version 20250305.00:
* Revert bundling new binaries in the package (#509)
* Fix typo in windows build script (#501)
* Include core plugin binary for all packages (#500)
* Start packaging compat manager (#498)
* Start bundling ggactl_plugin_cleanup binary in all agent packages (#492)
* scripts: introduce a wrapper to locally build deb package (#490)
* Introduce compat-manager systemd unit (#497)
- Version 20250304.01:
* Fix typo in windows build script (#501)
- Version 20250214.01:
* Include core plugin binary for all packages (#500)
- Version 20250212.00:
* Start packaging compat manager (#498)
* Start bundling ggactl_plugin_cleanup binary in all agent packages (#492)
- Version 20250211.00:
* scripts: introduce a wrapper to locally build deb package (#490)
* Introduce compat-manager systemd unit (#497)
- Version 20250207.00:
* vlan: toggle vlan configuration in debian packaging (#495)
* vlan: move config out of unstable section (#494)
* Add clarification to comments regarding invalid NICs and the
`invalid` tag. (#493)
* Include interfaces in lists even if it has an invalid MAC. (#489)
* Fix windows package build failures (#491)
* vlan: don't index based on the vlan ID (#486)
* Revert PR #482 (#488)
* Remove Amy and Zach from OWNERS (#487)
* Skip interfaces in interfaceNames() instead of erroring if there is an (#482)
* Fix Debian packaging if guest agent manager is not checked out (#485)
- Version 20250204.02:
* force concourse to move version forward.
- Version 20250204.01:
* vlan: toggle vlan configuration in debian packaging (#495)
- Version 20250204.00:
* vlan: move config out of unstable section (#494)
* Add clarification to comments regarding invalid NICs and the
`invalid` tag. (#493)
- Version 20250203.01:
* Include interfaces in lists even if it has an invalid MAC. (#489)
- Version 20250203.00:
* Fix windows package build failures (#491)
* vlan: don't index based on the vlan ID (#486)
* Revert PR #482 (#488)
* Remove Amy and Zach from OWNERS (#487)
* Skip interfaces in interfaceNames() instead of erroring if there is an (#482)
* Fix Debian packaging if guest agent manager is not checked out (#485)
- Version 20250122.00:
* networkd(vlan): remove the interface in addition to config (#468)
* Implement support for vlan dynamic removal, update dhclient to
remove only if configured (#465)
* Update logging library (#479)
* Remove Pat from owners file. (#478)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-621=1
Package List:
- openSUSE Leap 16.0:
google-guest-agent-20250506.01-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2023-45288.html
* https://www.suse.com/security/cve/CVE-2024-45337.html
openSUSE-SU-2026:20607-1: important: Security update for erlang
openSUSE security update: security update for erlang
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20607-1
Rating: important
References:
* bsc#1258663
* bsc#1259681
* bsc#1259682
* bsc#1259687
* bsc#1261726
* bsc#1261728
* bsc#1261734
* bsc#1262288
Cross-References:
* CVE-2026-21620
* CVE-2026-23941
* CVE-2026-23942
* CVE-2026-23943
* CVE-2026-28808
* CVE-2026-28810
* CVE-2026-32144
CVSS scores:
* CVE-2026-21620 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-21620 ( SUSE ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23941 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-23941 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23942 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-23942 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23943 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-23943 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-28808 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-28808 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-28810 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-28810 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-32144 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2026-32144 ( SUSE ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 7 vulnerabilities and has 8 bug fixes can now be installed.
Description:
This update for erlang fixes the following issues:
Security issues fixed:
- CVE-2026-21620: improper isolation and compartmentalization can lead to TFTP relative path traversal and remote
arbitrary reads/writes (bsc#1258663).
- CVE-2026-23941: improper handling of duplicate Content-Length headers in Erlang OTP can lead to HTTP request
smuggling (bsc#1259687).
- CVE-2026-23942: improper limitation of a pathname to a restricted directory in the SFTP server can lead to path
traversal (bsc#1259681).
- CVE-2026-23943: improper handling of highly compressed data in Erlang OTP ssh can lead to denial of service
(bsc#1259682).
- CVE-2026-28808: incorrect authorization can lead to unauthenticated access to protected CGI scripts (bsc#1261728).
- CVE-2026-28810: predictable DNS transaction IDs can lead to DNS cache poisoning (bsc#1261726).
- CVE-2026-32144: missing signature verification can lead to OCSP authorization bypass and information disclosure
(bsc#1261734).
Other updates and bugfixes:
- jinterface: allow to build determenistic OtpErlang.jar (bsc#1262288).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-619=1
Package List:
- openSUSE Leap 16.0:
erlang-27.1.3-160000.4.1
erlang-debugger-27.1.3-160000.4.1
erlang-debugger-src-27.1.3-160000.4.1
erlang-dialyzer-27.1.3-160000.4.1
erlang-dialyzer-src-27.1.3-160000.4.1
erlang-diameter-27.1.3-160000.4.1
erlang-diameter-src-27.1.3-160000.4.1
erlang-doc-27.1.3-160000.4.1
erlang-epmd-27.1.3-160000.4.1
erlang-et-27.1.3-160000.4.1
erlang-et-src-27.1.3-160000.4.1
erlang-jinterface-27.1.3-160000.4.1
erlang-jinterface-src-27.1.3-160000.4.1
erlang-observer-27.1.3-160000.4.1
erlang-observer-src-27.1.3-160000.4.1
erlang-reltool-27.1.3-160000.4.1
erlang-reltool-src-27.1.3-160000.4.1
erlang-src-27.1.3-160000.4.1
erlang-wx-27.1.3-160000.4.1
erlang-wx-src-27.1.3-160000.4.1
References:
* https://www.suse.com/security/cve/CVE-2026-21620.html
* https://www.suse.com/security/cve/CVE-2026-23941.html
* https://www.suse.com/security/cve/CVE-2026-23942.html
* https://www.suse.com/security/cve/CVE-2026-23943.html
* https://www.suse.com/security/cve/CVE-2026-28808.html
* https://www.suse.com/security/cve/CVE-2026-28810.html
* https://www.suse.com/security/cve/CVE-2026-32144.html
openSUSE-SU-2026:20612-1: important: Security update for tomcat10
openSUSE security update: security update for tomcat10
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20612-1
Rating: important
References:
* bsc#1258371
* bsc#1261850
* bsc#1261851
* bsc#1261852
* bsc#1261853
* bsc#1261854
* bsc#1261855
* bsc#1261856
* bsc#1261857
Cross-References:
* CVE-2025-66614
* CVE-2026-24880
* CVE-2026-25854
* CVE-2026-29129
* CVE-2026-29145
* CVE-2026-29146
* CVE-2026-32990
* CVE-2026-34483
* CVE-2026-34486
* CVE-2026-34487
* CVE-2026-34500
CVSS scores:
* CVE-2025-66614 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-66614 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-24880 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-24880 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-25854 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-25854 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-29129 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-29129 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-29145 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-29145 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-29146 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-29146 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34483 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-34483 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34486 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-34486 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34487 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-34487 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34500 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-34500 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 11 vulnerabilities and has 9 bug fixes can now be installed.
Description:
This update for tomcat10 fixes the following issues:
- Update to Tomcat 10.1.54
- CVE-2026-24880: Request smuggling via invalid chunk extension (bsc#1261850).
- CVE-2026-25854: Occasionally open redirect (bsc#1261851).
- CVE-2026-29129: TLS cipher order is not preserved (bsc#1261852).
- CVE-2026-29145: OCSP checks sometimes soft-fail even when soft-fail is disabled (bsc#1261853).
- CVE-2026-29146,CVE-2026-34486: Fix for allowed bypass of EncryptInterceptor (bsc#1261854).
- CVE-2026-34483: Incomplete escaping of JSON access logs (bsc#1261855).
- CVE-2026-34487: Cloud membership for clustering component exposed the Kubernetes bearer token (bsc#1261856).
- CVE-2026-34500: OCSP checks sometimes soft-fail with FFM even when soft-fail is disabled (bsc#1261857).
- CVE-2026-32990: The fix for CVE-2025-66614 was incomplete. (bsc#1258371)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-624=1
Package List:
- openSUSE Leap 16.0:
tomcat10-10.1.54-160000.1.1
tomcat10-admin-webapps-10.1.54-160000.1.1
tomcat10-doc-10.1.54-160000.1.1
tomcat10-docs-webapp-10.1.54-160000.1.1
tomcat10-el-5_0-api-10.1.54-160000.1.1
tomcat10-embed-10.1.54-160000.1.1
tomcat10-jsp-3_1-api-10.1.54-160000.1.1
tomcat10-jsvc-10.1.54-160000.1.1
tomcat10-lib-10.1.54-160000.1.1
tomcat10-servlet-6_0-api-10.1.54-160000.1.1
tomcat10-webapps-10.1.54-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2025-66614.html
* https://www.suse.com/security/cve/CVE-2026-24880.html
* https://www.suse.com/security/cve/CVE-2026-25854.html
* https://www.suse.com/security/cve/CVE-2026-29129.html
* https://www.suse.com/security/cve/CVE-2026-29145.html
* https://www.suse.com/security/cve/CVE-2026-29146.html
* https://www.suse.com/security/cve/CVE-2026-32990.html
* https://www.suse.com/security/cve/CVE-2026-34483.html
* https://www.suse.com/security/cve/CVE-2026-34486.html
* https://www.suse.com/security/cve/CVE-2026-34487.html
* https://www.suse.com/security/cve/CVE-2026-34500.html
openSUSE-SU-2026:20611-1: important: Security update for tomcat
openSUSE security update: security update for tomcat
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20611-1
Rating: important
References:
* bsc#1258371
* bsc#1261850
* bsc#1261851
* bsc#1261852
* bsc#1261853
* bsc#1261854
* bsc#1261855
* bsc#1261856
* bsc#1261857
Cross-References:
* CVE-2025-66614
* CVE-2026-24880
* CVE-2026-25854
* CVE-2026-29129
* CVE-2026-29145
* CVE-2026-29146
* CVE-2026-32990
* CVE-2026-34483
* CVE-2026-34486
* CVE-2026-34487
* CVE-2026-34500
CVSS scores:
* CVE-2025-66614 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-66614 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-24880 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-24880 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-25854 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-25854 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-29129 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-29129 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-29145 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-29145 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-29146 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-29146 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34483 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-34483 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34486 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-34486 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34487 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-34487 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34500 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-34500 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 11 vulnerabilities and has 9 bug fixes can now be installed.
Description:
This update for tomcat fixes the following issues:
- CVE-2026-24880: Request smuggling via invalid chunk extension (bsc#1261850).
- CVE-2026-25854: Occasionally open redirect (bsc#1261851).
- CVE-2026-29129: TLS cipher order is not preserved (bsc#1261852).
- CVE-2026-29145: OCSP checks sometimes soft-fail even when soft-fail is disabled (bsc#1261853).
- CVE-2026-29146,CVE-2026-34486: Fix for allowed bypass of EncryptInterceptor (bsc#1261854).
- CVE-2026-34483: Incomplete escaping of JSON access logs (bsc#1261855).
- CVE-2026-34487: Cloud membership for clustering component exposed the Kubernetes bearer token (bsc#1261856).
- CVE-2026-34500: OCSP checks sometimes soft-fail with FFM even when soft-fail is disabled (bsc#1261857).
- CVE-2026-32990: The fix for CVE-2025-66614 was incomplete. (bsc#1258371)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-623=1
Package List:
- openSUSE Leap 16.0:
tomcat-9.0.117-160000.1.1
tomcat-admin-webapps-9.0.117-160000.1.1
tomcat-docs-webapp-9.0.117-160000.1.1
tomcat-el-3_0-api-9.0.117-160000.1.1
tomcat-embed-9.0.117-160000.1.1
tomcat-javadoc-9.0.117-160000.1.1
tomcat-jsp-2_3-api-9.0.117-160000.1.1
tomcat-jsvc-9.0.117-160000.1.1
tomcat-lib-9.0.117-160000.1.1
tomcat-servlet-4_0-api-9.0.117-160000.1.1
tomcat-webapps-9.0.117-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2025-66614.html
* https://www.suse.com/security/cve/CVE-2026-24880.html
* https://www.suse.com/security/cve/CVE-2026-25854.html
* https://www.suse.com/security/cve/CVE-2026-29129.html
* https://www.suse.com/security/cve/CVE-2026-29145.html
* https://www.suse.com/security/cve/CVE-2026-29146.html
* https://www.suse.com/security/cve/CVE-2026-32990.html
* https://www.suse.com/security/cve/CVE-2026-34483.html
* https://www.suse.com/security/cve/CVE-2026-34486.html
* https://www.suse.com/security/cve/CVE-2026-34487.html
* https://www.suse.com/security/cve/CVE-2026-34500.html
openSUSE-SU-2026:20606-1: important: Security update for ImageMagick
openSUSE security update: security update for imagemagick
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20606-1
Rating: important
References:
* bsc#1259612
* bsc#1259872
* bsc#1260874
* bsc#1260879
* bsc#1262097
* bsc#1262145
* bsc#1262146
* bsc#1262147
* bsc#1262148
* bsc#1262149
* bsc#1262150
* bsc#1262152
* bsc#1262153
* bsc#1262154
* bsc#1262155
* bsc#1262156
Cross-References:
* CVE-2026-32259
* CVE-2026-32636
* CVE-2026-33535
* CVE-2026-33536
* CVE-2026-33899
* CVE-2026-33900
* CVE-2026-33901
* CVE-2026-33902
* CVE-2026-33905
* CVE-2026-33908
* CVE-2026-34238
* CVE-2026-40169
* CVE-2026-40183
* CVE-2026-40310
* CVE-2026-40311
* CVE-2026-40312
CVSS scores:
* CVE-2026-32259 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-32259 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-32636 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-32636 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-33535 ( SUSE ): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33536 ( SUSE ): 5 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-33536 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33899 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33899 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-33900 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33900 ( SUSE ): 6 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33901 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33901 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-33902 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33905 ( SUSE ): 5 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-33905 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33908 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33908 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34238 ( SUSE ): 5 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-34238 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-40169 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-40169 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-40183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-40183 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-40310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-40310 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-40311 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-40311 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-40312 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-40312 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 16 vulnerabilities and has 16 bug fixes can now be installed.
Description:
This update for ImageMagick fixes the following issues:
- CVE-2026-32259: stack out-of-bounds write due to a memory allocation failure in the sixel encoder can lead to a crash
(bsc#1259612).
- CVE-2026-32636: out-of-bounds write of a single zero byte due to bug the `NewXMLTree` method can lead to denial of
service (bsc#1259872).
- CVE-2026-33535: out-of-bounds write of a zero byte in X11 `display` interaction path can lead to a crash
(bsc#1260874).
- CVE-2026-33536: stack out-of-bounds write due to incorrect return value on certain platforms can lead to a denial of
service (bsc#1260879).
- CVE-2026-33899: out-of-bounds write of single zero byte in XML parsing can lead to a denial of service (bsc#1262154).
- CVE-2026-33900: heap out-of-bounds write due to integer truncation in viff encoder can lead to a crash (bsc#1262156).
- CVE-2026-33901: heap buffer overflow in the MVG decoder can lead to memory corruption or a crash (bsc#1262155).
- CVE-2026-33902: stack buffer overflow in the FX expression parser can lead to a process crash (bsc#1262153).
- CVE-2026-33905: out-of-bounds read in `-sample` operation can lead to a denial of service (bsc#1262097).
- CVE-2026-33908: recursive execution with no depth limit imposed when processing XML files can lead to resource
exhaustion and a denial of service (bsc#1262152).
- CVE-2026-34238: heap buffer overflow due to integer overflow in the despeckle operation can lead to a denial of
service (bsc#1262147).
- CVE-2026-40169: out-of-bounds heap write when processing a crafted image and writing a YAML or JSON output can lead
to a crash (bsc#1262150).
- CVE-2026-40183: heap out-of-bounds write in the JXL encoder can lead to a denial of service (bsc#1262145).
- CVE-2026-40310: heap out-of-bounds write in the JP2 encoder can lead to a denial of service (bsc#1262148).
- CVE-2026-40311: heap use-after-free when reading and printing values from an invalid XMP profile can lead to a denial
of service (bsc#1262146).
- CVE-2026-40312: off-by-one error in the MSL decoder can lead to a crash (bsc#1262149).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-618=1
Package List:
- openSUSE Leap 16.0:
ImageMagick-7.1.2.0-160000.8.1
ImageMagick-config-7-SUSE-7.1.2.0-160000.8.1
ImageMagick-config-7-upstream-limited-7.1.2.0-160000.8.1
ImageMagick-config-7-upstream-open-7.1.2.0-160000.8.1
ImageMagick-config-7-upstream-secure-7.1.2.0-160000.8.1
ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.8.1
ImageMagick-devel-7.1.2.0-160000.8.1
ImageMagick-doc-7.1.2.0-160000.8.1
ImageMagick-extra-7.1.2.0-160000.8.1
libMagick++-7_Q16HDRI5-7.1.2.0-160000.8.1
libMagick++-devel-7.1.2.0-160000.8.1
libMagickCore-7_Q16HDRI10-7.1.2.0-160000.8.1
libMagickWand-7_Q16HDRI10-7.1.2.0-160000.8.1
perl-PerlMagick-7.1.2.0-160000.8.1
References:
* https://www.suse.com/security/cve/CVE-2026-32259.html
* https://www.suse.com/security/cve/CVE-2026-32636.html
* https://www.suse.com/security/cve/CVE-2026-33535.html
* https://www.suse.com/security/cve/CVE-2026-33536.html
* https://www.suse.com/security/cve/CVE-2026-33899.html
* https://www.suse.com/security/cve/CVE-2026-33900.html
* https://www.suse.com/security/cve/CVE-2026-33901.html
* https://www.suse.com/security/cve/CVE-2026-33902.html
* https://www.suse.com/security/cve/CVE-2026-33905.html
* https://www.suse.com/security/cve/CVE-2026-33908.html
* https://www.suse.com/security/cve/CVE-2026-34238.html
* https://www.suse.com/security/cve/CVE-2026-40169.html
* https://www.suse.com/security/cve/CVE-2026-40183.html
* https://www.suse.com/security/cve/CVE-2026-40310.html
* https://www.suse.com/security/cve/CVE-2026-40311.html
* https://www.suse.com/security/cve/CVE-2026-40312.html
openSUSE-SU-2026:20605-1: important: Security update for openexr
openSUSE security update: security update for openexr
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20605-1
Rating: important
References:
* bsc#1261621
* bsc#1261622
* bsc#1261624
* bsc#1261634
Cross-References:
* CVE-2026-34379
* CVE-2026-34380
* CVE-2026-34588
* CVE-2026-34589
CVSS scores:
* CVE-2026-34379 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
* CVE-2026-34379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34380 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
* CVE-2026-34380 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34588 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-34588 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34589 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-34589 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 4 vulnerabilities and has 4 bug fixes can now be installed.
Description:
This update for openexr fixes the following issues:
- CVE-2026-34379: misaligned memory write during file decoding can cause a denial of service (bsc#1261621).
- CVE-2026-34380: lack of proper check can lead to integer overflow in image decoding (bsc#1261622).
- CVE-2026-34588: crafted EXR file can lead to out of bound read and write (bsc#1261624).
- CVE-2026-34589: crafted scanline DWAA file can lead to arbitrary code execution or denial of service (bsc#1261634).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-617=1
Package List:
- openSUSE Leap 16.0:
libIex-3_2-31-3.2.2-160000.6.1
libIex-3_2-31-x86-64-v3-3.2.2-160000.6.1
libIlmThread-3_2-31-3.2.2-160000.6.1
libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.6.1
libOpenEXR-3_2-31-3.2.2-160000.6.1
libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.6.1
libOpenEXRCore-3_2-31-3.2.2-160000.6.1
libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.6.1
libOpenEXRUtil-3_2-31-3.2.2-160000.6.1
libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.6.1
openexr-3.2.2-160000.6.1
openexr-devel-3.2.2-160000.6.1
openexr-doc-3.2.2-160000.6.1
References:
* https://www.suse.com/security/cve/CVE-2026-34379.html
* https://www.suse.com/security/cve/CVE-2026-34380.html
* https://www.suse.com/security/cve/CVE-2026-34588.html
* https://www.suse.com/security/cve/CVE-2026-34589.html
openSUSE-SU-2026:20603-1: important: Security update for ignition
openSUSE security update: security update for ignition
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20603-1
Rating: important
References:
* bsc#1260251
Cross-References:
* CVE-2026-33186
CVSS scores:
* CVE-2026-33186 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33186 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for ignition fixes the following issue:
- CVE-2026-33186: Fixed an authorization bypass due to improper validation of the HTTP/2: path pseudo-header (bsc#1260251).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-615=1
Package List:
- openSUSE Leap 16.0:
ignition-2.21.0-160000.3.1
References:
* https://www.suse.com/security/cve/CVE-2026-33186.html
openSUSE-SU-2026:20601-1: moderate: Security update for giflib
openSUSE security update: security update for giflib
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20601-1
Rating: moderate
References:
* bsc#1259502
Cross-References:
* CVE-2026-23868
CVSS scores:
* CVE-2026-23868 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
* CVE-2026-23868 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for giflib fixes the following issue:
- CVE-2026-23868: double-free result of a shallow copy can lead to memory corruption (bsc#1259502).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-612=1
Package List:
- openSUSE Leap 16.0:
giflib-devel-5.2.2-160000.3.1
giflib-progs-5.2.2-160000.3.1
libgif7-5.2.2-160000.3.1
References:
* https://www.suse.com/security/cve/CVE-2026-23868.html
SUSE-SU-2026:1562-1: moderate: Security update for openssl-1_1
# Security update for openssl-1_1
Announcement ID: SUSE-SU-2026:1562-1
Release Date: 2026-04-23T07:06:13Z
Rating: moderate
References:
* bsc#1261678
Cross-References:
* CVE-2026-28390
CVSS scores:
* CVE-2026-28390 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28390 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28390 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-1_1 fixes the following issues:
* CVE-2026-28390: NULL pointer dereference during processing of a crafted CMS
EnvelopedData message with KeyTransportRecipientInfo (bsc#1261678).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1562=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1562=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1562=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1562=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1562=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1562=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1562=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1562=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1562=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* openssl-1_1-debugsource-1.1.1l-150400.7.93.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.93.1
* libopenssl1_1-hmac-1.1.1l-150400.7.93.1
* openssl-1_1-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-1.1.1l-150400.7.93.1
* libopenssl1_1-1.1.1l-150400.7.93.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.93.1
* openSUSE Leap 15.4 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.93.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.93.1
* libopenssl1_1-32bit-1.1.1l-150400.7.93.1
* openSUSE Leap 15.4 (noarch)
* openssl-1_1-doc-1.1.1l-150400.7.93.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libopenssl1_1-64bit-1.1.1l-150400.7.93.1
* libopenssl1_1-hmac-64bit-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-64bit-1.1.1l-150400.7.93.1
* libopenssl1_1-64bit-debuginfo-1.1.1l-150400.7.93.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* openssl-1_1-debugsource-1.1.1l-150400.7.93.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.93.1
* libopenssl1_1-hmac-1.1.1l-150400.7.93.1
* openssl-1_1-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-1.1.1l-150400.7.93.1
* libopenssl1_1-1.1.1l-150400.7.93.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.93.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* openssl-1_1-debugsource-1.1.1l-150400.7.93.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.93.1
* libopenssl1_1-hmac-1.1.1l-150400.7.93.1
* openssl-1_1-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-1.1.1l-150400.7.93.1
* libopenssl1_1-1.1.1l-150400.7.93.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.93.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* openssl-1_1-debugsource-1.1.1l-150400.7.93.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.93.1
* libopenssl1_1-hmac-1.1.1l-150400.7.93.1
* openssl-1_1-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-1.1.1l-150400.7.93.1
* libopenssl1_1-1.1.1l-150400.7.93.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.93.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* openssl-1_1-debugsource-1.1.1l-150400.7.93.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.93.1
* libopenssl1_1-hmac-1.1.1l-150400.7.93.1
* openssl-1_1-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-1.1.1l-150400.7.93.1
* libopenssl1_1-1.1.1l-150400.7.93.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.93.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* openssl-1_1-debugsource-1.1.1l-150400.7.93.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.93.1
* libopenssl1_1-hmac-1.1.1l-150400.7.93.1
* openssl-1_1-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-1.1.1l-150400.7.93.1
* libopenssl1_1-1.1.1l-150400.7.93.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.93.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.93.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.93.1
* libopenssl1_1-32bit-1.1.1l-150400.7.93.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* openssl-1_1-debugsource-1.1.1l-150400.7.93.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.93.1
* libopenssl1_1-hmac-1.1.1l-150400.7.93.1
* openssl-1_1-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-1.1.1l-150400.7.93.1
* libopenssl1_1-1.1.1l-150400.7.93.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.93.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.93.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.93.1
* libopenssl1_1-32bit-1.1.1l-150400.7.93.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* openssl-1_1-debugsource-1.1.1l-150400.7.93.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.93.1
* libopenssl1_1-hmac-1.1.1l-150400.7.93.1
* openssl-1_1-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-1.1.1l-150400.7.93.1
* libopenssl1_1-1.1.1l-150400.7.93.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.93.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.93.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.93.1
* libopenssl1_1-32bit-1.1.1l-150400.7.93.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* openssl-1_1-debugsource-1.1.1l-150400.7.93.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.93.1
* libopenssl1_1-hmac-1.1.1l-150400.7.93.1
* openssl-1_1-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-1.1.1l-150400.7.93.1
* libopenssl1_1-1.1.1l-150400.7.93.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.93.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.93.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.93.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.93.1
* libopenssl1_1-32bit-1.1.1l-150400.7.93.1
## References:
* https://www.suse.com/security/cve/CVE-2026-28390.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261678
SUSE-SU-2026:1563-1: important: Security update for the Linux Kernel
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2026:1563-1
Release Date: 2026-04-23T07:08:11Z
Rating: important
References:
* bsc#1246057
* bsc#1256504
* bsc#1256675
* bsc#1257773
* bsc#1259797
* bsc#1260005
* bsc#1260009
Cross-References:
* CVE-2025-38234
* CVE-2025-68818
* CVE-2026-23103
* CVE-2026-23243
* CVE-2026-23272
* CVE-2026-23274
CVSS scores:
* CVE-2025-38234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38234 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23103 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23243 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23243 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23243 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23272 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23272 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23272 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23274 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23274 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves six vulnerabilities and has one security fix can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP4 kernel was updated to fix various security
issues
The following security issues were fixed:
* CVE-2025-38234: sched/rt: Fix race in push_rt_task (bsc#1246057).
* CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).
* CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write
(bsc#1259797).
* CVE-2026-23272: netfilter: nf_tables: unconditionally bump set-nelems before
insertion (bsc#1260009).
* CVE-2026-23274: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer
labels (bsc#1260005).
The following non security issue was fixed:
* watchdog/perf: properly initialize the turbo mode timestamp and rearm
counter (bsc#1256504).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1563=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1563=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1563=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1563=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1563=1
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2026-1563=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1563=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1563=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1563=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1563=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-1563=1
## Package List:
* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.200.1
* openSUSE Leap 15.4 (noarch)
* kernel-docs-html-5.14.21-150400.24.200.1
* kernel-macros-5.14.21-150400.24.200.1
* kernel-devel-5.14.21-150400.24.200.1
* kernel-source-vanilla-5.14.21-150400.24.200.1
* kernel-source-5.14.21-150400.24.200.1
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-5.14.21-150400.24.200.1
* kernel-default-base-rebuild-5.14.21-150400.24.200.1.150400.24.102.1
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.200.1
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.200.1
* kernel-default-base-5.14.21-150400.24.200.1.150400.24.102.1
* kernel-kvmsmall-debugsource-5.14.21-150400.24.200.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kernel-default-devel-debuginfo-5.14.21-150400.24.200.1
* ocfs2-kmp-default-5.14.21-150400.24.200.1
* kernel-syms-5.14.21-150400.24.200.1
* kernel-default-optional-debuginfo-5.14.21-150400.24.200.1
* kselftests-kmp-default-5.14.21-150400.24.200.1
* dlm-kmp-default-5.14.21-150400.24.200.1
* kernel-default-extra-5.14.21-150400.24.200.1
* kernel-default-debugsource-5.14.21-150400.24.200.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-devel-5.14.21-150400.24.200.1
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.200.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-livepatch-5.14.21-150400.24.200.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.200.1
* cluster-md-kmp-default-5.14.21-150400.24.200.1
* gfs2-kmp-default-5.14.21-150400.24.200.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.200.1
* kernel-obs-build-5.14.21-150400.24.200.1
* kernel-default-optional-5.14.21-150400.24.200.1
* reiserfs-kmp-default-5.14.21-150400.24.200.1
* kernel-obs-build-debugsource-5.14.21-150400.24.200.1
* kernel-obs-qa-5.14.21-150400.24.200.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.200.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.200.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_200-default-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_200-default-debuginfo-1-150400.9.3.1
* kernel-default-livepatch-devel-5.14.21-150400.24.200.1
* kernel-livepatch-SLE15-SP4_Update_50-debugsource-1-150400.9.3.1
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.200.1
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.200.1
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.200.1
* kernel-zfcpdump-debugsource-5.14.21-150400.24.200.1
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.200.1
* openSUSE Leap 15.4 (aarch64)
* dtb-altera-5.14.21-150400.24.200.1
* dlm-kmp-64kb-5.14.21-150400.24.200.1
* kernel-64kb-debuginfo-5.14.21-150400.24.200.1
* dtb-amazon-5.14.21-150400.24.200.1
* dtb-nvidia-5.14.21-150400.24.200.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.200.1
* dtb-lg-5.14.21-150400.24.200.1
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.200.1
* dtb-apple-5.14.21-150400.24.200.1
* gfs2-kmp-64kb-5.14.21-150400.24.200.1
* kernel-64kb-optional-5.14.21-150400.24.200.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.200.1
* dtb-xilinx-5.14.21-150400.24.200.1
* kernel-64kb-devel-5.14.21-150400.24.200.1
* dtb-exynos-5.14.21-150400.24.200.1
* kselftests-kmp-64kb-5.14.21-150400.24.200.1
* kernel-64kb-debugsource-5.14.21-150400.24.200.1
* dtb-freescale-5.14.21-150400.24.200.1
* dtb-socionext-5.14.21-150400.24.200.1
* cluster-md-kmp-64kb-5.14.21-150400.24.200.1
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.200.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.200.1
* ocfs2-kmp-64kb-5.14.21-150400.24.200.1
* dtb-amd-5.14.21-150400.24.200.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.200.1
* dtb-cavium-5.14.21-150400.24.200.1
* dtb-renesas-5.14.21-150400.24.200.1
* kernel-64kb-extra-5.14.21-150400.24.200.1
* dtb-rockchip-5.14.21-150400.24.200.1
* dtb-broadcom-5.14.21-150400.24.200.1
* dtb-mediatek-5.14.21-150400.24.200.1
* dtb-allwinner-5.14.21-150400.24.200.1
* dtb-marvell-5.14.21-150400.24.200.1
* dtb-amlogic-5.14.21-150400.24.200.1
* dtb-sprd-5.14.21-150400.24.200.1
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.200.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.200.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.200.1
* dtb-apm-5.14.21-150400.24.200.1
* reiserfs-kmp-64kb-5.14.21-150400.24.200.1
* dtb-arm-5.14.21-150400.24.200.1
* dtb-qcom-5.14.21-150400.24.200.1
* dtb-hisilicon-5.14.21-150400.24.200.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.200.1.150400.24.102.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-debugsource-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* kernel-macros-5.14.21-150400.24.200.1
* kernel-source-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.200.1.150400.24.102.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-debugsource-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* kernel-macros-5.14.21-150400.24.200.1
* kernel-source-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.200.1.150400.24.102.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-debugsource-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* kernel-macros-5.14.21-150400.24.200.1
* kernel-source-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.200.1.150400.24.102.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-debugsource-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* kernel-macros-5.14.21-150400.24.200.1
* kernel-source-5.14.21-150400.24.200.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-debuginfo-5.14.21-150400.24.200.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.200.1
* ocfs2-kmp-default-5.14.21-150400.24.200.1
* cluster-md-kmp-default-5.14.21-150400.24.200.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.200.1
* dlm-kmp-default-5.14.21-150400.24.200.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.200.1
* gfs2-kmp-default-5.14.21-150400.24.200.1
* kernel-default-debugsource-5.14.21-150400.24.200.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.200.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.200.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.200.1
* kernel-64kb-debuginfo-5.14.21-150400.24.200.1
* kernel-64kb-devel-5.14.21-150400.24.200.1
* kernel-64kb-debugsource-5.14.21-150400.24.200.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.200.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.200.1
* kernel-default-devel-5.14.21-150400.24.200.1
* kernel-default-base-5.14.21-150400.24.200.1.150400.24.102.1
* kernel-obs-build-debugsource-5.14.21-150400.24.200.1
* kernel-syms-5.14.21-150400.24.200.1
* reiserfs-kmp-default-5.14.21-150400.24.200.1
* kernel-obs-build-5.14.21-150400.24.200.1
* kernel-default-debugsource-5.14.21-150400.24.200.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-macros-5.14.21-150400.24.200.1
* kernel-devel-5.14.21-150400.24.200.1
* kernel-source-5.14.21-150400.24.200.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.200.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.200.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.200.1
* kernel-64kb-debuginfo-5.14.21-150400.24.200.1
* kernel-64kb-devel-5.14.21-150400.24.200.1
* kernel-64kb-debugsource-5.14.21-150400.24.200.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.200.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.200.1
* kernel-default-devel-5.14.21-150400.24.200.1
* kernel-default-base-5.14.21-150400.24.200.1.150400.24.102.1
* kernel-obs-build-debugsource-5.14.21-150400.24.200.1
* kernel-syms-5.14.21-150400.24.200.1
* reiserfs-kmp-default-5.14.21-150400.24.200.1
* kernel-obs-build-5.14.21-150400.24.200.1
* kernel-default-debugsource-5.14.21-150400.24.200.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-macros-5.14.21-150400.24.200.1
* kernel-devel-5.14.21-150400.24.200.1
* kernel-source-5.14.21-150400.24.200.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.200.1
* kernel-64kb-debuginfo-5.14.21-150400.24.200.1
* kernel-64kb-devel-5.14.21-150400.24.200.1
* kernel-64kb-debugsource-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.200.1.150400.24.102.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.200.1
* kernel-default-devel-5.14.21-150400.24.200.1
* kernel-syms-5.14.21-150400.24.200.1
* kernel-obs-build-debugsource-5.14.21-150400.24.200.1
* reiserfs-kmp-default-5.14.21-150400.24.200.1
* kernel-obs-build-5.14.21-150400.24.200.1
* kernel-default-debugsource-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* kernel-macros-5.14.21-150400.24.200.1
* kernel-devel-5.14.21-150400.24.200.1
* kernel-source-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.200.1
* kernel-zfcpdump-debugsource-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.200.1
* kernel-default-devel-5.14.21-150400.24.200.1
* kernel-default-base-5.14.21-150400.24.200.1.150400.24.102.1
* kernel-obs-build-debugsource-5.14.21-150400.24.200.1
* kernel-syms-5.14.21-150400.24.200.1
* reiserfs-kmp-default-5.14.21-150400.24.200.1
* kernel-obs-build-5.14.21-150400.24.200.1
* kernel-default-debugsource-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-macros-5.14.21-150400.24.200.1
* kernel-devel-5.14.21-150400.24.200.1
* kernel-source-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.200.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_200-default-1-150400.9.3.1
* kernel-default-debuginfo-5.14.21-150400.24.200.1
* kernel-default-livepatch-5.14.21-150400.24.200.1
* kernel-livepatch-SLE15-SP4_Update_50-debugsource-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_200-default-debuginfo-1-150400.9.3.1
* kernel-default-livepatch-devel-5.14.21-150400.24.200.1
* kernel-default-debugsource-5.14.21-150400.24.200.1
## References:
* https://www.suse.com/security/cve/CVE-2025-38234.html
* https://www.suse.com/security/cve/CVE-2025-68818.html
* https://www.suse.com/security/cve/CVE-2026-23103.html
* https://www.suse.com/security/cve/CVE-2026-23243.html
* https://www.suse.com/security/cve/CVE-2026-23272.html
* https://www.suse.com/security/cve/CVE-2026-23274.html
* https://bugzilla.suse.com/show_bug.cgi?id=1246057
* https://bugzilla.suse.com/show_bug.cgi?id=1256504
* https://bugzilla.suse.com/show_bug.cgi?id=1256675
* https://bugzilla.suse.com/show_bug.cgi?id=1257773
* https://bugzilla.suse.com/show_bug.cgi?id=1259797
* https://bugzilla.suse.com/show_bug.cgi?id=1260005
* https://bugzilla.suse.com/show_bug.cgi?id=1260009
SUSE-SU-2026:1565-1: moderate: Security update for libssh
# Security update for libssh
Announcement ID: SUSE-SU-2026:1565-1
Release Date: 2026-04-23T07:08:39Z
Rating: moderate
References:
* bsc#1258045
* bsc#1258049
* bsc#1258054
* bsc#1258080
* bsc#1258081
* bsc#1259377
Cross-References:
* CVE-2026-0964
* CVE-2026-0965
* CVE-2026-0966
* CVE-2026-0967
* CVE-2026-0968
* CVE-2026-3731
CVSS scores:
* CVE-2026-0964 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-0964 ( NVD ): 5.0 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-0965 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-0965 ( NVD ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-0966 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2026-0966 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2026-0967 ( SUSE ): 1.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0967 ( SUSE ): 2.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-0967 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0967 ( NVD ): 2.2 CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-0968 ( SUSE ): 2.1
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:P/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0968 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L
* CVE-2026-0968 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-0968 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-0968 ( NVD ): 3.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-3731 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-3731 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-3731 ( NVD ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-3731 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-3731 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
An update that solves six vulnerabilities can now be installed.
## Description:
This update for libssh fixes the following issues:
* CVE-2026-0964: improper sanitation of paths received from SCP servers can
cause path traversal (bsc#1258049).
* CVE-2026-0965: possible denial of service when parsing unexpected
configuration files (bsc#1258045).
* CVE-2026-0966: buffer underflow in ssh_get_hexa() on invalid input
(bsc#1258054).
* CVE-2026-0967: specially crafted patterns could cause denial of service
(bsc#1258081).
* CVE-2026-0968: malformed SFTP message can lead to out of bound read
(bsc#1258080).
* CVE-2026-3731: denial of service via out-of-bounds read in SFTP extension
name handler (bsc#1259377).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1565=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1565=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-1565=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1565=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-1565=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1565=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libssh4-debuginfo-0.9.8-150400.3.17.1
* libssh-config-0.9.8-150400.3.17.1
* libssh4-0.9.8-150400.3.17.1
* libssh-devel-0.9.8-150400.3.17.1
* libssh-debugsource-0.9.8-150400.3.17.1
* openSUSE Leap 15.4 (x86_64)
* libssh4-32bit-debuginfo-0.9.8-150400.3.17.1
* libssh4-32bit-0.9.8-150400.3.17.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libssh4-64bit-debuginfo-0.9.8-150400.3.17.1
* libssh4-64bit-0.9.8-150400.3.17.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libssh4-debuginfo-0.9.8-150400.3.17.1
* libssh-debugsource-0.9.8-150400.3.17.1
* libssh-config-0.9.8-150400.3.17.1
* libssh4-0.9.8-150400.3.17.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libssh4-debuginfo-0.9.8-150400.3.17.1
* libssh-debugsource-0.9.8-150400.3.17.1
* libssh-config-0.9.8-150400.3.17.1
* libssh4-0.9.8-150400.3.17.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libssh4-debuginfo-0.9.8-150400.3.17.1
* libssh-debugsource-0.9.8-150400.3.17.1
* libssh-config-0.9.8-150400.3.17.1
* libssh4-0.9.8-150400.3.17.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libssh4-debuginfo-0.9.8-150400.3.17.1
* libssh-debugsource-0.9.8-150400.3.17.1
* libssh-config-0.9.8-150400.3.17.1
* libssh4-0.9.8-150400.3.17.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libssh4-debuginfo-0.9.8-150400.3.17.1
* libssh-debugsource-0.9.8-150400.3.17.1
* libssh-config-0.9.8-150400.3.17.1
* libssh4-0.9.8-150400.3.17.1
## References:
* https://www.suse.com/security/cve/CVE-2026-0964.html
* https://www.suse.com/security/cve/CVE-2026-0965.html
* https://www.suse.com/security/cve/CVE-2026-0966.html
* https://www.suse.com/security/cve/CVE-2026-0967.html
* https://www.suse.com/security/cve/CVE-2026-0968.html
* https://www.suse.com/security/cve/CVE-2026-3731.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258045
* https://bugzilla.suse.com/show_bug.cgi?id=1258049
* https://bugzilla.suse.com/show_bug.cgi?id=1258054
* https://bugzilla.suse.com/show_bug.cgi?id=1258080
* https://bugzilla.suse.com/show_bug.cgi?id=1258081
* https://bugzilla.suse.com/show_bug.cgi?id=1259377
SUSE-SU-2026:1560-1: important: Security update for the Linux Kernel (Live Patch 32 for SUSE Linux Enterprise 15 SP5)
# Security update for the Linux Kernel (Live Patch 32 for SUSE Linux Enterprise
15 SP5)
Announcement ID: SUSE-SU-2026:1560-1
Release Date: 2026-04-23T05:47:33Z
Rating: important
References:
* bsc#1258396
* bsc#1259859
Cross-References:
* CVE-2026-23191
* CVE-2026-23268
CVSS scores:
* CVE-2026-23191 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23191 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23191 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23191 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23268 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise Kernel 5.14.21-150500.55.127 fixes
various security issues
The following security issues were fixed:
* CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258396).
* CVE-2026-23268: apparmor: fix unprivileged local user can do privileged
policy management (bsc#1259859).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1560=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-1560=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_127-default-debuginfo-5-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_32-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_127-default-5-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_127-default-debuginfo-5-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_32-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_127-default-5-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-23191.html
* https://www.suse.com/security/cve/CVE-2026-23268.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258396
* https://bugzilla.suse.com/show_bug.cgi?id=1259859
openSUSE-SU-2026:0145-1: moderate: Security update for ocaml-patch, opam
openSUSE Security Update: Security update for ocaml-patch, opam
_______________________________
Announcement ID: openSUSE-SU-2026:0145-1
Rating: moderate
References: #1262281
Cross-References: CVE-2026-41082
CVSS scores:
CVE-2026-41082 (SUSE): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that fixes one vulnerability is now available.
Description:
This update for ocaml-patch, opam fixes the following issues:
Changes in opam:
- Update to version 2.5.1 (CVE-2026-41082 boo#1262281) see included
CHANGES file for details
- Update to version 2.5.0 see included CHANGES file for details
- Update to version 2.4.1 see included CHANGES file for details
- Update to version 2.4.0 see included CHANGES file for details
Changes in ocaml-patch:
- Relax requirement for ocaml-rpm-macros, remove ExclusiveArch
- Update to version 3.1.0 see included CHANGES.md file for details
- Initial version 3.0.0
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-145=1
Package List:
- openSUSE Backports SLE-15-SP7 (aarch64 i586 ppc64le s390x x86_64):
ocaml-patch-3.1.0-bp157.2.1
ocaml-patch-debuginfo-3.1.0-bp157.2.1
ocaml-patch-devel-3.1.0-bp157.2.1
- openSUSE Backports SLE-15-SP7 (aarch64 ppc64le s390x x86_64):
opam-2.5.1-bp157.2.3.1
opam-devel-2.5.1-bp157.2.3.1
opam-installer-2.5.1-bp157.2.3.1
References:
https://www.suse.com/security/cve/CVE-2026-41082.html
https://bugzilla.suse.com/1262281
openSUSE-SU-2026:0147-1: moderate: Security update for tor
openSUSE Security Update: Security update for tor
_______________________________
Announcement ID: openSUSE-SU-2026:0147-1
Rating: moderate
References: #1262301 #1262302
Affected Products:
openSUSE Backports SLE-15-SP6
openSUSE Backports SLE-15-SP7
_______________________________
An update that contains security fixes can now be installed.
Description:
This update for tor fixes the following issues:
- update to 0.4.8.23:
* Fix a memory compare using the wrong length. This could lead to a
remote crash when using the conflux subsystem (TROVE-2026-004,
boo#1262302)
* Fix a series of defense in depth security issues found across the
codebase
* Regenerate fallback directories generated on March 25, 2026.
* Update the geoip files to match the IPFire Location Database, as
retrieved on 2026/03/25.
- includes changes from 0.4.8.22:
* Avoid an out-of-bounds read error that could occur with V1-formatted
EXTEND cells (TROVE-2025-016, boo#1262301)
* Allow old clients to fetch the consensus even if they use version 0 of
the SENDME protocol
* Do not check for compression bombs for buffers smaller than 5MB
(increased from 64 KB)
* Improvements to directory server statistics
- update to 0.4.8.21:
* This release is a continuation of the previous one and addresses
additional Conflux-related issues identified through further testing
and feedback from relay operators. We strongly recommend upgrading as
soon as possible.
* Major bugfixes (conflux, exit):
- When dequeuing out-of-order conflux cells, the circuit could be
close in between two dequeue which could lead to a mishandling of a
NULL pointer. Fixes bug 41162;
* Add -mbranch-protection=standard for arm64.
* Regenerate fallback directories generated on November
* Update the geoip files to match the IPFire Location Database, as
retrieved on 2025/11/17.
* Fix a bug causing the initial tor process to hang intead of exiting
with RunAsDaemon, when pluggable transports are used.
- 0.4.8.20
* Add a new hardening compiler flag -fcf-protection=full
* Fix the root cause of some conflux fragile asserts
* Fix a series of conflux edge cases
- 0.4.8.19
* Fix some clients not being able to connect to LibreSSL relays
* Improve stream flow control performance
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-147=1
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2026-147=1
Package List:
- openSUSE Backports SLE-15-SP7 (aarch64 ppc64le s390x x86_64):
tor-0.4.8.23-bp157.2.6.1
tor-debuginfo-0.4.8.23-bp157.2.6.1
tor-debugsource-0.4.8.23-bp157.2.6.1
- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le s390x x86_64):
tor-0.4.8.23-bp156.2.6.1
References:
https://bugzilla.suse.com/1262301
https://bugzilla.suse.com/1262302
openSUSE-SU-2026:10599-1: moderate: cacti-1.2.30+git306.82d5aef5-1.1 on GA media
# cacti-1.2.30+git306.82d5aef5-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10599-1
Rating: moderate
Cross-References:
* CVE-2026-0540
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the cacti-1.2.30+git306.82d5aef5-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* cacti 1.2.30+git306.82d5aef5-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-0540.html
openSUSE-SU-2026:10600-1: moderate: csync2-2.0+git.1600444747.83b3644-3.1 on GA media
# csync2-2.0+git.1600444747.83b3644-3.1 on GA media
Announcement ID: openSUSE-SU-2026:10600-1
Rating: moderate
Cross-References:
* CVE-2026-41051
CVSS scores:
* CVE-2026-41051 ( SUSE ): 5 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-41051 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the csync2-2.0+git.1600444747.83b3644-3.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* csync2 2.0+git.1600444747.83b3644-3.1
## References:
* https://www.suse.com/security/cve/CVE-2026-41051.html
openSUSE-SU-2026:10598-1: moderate: libtree-sitter0_26-0.26.8-1.1 on GA media
# libtree-sitter0_26-0.26.8-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10598-1
Rating: moderate
Cross-References:
* CVE-2026-34945
CVSS scores:
* CVE-2026-34945 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2026-34945 ( SUSE ): 7 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the libtree-sitter0_26-0.26.8-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libtree-sitter0_26 0.26.8-1.1
* libtree-sitter0_26-x86-64-v3 0.26.8-1.1
* tree-sitter 0.26.8-1.1
* tree-sitter-devel 0.26.8-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-34945.html
openSUSE-SU-2026:0151-1: critical: Security update for rclone
openSUSE Security Update: Security update for rclone
_______________________________
Announcement ID: openSUSE-SU-2026:0151-1
Rating: critical
References: #1140423 #1232964 #1233422 #1262438 #1262439
Cross-References: CVE-2023-45286 CVE-2023-45288 CVE-2023-48795
CVE-2024-24786 CVE-2024-45337 CVE-2024-45338
CVE-2024-51744 CVE-2024-52522 CVE-2025-22869
CVE-2025-22870 CVE-2025-30204 CVE-2025-58181
CVE-2025-68121 CVE-2026-1229 CVE-2026-27141
CVE-2026-33186 CVE-2026-41176 CVE-2026-41179
CVSS scores:
CVE-2023-45288 (SUSE): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CVE-2023-48795 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2024-24786 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-45337 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2024-45338 (SUSE): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVE-2024-51744 (SUSE): 2.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
CVE-2025-22869 (SUSE): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVE-2025-22870 (SUSE): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
CVE-2025-30204 (SUSE): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVE-2025-58181 (SUSE): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CVE-2025-68121 (SUSE): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVE-2026-27141 (SUSE): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVE-2026-33186 (SUSE): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Backports SLE-15-SP6
openSUSE Backports SLE-15-SP7
_______________________________
An update that fixes 18 vulnerabilities is now available.
Description:
This update for rclone fixes the following issues:
- Update to version 1.73.5: (boo#1262439 boo#1262438)
* operations: add AuthRequired to operations/fsinfo to prevent backend
creation CVE-2026-41179
* rc: snapshot NoAuth at startup to prevent runtime auth bypass
CVE-2026-41176
* rc: add AuthRequired to options/set to prevent auth bypass
CVE-2026-41176
* s3: fix empty delimiter parameter rejected by Archiware P5 server
* azureblob/auth: add Microsoft Partner Network User-Agent prefix
* drime: fix User.EntryPermissions JSON unmarshalling
* filter: fix debug logs that fire before logger is configured - fixes
#9291
* s3: fix TencentCOS CDN endpoint failing on bucket check
* iclouddrive: fix 'directory not found' error when the directory
contains accent marks
* Start v1.73.5-DEV development
- Update to version 1.73.4:
* Version v1.73.4
* Update to go 1.25.9 to fix multiple CVEs
* build: fix Denial of Service due to Panic in AWS SDK for Go v2 SDK
EventStream Decoder
* docs: fix markdown issues in mount docs
* docs: fix header level for metadata option
* fix(docs): Fix link to not be language specific
* filen: update SDK version
* build(deps): bump golang.org/x/image from 0.36.0 to 0.38.0
* docs: note macOS 10.15 (Catalina) support with version v1.70.3
* Start v1.73.4-DEV development
- Update to version 1.73.3: (CVE-2026-33186 GHSA-6g7g-w4f8-9c9x)
* Version v1.73.3
* build(deps): bump github.com/buger/jsonparser from 1.1.1 to 1.1.2
* docs/jottacloud: fix broken link
* docs: clarify Filen password change requires updating both password
and API key in rclone config
* docs: note that Filen API key changes on password change
* build(deps): bump google.golang.org/grpc from 1.79.1 to 1.79.3
* s3: add multi tenant support for Cubbit
* lib/rest: fix URLPathEscapeAll breaking WebDAV servers (eg nzbdav)
with strict path matching
* list: fix nil pointer panic in Sorter when temp file creation fails
* docs: update RELEASE procedure to avoid mistakes
* docs: added text to the label showing version-introduced info
* Start v1.73.3-DEV development
* docs: update sponsors
- Update to version 1.73.2:
* Version v1.73.2
* Update to go 1.25.8 to fix multiple CVEs
* build: update to golang.org/x/net v0.51.0 to fix CVE-2026-27141 #9220
* docs: fix new drive flag typo in changelog
* webdav: add missing headers for CORS
* docs: Document unsupported S3 object keys with double slashes
* docs: note that --use-server-modtime only works on some backends
* internxt: fix Entry doesn't belong in directory errors on windows
* drime: fix chunk-uploaded files ignoring workspace ID
* docs: Fix headers hierarchy for mount.md
* webdav: escape reserved characters in URL path segments
* bisync: add group Sync to the bisync command
* archive: extract: strip "./" prefix from tar entry paths
* docs: add instructions on how to update Go version
* buid: update github.com/cloudflare/circl to v1.6.3 to fix CVE-2026-1229
* Start v1.73.2-DEV development
- Update to version 1.73.1:
* Version v1.73.1
* build: fix build using go 1.26.0 instead of go 1.25.7
* fs/march: fix runtime: program exceeds 10000-thread limit
* accounting: fix missing server side stats from core/stats rc
* pacer: re-read the sleep time as it may be stale
* pacer: fix deadlock between pacer token and --max-connections
* build: fix CVE-2025-68121 by updating go to 1.25.7 or later - fixes
#9167
* drime: fix files and directories being created in the default workspace
* docs: update sponsors
* copyurl: Extend copyurl docs with an example of CSV FILENAMEs starting
with a path.
* internxt: implement re-login under refresh logic, improve retry logic
- fixes #9174
* docs: add ExchangeRate-API as a sponsor
* build: bump github.com/go-chi/chi/v5 from 5.2.3 to 5.2.5 to fix
GO-2026-4316
* Set list_version to 2 for FileLu S3 configuration
* filelu: add multipart upload support with configurable cutoff
* filelu: add multipart init response type
* filelu: add comment for response body wrapping
* filelu: avoid buffering entire file in memory
* docs: update sponsor logos
* filen: fix potential panic in case of error during upload
* filen: fix 32 bit targets not being able to list directories Fixes
#9142
* Start v1.73.1-DEV development
- Update to version 1.73.0:
* Version v1.73.0
* drive: fix crash when trying to creating shortcut to a Google doc
* azureblob,azurefiles: factor the common auth into a library
* test: allow backends to return fs.ErrorCantListRoot to skip Root tests
* build: add privatebeta Makefile target
* docs: add Internxt as a sponsor
* internxt: remove use of CVE laden github.com/disintegration/imaging
* docs: fix Internxt docs after merge
* docs: update making a new backend docs
* docs: build overview page from the backend data
* docs: add tiering to the documentation - fixes #8873
* docs: add data about each backend in YAML format
* docs: add bin/manage_backends.py for managing the backend data files
* internxt: use rclone's http.Client to enable more features
* internxt: fix lint problems
* Add StarHack to contributors
* Add lullius to contributors
* Add jzunigax2 to contributors
* internxt: add Internxt backend - fixes #7610
* drive: add --drive-metadata-force-expansive-access flag - Fixes #8980
* test_all: allow drime more time to complete
* onedrive: fix permissions on onedrive Personal
* onedrive: fix require sign in for Onedrive Personal
* onedrive: Onedrive Personal no longer supports description
* onedrive: fix setting modification time on directories for onedrive
Personal
* onedrive: fix cancelling multipart upload
* docs: fix WinFsp link in mount documentation
* cmount: make work under OpenBSD - fixes #1727
* vfs: make mount tests run on OpenBSD
* docs: improve alignment of icons
* protondrive: update to use forks of upstream modules
* Add hyusap to contributors
* Add Nick Owens to contributors
* Add Mikel Olasagasti Uranga to contributors
* docs: fix googlephotos custom client_id instructions
* cmount: fix OpenBSD mount support.
* fs: fix bwlimit: correctly report minutes
* fs: fix bwlimit: use %d instead of %q for ints
* mega: reverts TLS workaround
* docs: fix formatting
* docs: add faq entry about re-enabling old TLS ciphers
* Add Marc-Philip to contributors
* Add yy to contributors
* filen: swap to blake3 hashes
* docs: fix echo command syntax for password input
* docs: fix typos in comments and messages
* docs: fix use of removed rem macro
* uptobox: remove backend as service is no longer available
* rc: add operations/hashsumfile to sum a single file only
* docs: update sponsor link
* filen: add Filen backend - Fixes #6728
* sftp: fix proxy initialisation
* fstest: skip Copy mutation test with --sftp-copy-is-hardlink
* fstest: Make Copy mutation test work properly
* Add Qingwei Li to contributors
* Add Nicolas Dessart to contributors
* log: fix systemd adding extra newline - fixes #9086
* oracleobjectstorage, sftp: eliminate unnecessary heap allocation
* sftp,ftp: add http proxy authentication support
* Add Drime backend
* lib/rest: add opts.MultipartContentType to explicitly set Content-Type
of attachements
* dircache: allow empty string as root parent id
* docs: update sponsors
* s3: add provider Bizfly Cloud Simple Storage
* docs: update sponsor logos
* Add sys6101 to contributors
* Add darkdragon-001 to contributors
* Add vupn0712 to contributors
* docs: add cloudinary to readme
* docs: fix headers hierarchy in mount docs
* s3: fix Copy ignoring storage class
* serve s3: make errors in --s3-auth-key fatal - fixes #9044
* Add masrlinu to contributors
* pcloud: add support for real-time updates in mount
* memory: add --memory-discard flag for speed testing - fixes #9037
* Add vyv03354 to contributors
* shade: Fix VFS test issues
* docs: mention use of ListR feature in ls docs
* build: bump actions/download-artifact from 6 to 7
* build: bump actions/upload-artifact from 5 to 6
* build: bump actions/cache from 4 to 5
* docs: reflects the fact that pCloud supports ListR
* S3: Linode: updated endpoints to use ISO 3166-1 alpha-2 standard
* sync: fix error propagation in tests (#9025)
* Changelog updates from Version v1.72.1
* s3: add more regions for Selectel
* Add jhasse-shade to contributors
* Add Shade backend
* log: fix backtrace not going to the --log-file #9014
* build: fix lint warning after linter upgrade
* Add Jonas Tingeborn to contributors
* Add Tingsong Xu to contributors
* configfile: add piped config support - fixes #9012
* fs/log: fix PID not included in JSON log output
* build: adjust lint rules to exclude new errors from linter update
* proxy: fix error handling in tests spotted by the linter
* Add Johannes Rothe to contributors
* Add Leo to contributors
* Add Vladislav Tropnikov to contributors
* Add Cliff Frey to contributors
* Add vicerace to contributors
* b2: Fix listing root buckets with unrestricted API key
* googlecloudstorage: improve endpoint parameter docs
* serve webdav: implement download-directory-as-zip
* s3: The ability to specify an IAM role for cross-account interaction
* azureblob: add metadata and tags support across upload and copy paths
* refactor: use strings.Cut to simplify code
* docs: note where a provider has an S3 compatible alternative
* Add Shade as sponsor
* Add Duncan Smart to contributors
* Add Diana to contributors
* docs: Clarify OAuth scopes for readonly Google Drive access
* b2: support authentication with new bucket restricted application keys
* docs: update sponsor logos
* docs: fix lint error in changelog
* Start v1.73.0-DEV development
- Update to version 1.72.1:
* Version v1.72.1
* s3: add more regions for Selectel
* log: fix backtrace not going to the --log-file #9014
* build: fix lint warning after linter upgrade
* configfile: add piped config support - fixes #9012
* fs/log: fix PID not included in JSON log output
* build: adjust lint rules to exclude new errors from linter update
* proxy: fix error handling in tests spotted by the linter
* googlecloudstorage: improve endpoint parameter docs
* docs: note where a provider has an S3 compatible alternative
* Add Shade as sponsor
* docs: Clarify OAuth scopes for readonly Google Drive access
* docs: update sponsor logos
* docs: fix lint error in changelog
* Start v1.72.1-DEV development
- Update to version 1.72.0:
* Version v1.72.0
* rc: fix formatting in job/batch
* test speed: fix formatting of help
* docs: update sponsor logos
* build: bump actions/checkout from 5 to 6
* s3: add multi-part-upload support for If-Match and If-None-Match
* rc: config/unlock: rename parameter to `configPassword` accept old as
well
* rc: correct names of parameters in job/list output
* Add Nikolay Kiryanov to contributors
* rc: add `executeId` to job statuses - fixes #8972
* build: bump golang.org/x/crypto from 0.43.0 to 0.45.0 to fix
CVE-2025-58181
* s3: fix single file copying behavior with low permission - Fixes #8975
* docs: onedrive: note how to backup up any user's data
* Add Dominik Sander to contributors
* Add jijamik to contributors
* box: allow to configure with config file contents
* http: add basic metadata and provide it via serve
* ftp: fix transfers from servers that return 250 ok messages
* b2: allow individual old versions to be deleted with --b2-versions -
fixes #1626
* build: fix tls: failed to verify certificate: x509: negative serial
number
* Add Sean Turner to contributors
* s3: add support for --upload-header If-Match and If-None-Match
* fix: comment typos
* dropbox: fix error moving just created objects - fixes #8881
* s3: add --s3-use-data-integrity-protections to fix BadDigest error in
Alibaba, Tencent
* rc: make sure fatal errors don't crash rclone - fixes #8955
* pacer: factor call stack searching into its own package
* rc: add osVersion, osKernel and osArch to core/version
* build: update all dependencies
* build(deps): bump golangci/golangci-lint-action from 8 to 9
* webdav: fix out of memory with sharepoint-ntlm when uploading large
file
* testserver: fix owncloud test server startup
* Add aliaj1 to contributors
* ulozto: Fix downloads returning HTML error page
* docs: adjust spectra logic example endpoint name
* docs: update version introduced to v1.70 in doi docs
* testserver: fix HDFS server after run.bash adjustments
* testserver: remind developers about allocating a port
* testserver: make run.bash variables less likely to collide with scripts
* testserver: fix seafile servers messing up _connect string
* testserver: make sure TestWebdavInfiniteScale uses an assigned port
* testserver: make sure we don't overwrite the NAME variable set
* Add n4n5 to contributors
* Add Alex to contributors
* Add Copilot to contributors
* docs: update contributing docs regarding backend documentation
* rc: add jobs stats
* docs: fix alignment of some of the icons in the storage system dropdown
* docs: run markdownlint on _index.md
* docs: fix markdownlint issues and other styling improvements in
backend command docs
* docs: fix markdownlint issue md046/code-block-style in backend command
docs
* docs: fix missing punctuation in backend commands short description
* docs: fix markdownlint issues in backend command generated output
* build: improve backend docs autogenerated marker line
* backend/compress: add zstd compression
* sftp: fix zombie SSH processes with --sftp-ssh - Fixes #8929
* testserver: fix tests failing due to stopped servers
* docs: add new integration tester site link
* docs: update the method for running integration tests
* bisync: fix failing tests
* Add SublimePeace to contributors
* b2: fix "expected a FileSseMode but found: ''"
* docs: s3: clarify multipart uploads memory usage
* test_all: fix detection of running servers
* accounting: add AccountReadN for use in cluster
* fs: add NonDefaultRC for discovering options in use
* fs: move tests into correct files
* rc: add NewJobFromBytes for reading jobs from non HTTP transactions
* rc: add job/batch for sending batches of rc commands to run
concurrently
* Add Ted Robertson to contributors
* Add Joseph Brownlee to contributors
* Add fries1234 to contributors
* Add Fawzib Rojas to contributors
* Add Riaz Arbi to contributors
* Add Lukas Krejci to contributors
* Add Adam Dinwoodie to contributors
* Add dulanting to contributors
* docs: add AppArmor restrictions to rclone mount
* check: improved reporting of differences in sizes and contents
* mega: implement 2FA login
* docs: change to light code block style to better match overall theme
* docs: fix various markdownlint issues
* build: restrict the markdown languages to use for code blocks
* docs: fix various markdownlint issues
* docs: fix markdownlint issue md013/line-length
* docs: change syntax hightlighting for command examples from sh to
console
* docs: Clarify remote naming convention
* b2: Add Server-Side encryption support
* Added rclone archive command to create and read archive files
* accounting: add io.Seeker/io.ReaderAt support to accounting.Account
* operations: add ReadAt method to ReOpen
* fstest: add ResetRun to allow the remote to be reset in tests
* gcs: fix --gcs-storage-class to work with server side copy for objects
* ulozto: implement the about functionality
* local: add --skip-specials to ignore special files
* swift: Report disk usage in segment containers
* refactor: use strings.Builder to improve performance
* Archive backend to read archives on cloud storage.
* vfs: remove unecessary import in tests to fix import cycles
* Add Lakshmi-Surekha to contributors
* Add Andrew Gunnerson to contributors
* Add divinity76 to contributors
* build: enable support for aix/ppc64
* rc: fix name of "queue" JSON key in docs for vfs/cache
* cmount: windows: improve error message on missing winfsp
* docs: add the Provider to the options examples in the backend docs
* Add Aneesh Agrawal to contributors
* Add viocha to contributors
* Add reddaisyy to contributors
* fs: remove unnecessary Seek call on log file
* s3: make it easier to add new S3 providers
* build(deps): bump actions/upload-artifact from 4 to 5
* build(deps): bump actions/download-artifact from 5 to 6
* ftp: fix SOCK proxy support - fixes #8892 (#8918)
* webdav: Add Access-Control-Max-Age header for CORS preflight caching -
fixes #5078
* webdav: use SpaceSepList to parse bearer token command
* refactor: use strings.Builder to improve performance
* docs: re-arrange sponsors page
* docs: add Spectra Logic as a sponsor
* Add Oleksandr Redko to contributors
* build: enable all govet checks (except fieldalignment and shadow) and
fix issues.
* march: fix --no-traverse being very slow - fixes #8860
* Add vastonus to contributors
* s3: add new FileLu S5 endpoints
* build: remove obsolete build tag
* azurefiles: add ListP interface - #4788
* dropbox: add ListP interface - #4788
* webdav: add ListP interface - #4788
* pcloud: add ListP interface - #4788
* box: add ListP interface - #4788
* onedrive: add ListP interface - #4788
* drive: add ListP interface - #4788
* Add hunshcn to contributors
* webdav: optimize bearer token fetching with singleflight
* Changelog updates from Version v1.71.2
* lib/http: cleanup indentation and other whitespace in http serve
template
* docs: improve formatting of http serve template parameters
* build: stop markdown linter leaving behind docker containers
* Add Marco Ferretti to contributors
* s3: add cubbit as provider
* s3: add servercore as a provider
* docs: update sponsors
* docs: update sponsor images
* docs: update privacy policy with a section on user data
* Add Dulani Woods to contributors
* Add spiffytech to contributors
* gcs: add region us-east5 - fixes #8863
* jottacloud: refactor service list from map to slice to get predefined
order
* jottacloud: added support for traditional oauth authentication also
for the main service
* oauthutil: improved debug logs from token refresh
* backend: add S3 provider for Hetzner object storage #8183
* jottacloud: improved token refresh handling
* s3: provider reordering
* index: add missing providers
* docs: add missing `
* s3: add rabata as a provider
* mega: fix 402 payment required errors - fixes #8758
* Add Andrew Ruthven to contributors
* Add Microscotch to contributors
* Add iTrooz to contributors
* build: Bump SwiftAIO container to a newer one
* build: Retry stopping the test server
* build: Increase attempts to connect to test server
* swift: If storage_policy isn't set, use the root containers policy
* proton: automated 2FA login with OTP secret key
* serve s3: fix log output to remove the EXTRA messages
* docs/jottacloud: update description of invalid_grant error according
to changes
* jottacloud: add support for MediaMarkt Cloud as a whitelabel service
* s3: add FileLu S5 provider
* docs: fix variants of --user-from-header
* vfs: fix chunker integration test
* test_all: give TestZoho: extra time as it has been timing out
* test_all: give TestCompressDrive: extra time as it has been timing out
* rclone config string: reduce quoting with Human rendering for strings
#8859
* Add juejinyuxitu to contributors
* docs/jottacloud: update documentation with new whitelabel services and
changed configuration flow
* jottacloud: abort attempts to run unsupported rclone authorize command
* jottacloud: minor adjustment of texts in config ui
* jottacloud: add support for Let's Go Cloud (from MediaMarkt) as a
whitelabel service
* jottacloud: fix authentication for whitelabel services from Elkj??p
subsidiaries
* jottacloud: refactor config handling of whitelabel services to use
openid provider configuration
* jottacloud: remove nil error object from error message
* jottacloud: fix legacy authentication
* docs: add remote setup page to main docs dropdown
* docs: update remote setup page
* docs: add link from authorize command docs to remote setup docs
* docs: lowercase internet and web browser instead of Internet browser
* docs: use the term backend name instead of fs name for authorize
command
* add `rclone config string` for making connection strings #8859
* config: add more human readable configmap.Simple output
* serve http: download folders as zip
* s3: reorder providers to be in alphabetical order
* refactor: use strings.FieldsFuncSeq to reduce memory allocations
* accounting: add SetMaxCompletedTransfers method to fix bisync race
#8815
* accounting: add RemoveDoneTransfers method to fix bisync race #8815
* bisync: fix race when CaptureOutput is used concurrently #8815
* build: update all dependencies
* Makefile: remove deprecated go mod usage
* azurefiles: Fix server side copy not waiting for completion - fixes
#8848
* Changelog updates from Version v1.71.1
* test_all: fix branch name in test report
* pacer: fix deadlock with --max-connections
* Revert "azureblob: fix deadlock with --max-connections with
InvalidBlockOrBlob errors"
* Add Youfu Zhang to contributors
* Add Matt LaPaglia to contributors
* smb: optimize smb mount performance by avoiding stat checks during
initialization
* pikpak: fix unnecessary retries by using URL expire parameter - fixes
#8601
* serve http: fix: logging url on start
* docs: fix typo
* b2: fix 1TB+ uploads
* march: fix deadlock when using --fast-list on syncs - fixes #8811
* build: slices.Contains, added in go1.21
* build: use strings.CutPrefix introduced in go1.20
* build: use sequence Split introduced in go1.24
* build: use "for i := range n", added in go1.22
* build: modernize benchmark usage
* build: in tests use t.Context, added in go1.24
* build: replace interface{} by the 'any' type added in go1.18
* build: use the built-in min or max functions added in go1.21
* Add russcoss to contributors
* build: remove x := x made unnecessary by the new semantics of loops in
go1.22
* lib/pool: fix unreliable TestPoolMaxBufferMemory test
* Update S-Pegg1 email
* Add Jean-Christophe Cura to contributors
* pool: fix flaky unreliability test
* copyurl: reworked code, added concurrency and tests
* copyurl: Added --url to read urls from csv file - #8127
* docs: HDFS: erasure coding limitation #8808
* fstest: fix slice bounds out of range error when using -remotes local
* local: fix time zones on tests
* s3: added SpectraLogic as a provider
* local: fix rmdir "Access is denied" on windows - fixes #8363
* bisync: fix error handling for renamed conflicts
* docs: pcloud: update root_folder_id instructions
* operations: fix partial name collisions for non --inplace copies
* drive: docs: update making your own client ID instructions
* swift: add ListP interface - #4788
* memory: add ListP interface - #4788
* oraceobjectstorage: add ListP interface - #4788
* B2: add ListP interface - #4788
* azureblob: add ListP interface - #4788
* googlecloudstorage: add ListP interface - Fixes #8763
* build: bump actions/github-script from 7 to 8
* build: bump actions/setup-go from 5 to 6
* bisync: fix chunker integration tests
* bisync: fix koofr integration tests
* internetarchive: fix server side copy files with spaces
* lib/rest: add URLPathEscapeAll to URL escape as many chars as possible
* Add alternate email for dougal to contributors
* test speed: add command to test a specified remotes speed
* docs: add link to MEGA S4 from MEGA page
* Add Robin Rolf to contributors
* Add anon-pradip to contributors
* s3: Add Intercolo provider
* gendocs: refactor and add logging of skipped command docs
* gendocs: ignore missing rclone_mount.md, rclone_nfsmount.md,
rclone_serve_nfs.md on windows
* bin: add bisync.md generator
* fstest: refactor to decouple package from implementation
* gendocs: ignore missing rclone_mount.md on macOS
* bisync: ignore expected "nothing to transfer" differences on tests
* bisync: fix TestBisyncConcurrent ignoring -case
* bisync: make number of parallel tests configurable
* docs: clarify subcommand description in rclone usage
* docs: fix description of regex syntax of name transform
* docs: add some more details about supported regex syntax
* makefile: fix lib/transform docs not getting updated
* lib/pool: fix flaky test which was causing timeouts
* Add dougal to contributors
* vfs: fix SIGHUP killing serve instead of flushing directory caches
* bisync: use unique stats groups on tests
* fstest: stop errors in test cleanup changing the global stats
* Add Motte to contributors
* Add Claudius Ellsel to contributors
* build: add local markdown linting to make check
* lsf: add support for unix and unixnano time formats
* docs: remove broken links from rc to commands
* hashsum: changed output format when listing algorithms
* docs: add example of how to add date as suffix
* box: fix about after change in API return - fixes #8776
* Add skbeh to contributors
* Add Tilman Vogel to contributors
* docs: fix incorrectly escaped windows path separators
* build: restore error handling in gendocs
* combine: propagate SlowHash feature
* docs/oracleobjectstorage: add introduction before external links and
remove broken link
* docs: fix markdown lint issues in backend docs
* docs: fix markdown lint issues in command docs
* docs: update markdown code block json indent size 2
* mount: do not log successful unmount as an error - fixes #8766
* Start v1.72.0-DEV development
- Update to version 1.71.2:
* Version v1.71.2
* docs: update sponsors
* docs: update sponsor images
* docs: update privacy policy with a section on user data
* gcs: add region us-east5 - fixes #8863
* index: add missing providers
* docs: add missing `
* mega: fix 402 payment required errors - fixes #8758
* docs: fix variants of --user-from-header
* docs: add remote setup page to main docs dropdown
* docs: update remote setup page
* docs: add link from authorize command docs to remote setup docs
* docs: lowercase internet and web browser instead of Internet browser
* docs: use the term backend name instead of fs name for authorize
command
* bisync: fix race when CaptureOutput is used concurrently #8815
* azurefiles: Fix server side copy not waiting for completion - fixes
#8848
* pikpak: fix unnecessary retries by using URL expire parameter - fixes
#8601
* serve http: fix: logging url on start
* docs: fix typo
* b2: fix 1TB+ uploads
* Start v1.71.2-DEV development
- Update to version 1.71.1:
* Version v1.71.1
* pacer: fix deadlock with --max-connections
* Revert "azureblob: fix deadlock with --max-connections with
InvalidBlockOrBlob errors"
* march: fix deadlock when using --fast-list on syncs - fixes #8811
* docs: HDFS: erasure coding limitation #8808
* local: fix rmdir "Access is denied" on windows - fixes #8363
* bisync: fix error handling for renamed conflicts
* docs: pcloud: update root_folder_id instructions
* operations: fix partial name collisions for non --inplace copies
* drive: docs: update making your own client ID instructions
* internetarchive: fix server side copy files with spaces
* lib/rest: add URLPathEscapeAll to URL escape as many chars as possible
* docs: add link to MEGA S4 from MEGA page
* docs: clarify subcommand description in rclone usage
* docs: fix description of regex syntax of name transform
* docs: add some more details about supported regex syntax
* makefile: fix lib/transform docs not getting updated
* vfs: fix SIGHUP killing serve instead of flushing directory caches
* docs: remove broken links from rc to commands
* docs: add example of how to add date as suffix
* box: fix about after change in API return - fixes #8776
* docs: fix incorrectly escaped windows path separators
* build: restore error handling in gendocs
* combine: propagate SlowHash feature
* docs/oracleobjectstorage: add introduction before external links and
remove broken link
* docs: fix markdown lint issues in backend docs
* docs: fix markdown lint issues in command docs
* docs: update markdown code block json indent size 2
* mount: do not log successful unmount as an error - fixes #8766
* Start v1.71.1-DEV development
- Update to version 1.71.0:
* Version v1.71.0
* fs: tls: add --client-pass support for encrypted --client-key files
* ftp: make TLS config default to global TLS config - Fixes #6671
* fshttp: return *Transport rather than http.RoundTripper from
NewTransport
* bisync: release from beta
* bisync: fix markdown formatting issues flagged by linter in docs
* bisync: fix --no-slow-hash settings on path2
* Add cui to contributors
* docs: add code of conduct
* lib/mmap: convert to using unsafe.Slice to avoid deprecated
reflect.SliceHeader
* build: bump golangci/golangci-lint-action from 6 to 8
* build: update golangci-lint configuration
* build: ignore revive lint issue var-naming: avoid meaningless package
names
* build: fix lint issue: should omit type error from declaration
* Revert "build: downgrade linter to use go1.24 until it is fixed for
go1.25"
* build: migrate golangci-lint configuration to v2 format
* s3: add --s3-use-arn-region flag - fixes #8686
* Add Binbin Qian to contributors
* Add Lucas Bremgartner to contributors
* docs: add tips about outdated certificates
* FAQ: specify the availability of SSL_CERT_* env vars
* pikpak: add file name integrity check during upload
* bisync: skip TestBisyncConcurrent on non-local
* internetarchive: fix server side copy files with &
* Revert "s3: set useAlreadyExists to false for Alibaba OSS"
* Add huangnauh to contributors
* smb: improve multithreaded upload performance using multiple
connections
* bisync: fix data races on tests
* bisync: remove unused parameters
* bisync: deglobalize to fix concurrent runs via rc - fixes #8675
* mount: fix identification of symlinks in directory listings
* s3: fix Content-Type: aws-chunked causing upload errors with --metadata
* config: fix problem reading pasted tokens over 4095 bytes
* config: fix test failure on local machine with a config file
* log: add log rotation to --log-file - fixes #2259
* accounting: Fix stats (speed=0 and eta=nil) when starting jobs via rc
* docs: update overview table for oracle object storage
* Add praveen-solanki-oracle to contributors
* oracleobjectstorage: add read only metadata support - Fixes #8705
* doc: sync doesn't symlinks in dest without --link - Fixes #8749
* s3: sort providers in docs
* s3: add docs for Exaba Object Storage
* azureblob: fix double accounting for multipart uploads - fixes #8718
* pool: fix deadlock with --max-buffer-memory
* azureblob: fix deadlock with --max-connections with InvalidBlockOrBlob
errors
* build: downgrade linter to use go1.24 until it is fixed for go1.25
* build: update all dependencies
* build: update to go1.25 and make go1.24 the minimum required version
* Add Timothy Jacobs to contributors
* bisync: fix time.Local data race on tests - fixes #8272
* googlecloudstorage: fix rateLimitExceeded error on bisync tests
* accounting: populate transfer snapshot with "what" value
* build(deps): bump actions/checkout from 4 to 5
* build(deps): bump actions/download-artifact from 4 to 5
* googlecloudstorage: enable bisync integration tests
* fstest: fix parsing of commas in -remotes
* azurefiles: fix hash getting erased when modtime is set
* bisync: disable --sftp-copy-is-hardlink on sftp tests
* local: fix --copy-links on Windows when listing Junction points
* operations: fix too many connections open when using --max-memory
* pool: fix deadlock with --max-memory and multipart transfers
* pool: unify memory between multipart and asyncreader to use one pool
* docs: update links to rcloneui
* docs: add MEGA S4 as a gold sponsor
* about: fix potential overflow of about in various backends
* box: fix about: cannot unmarshal number 1.0e+18 into Go struct field
* oauthutil: fix nil pointer crash when started with expired token
* rc: listremotes should send an empty array instead of nil
* config: add error if RCLONE_CONFIG_PASS was supplied but didn't
decrypt config
* rc: add config/unlock to unlock the config file
* ftp: allow insecure TLS ciphers - fixes #8701
* s3: set useAlreadyExists to false for Alibaba OSS
* docs: update sponsors page
* fs: allow global variables to be overriden or set on backend creation
* fs: allow setting of --http_proxy from command line
* tests: cloudinary: remove test ignore after merging fix from #8707
* Add Antonin Goude to contributors
* Add Yu Xin to contributors
* Add houance to contributors
* Add Florent Vennetier to contributors
* Add n4n5 to contributors
* Add Albin Parou to contributors
* Add liubingrun to contributors
* sync: fix testLoggerVsLsf when backend only reads modtime
* sync: fix testLoggerVsLsf checking wrong fs
* docs: fix make opengraph tags absolute as not all sites understand
relative
* docs: update contributing guide regarding markdown documentation
* build: add markdown linting to workflow
* build: add markdownlint configuration
* docs: minor format cleanup install.md
* docs: fix markdownlint issue md049/emphasis-style
* docs: fix markdownlint issue md036/no-emphasis-as-heading
* docs: fix markdownlint issue md033/no-inline-html
* docs: fix markdownlint issue md025/single-title
* docs: fix markdownlint issue md041/first-line-heading
* docs: fix markdownlint issue md001/heading-increment
* docs: fix markdownlint issue md003/heading-style
* docs: fix markdownlint issue md034/no-bare-urls
* docs: fix markdownlint issue md010/no-hard-tabs
* docs: fix markdownlint issue md013/line-length
* docs: fix markdownlint issue md038/no-space-in-code
* docs: fix markdownlint issue md040/fenced-code-language
* docs: fix markdownlint issue md046/code-block-style
* docs: fix markdownlint issue md037/no-space-in-emphasis
* docs: fix markdownlint issue md059/descriptive-link-text
* docs: fix markdownlint issues md007/ul-indent md004/ul-style
* docs: fix markdownlint issue md012/no-multiple-blanks
* docs: fix markdownlint issue md058/blanks-around-tables
* docs: fix markdownlint issue md022/blanks-around-headings
* docs: fix markdownlint issue md031/blanks-around-fences
* docs: fix markdownlint issue md032/blanks-around-lists
* docs: fix markdownlint issue md009/no-trailing-spaces
* docs: fix markdownlint issue md014/commands-show-output
* docs: fix markdownlint issues md007/ul-indent md004/ul-style
(bin/update-authors.py)
* docs: fix markdownlint issues md007/ul-indent md004/ul-style
(authors.md)
* docs: add opengraph tags for website social media previews
* mount: note that bucket based remotes can use directory markers
* pikpak: add docs for methods to clarify name collision handling and
restrictions
* pikpak: enhance Copy method to handle name collisions and improve
error management
* pikpak: enhance Move for better handling of error and name collision
* accounting: fix incorrect stats with --transfers=1 - fixes #8670
* rc: fix `operations/check` ignoring `oneWay` parameter
* s3: add OVHcloud Object Storage provider
* docs: rc: fix description of how to read local config
* build: limit check for edits of autogenerated files to only commits in
a pull request
* build: extend check for edits of autogenerated files to all commits in
a pull request
* smb: refresh Kerberos credentials when ccache file changes
* s3: fix multipart upload and server side copy when using bucket policy
SSE-C
* backend/s3: Fix memory leak by cloning strings #8683
* purge: exit with a fatal error if filters are set on `rclone purge`
* docs: Add Backblaze as a Platinum sponsor
* Add Sam Pegg to contributors
* googlephotos: added warning for Google Photos compatability-fixes #8672
* test: remove flakey TestChunkerChunk50bYandex: test
* docs: Consolidate entries for Josh Soref in contributors
* docs: remove dead link to example of writing a plugin
* filescom: document that hashes need to be enabled - fixes #8674
* Add Sudipto Baral to contributors
* docs: fix incorrect json syntax in sample output
* docs: ignore author email piyushgarg80
* docs: fix header level for --dump option section
* docs: use stringArray as parameter type
* docs: use consistent markdown heading syntax
* imagekit: remove server side Copy method as it was downloading and
uploading
* imagekit: don't low level retry uploads
* imagekit: return correct error when attempting to upload zero length
files
* smb: add --smb-kerberos-ccache option to set kerberos ccache per smb
backend
* test: fix smb kerberos integration tests
* Changelog updates from Version v1.70.3
* config: make parsing of duration options consistent
* docs: cleanup usage
* docs: break long lines
* docs: add option value type to header where missing
* docs: mention that identifiers in option values are case insensitive
* docs: rewrite dump option examples
* docs: use markdown inline code format for dump option headers that are
real examples
* docs: change spelling from server side to server-side
* docs: cleanup header casing
* docs: rename OSX to macOS
* docs: fix list and code block issue
* docs: consistent markdown list format
* docs: split section with general description of options with that
documenting actual main options
* docs: improve description of option types
* docs: use space instead of equal sign to separate option and value in
headers
* docs: use comma to separate short and long option format in headers
* docs: remove use of uncommon parameter types
* docs: remove use of parameter type FILE
* docs: remove use of parameter type DIR
* docs: remove use of parameter type CONFIG_FILE
* docs: change use of parameter type N and NUMBER to int consistent with
flags and cli help
* docs: change use of parameter type TIME to Duration consistent with
flags and cli help
* docs: change use of parameter type BANDWIDTH_SPEC to BwTimetable
consistent with flags and cli help
* docs: change use of parameter type SIZE to SizeSuffix consistent with
flags and cli help
* docs: cleanup markdown header format
* docs: explain separated list parameters
* azureblob: fix server side copy error "requires exactly one scope"
* test: remove and ignore failing integration tests
* docs: explain the json log format in more detail
* check: fix difference report (was reporting error counts)
* serve sftp: add support for more hashes (crc32, sha256, blake3, xxh3,
xxh128)
* serve sftp: extract function refactoring for handling hashsum commands
* sftp: add support for more hashes (crc32, sha256, blake3, xxh3, xxh128)
* local: configurable supported hashes
* hash: add support for BLAKE3, XXH3, XXH128
* vfs: make integration TestDirEntryModTimeInvalidation test more
reliable
* smb: skip non integration tests when doing integration tests
* seafile: fix integration test errors by adding dot to encoding
* linkbox: fix upload error "user upload file not exist"
* build: remove integration tests which are too slow
* march: fix deadlock when using --no-traverse - fixes #8656
* pikpak: improve error handling for missing links and unrecoverable 500s
* pikpak: rewrite upload to bypass AWS S3 manager - fixes #8629
* test: fix TestSMBKerberos password expiring errors
* Add Vikas Bhansali to contributors
* Add Ross Smith II to contributors
* azureblob,azurefiles: add support for client assertion based
authentication
* webdav: fix setting modtime to that of local object instead of remote
* build: set default shell to bash in build.yml
* docs: fix filescom/filelu link mixup
* Add Davide Bizzarri to contributors
* fix: b2 versionAt read metadata
* test: make TestWebdavInfiniteScale startup more reliable
* test_all: add _connect_delay for slow starting servers
* docs: update link for filescom
* test_all: make TestWebdav InfiniteScale integration tests run
* test_all: make SMB with Kerberos integration tests run properly
* test_all: allow an env parameter to set environment variables
* Changelog updates from Version v1.70.2
* Add Ali Zein Yousuf to contributors
* Add $@M@RTH_ to contributors
* docs: update client ID instructions to current Azure AD portal - fixes
#8027
* s3: add Zata provider
* pacer: fix nil pointer deref in RetryError - fixes #8077
* docs: Remove Warp as a sponsor
* docs: add files.com as a Gold sponsor
* docs: add links to SecureBuild docker image
* Add curlwget to contributors
* convmv: fix moving to unicode-equivalent name - fixes #8634
* transform: add truncate_keep_extension and truncate_bytes
* convmv: make --dry-run logs less noisy
* sync: avoid copying dir metadata to itself
* docs: fix some function names in comments
* combine: fix directory not found errors with ListP interface - Fixes
#8627
* local: fix --skip-links on Windows when skipping Junction points
* Add Marvin R??sch to contributors
* build: bump github.com/go-chi/chi/v5 from 5.2.1 to 5.2.2 to fix
GHSA-vrw8-fxc6-2r93
* copy,copyto,move,moveto: implement logger flags to store result of sync
* log: fix deadlock when using systemd logging - fixes #8621
* docs: googlephotos: detail how to make your own client_id - fixes #8622
* Add necaran to contributors
* mega: fix tls handshake failure - fixes #8565
* Changelog updates from Version v1.70.1
* Add jinjingroad to contributors
* docs: DOI grammar error
* docs: lib/transform: cleanup formatting
* lib/transform: avoid empty charmap entry
* chore: fix function name
* convmv: fix spurious "error running command echo" on Windows
* docs: client-credentials is not support by all backends
* Start v1.71.0-DEV development
- Update to version 1.70.3:
* Version v1.70.3
* azureblob: fix server side copy error "requires exactly one scope"
* docs: explain the json log format in more detail
* check: fix difference report (was reporting error counts)
* linkbox: fix upload error "user upload file not exist"
* march: fix deadlock when using --no-traverse - fixes #8656
* pikpak: improve error handling for missing links and unrecoverable 500s
* webdav: fix setting modtime to that of local object instead of remote
* fix: b2 versionAt read metadata
* Start v1.70.3-DEV development
* docs: fix filescom/filelu link mixup
* docs: update link for filescom
- Update to version 1.70.2:
* Version v1.70.2
* docs: update client ID instructions to current Azure AD portal - fixes
#8027
* mega: fix tls handshake failure - fixes #8565
* pacer: fix nil pointer deref in RetryError - fixes #8077
* convmv: fix moving to unicode-equivalent name - fixes #8634
* convmv: make --dry-run logs less noisy
* sync: avoid copying dir metadata to itself
* combine: fix directory not found errors with ListP interface - Fixes
#8627
* local: fix --skip-links on Windows when skipping Junction points
* build: bump github.com/go-chi/chi/v5 from 5.2.1 to 5.2.2 to fix
GHSA-vrw8-fxc6-2r93
* log: fix deadlock when using systemd logging - fixes #8621
* docs: googlephotos: detail how to make your own client_id - fixes #8622
* pikpak: fix uploads fail with "aws-chunked encoding is not supported"
error
* Start v1.70.2-DEV development
* docs: Remove Warp as a sponsor
* docs: add files.com as a Gold sponsor
* docs: add links to SecureBuild docker image
- Update to version 1.70.1:
* Version v1.70.1
* docs: DOI grammar error
* docs: lib/transform: cleanup formatting
* lib/transform: avoid empty charmap entry
* chore: fix function name
* convmv: fix spurious "error running command echo" on Windows
* docs: client-credentials is not support by all backends
* Start v1.70.1-DEV development
- Update to version 1.70.0:
* Version v1.70.0
* ftp: add --ftp-http-proxy to connect via HTTP CONNECT proxy
* pcloud: fix "Access denied. You do not have permissions to perform
this operation" on large uploads
* operations: fix TransformFile when can't server-side copy/move
* fstest: fix -verbose flag after logging revamp
* googlecloudstorage: fix directory marker after // changes in #5858
* s3: fix directory marker after // changes in #5858
* azureblob: fix directory marker after // changes in #5858
* tests: ignore some more habitually failing tests
* googlephotos: fix typo in error message - Fixes #8600
* s3: MEGA S4 support
* Add Ser-Bul to contributors
* chunker: fix double-transform
* docs: mailru: added note about permissions level choice for the apps
password
* tests: ignore habitually failing tests and backends
* docs: link to asciinema rather than including the js
* docs: must have rel="noopener"
* sync: fix testLoggerVsLsf when dst is local
* docs: fix FileLu docs
* build: update all dependencies
* onedrive: fix crash if no metadata was updated
* Add kingston125 to contributors
* Add Flora Thiebaut to contributors
* Add FileLu cloud storage backend
* doi: add new doi backend
* build: fix check_autogenerated_edits.py flagging up files that didn't
exist
* docs: rc: add more info on how to discover _config and _filter
parameters #8584
* s3: add Exaba provider
* convmv: add convmv command
* lib/transform: add transform library and --name-transform flag
* march: split src and dst
* Add ahxxm to contributors
* Add Nathanael Demacon to contributors
* b2: use file id from listing when not presented in headers - fixes
#8113
* fs: fix goroutine leak and improve stats accounting process
* march: fix syncing with a duplicate file and directory
* Add PrathameshLakawade to contributors
* Add Oleksiy Stashok to contributors
* docs: fix page_facing_up typo next to Lyve Cloud in README.md
* backend/s3: require custom endpoint for Lyve Cloud v2 support
* backend: skip hash calculation when the hashType is None - fixes #8518
* azureblob: fix multipart server side copies of 0 sized files
* Add Jeremy Daer to contributors
* Add wbulot to contributors
* s3: add Pure Storage FlashBlade provider support (#8575)
* backend/gofile: update to use new direct upload endpoint
* log: add --windows-event-log-level to support Windows Event Log
* fs: Remove github.com/sirupsen/logrus and replace with log/slog
* Add fhuber to contributors
* cmd serve s3: fix ListObjectsV2 response
* Changelog updates from Version v1.69.3
* onedrive: re-add --onedrive-upload-cutoff flag
* onedrive: fix "The upload session was not found" errors
* Add Germ??n Casares to contributors
* Add Jeff Geerling to contributors
* googlephotos: update read only and read write scopes to meet Google's
requirements.
* build: update github.com/ebitengine/purego to v0.8.3 to fix mac_amd64
build
* docs: add hint about config touch and config file not found
* docs: add FAQ for dismissing 'rclone.conf not found'
* docs: document how to keep an out of tree backend
* Add Cl??ment Wehrung to contributors
* iclouddrive: fix panic and files potentially downloaded twice
* docs: move --max-connections documentation to the correct place
* Add Ben Boeckel to contributors
* Add Tho Neyugn to contributors
* docs: fix typo in s3/storj docs
* serve s3: remove redundant handler initialization
* Changelog updates from Version 1.69.2
* sftp: add --sftp-http-proxy to connect via HTTP CONNECT proxy
* Add Jugal Kishore to contributors
* docs: correct SSL docs anchor link from #ssl-tls to #tls-ssl
* drive: metadata: fix error when setting
copy-requires-writer-permission on a folder
* docs: Update contributors
* build: bump golang.org/x/net from 0.36.0 to 0.38.0
* Update README.md
* docs: fix typos via codespell
* webdav: add an ownCloud Infinite Scale vendor that enables tus chunked
upload support
* onedrive: fix metadata ordering in permissions
* Add Ben Alex to contributors
* Add simwai to contributors
* iclouddrive: fix so created files are writable
* cmd/authorize: show required arguments in help text
* cloudinary: var naming convention - #8416
* cloudinary: automatically add/remove known media files extensions #8416
* Add Markus Gerstel to contributors
* Add Enduriel to contributors
* Add huanghaojun to contributors
* Add simonmcnair to contributors
* Add Samantha Bowen to contributors
* s3: documentation regression - fixes #8438
* hash: add SHA512 support for file hashes
* vfs: fix inefficient directory caching when directory reads are slow
* docs: update fuse version in docker docs
* fs/config: Read configuration passwords from stdin even when
terminated with EOF - fixes #8480
* cmd/gitannex: Reject unknown layout modes in INITREMOTE
* cmd/gitannex: Add configparse.go and refactor
* cmd/gitannex: Permit remotes with options
* serve ftp: add serve rc interface
* serve sftp: add serve rc interface
* serve restic: add serve rc interface
* serve s3: add serve rc interface
* serve dlna: add serve rc interface
* serve webdav: add serve rc interface - fixes #4505
* serve http: add serve rc interface
* serve nfs: add serve rc interface
* serve: Add rc control for serve commands #4505
* configstruct: add SetAny to parse config from the rc
* rc: In options/info make FieldName contain a "." if it should be nested
* serve restic: convert options to new style
* serve s3: convert options to new style
* serve http: convert options to new style
* serve webdav: convert options to new style
* auth proxy: convert options to new style
* auth proxy: add VFS options parameter for use for default VFS
* serve: make the servers self registering
* lib/http: fix race between Serve() and Shutdown()
* lib/http: add Addr() method to return the first configured server
address
* Add Danny Garside to contributors
* docs: fix minor typo in box docs
* sync: implement --list-cutoff to allow on disk sorting for reduced
memory use
* march: Implement callback based syncing
* list: add ListDirSortedFn for callback oriented directory listing
* list: Implement Sorter to sort directory entries
* cache: mark ListP as not supported yet
* hasher: implement ListP interface
* compress: implement ListP interface
* chunker: mark ListP as not supported yet
* union: mark ListP as not supported yet
* crypt: implement ListP interface
* combine: implement ListP interface
* s3: Implement paged listing interface ListP
* list: add WithListP helper to implement List for ListP backends
* walk: move NewListRHelper into list.Helper to avoid circular dependency
* fs: define ListP interface for paged listing #4788
* accounting: Add listed stat for number of directory entries listed
* walk: factor Listing helpers into their own file and add tests
* serve nfs: make metadata files have special file handles
* serve nfs: change the format of --nfs-cache-type symlink file handles
* vfs: add --vfs-metadata-extension to expose metadata sidecar files
* docs: Add rcloneui.com as Silver Sponsor
* Add Klaas Freitag to contributors
* Add eccoisle to contributors
* Add Fernando Fern??ndez to contributors
* Add alingse to contributors
* Add J??rn Friedrich Dreyer to contributors
* docs: replace option --auto-filename-header with --header-filename
* build: update github.com/golang-jwt/jwt/v5 from 5.2.1 to 5.2.2 to fix
CVE-2025-30204
* docs/googlephotos: fix typos
* build: bump github.com/golang-jwt/jwt/v4 from 4.5.1 to 4.5.2
* operations: fix call fmt.Errorf with wrong err
* webdav: retry propfind on 425 status
* Add --max-connections to control maximum backend concurrency
* rc: fix debug/* commands not being available over unix sockets
* cmd/gitannex: Prevent tests from hanging when assertion fails
* cmd/gitannex: Add explicit timeout for mock stdout reads in tests
* http: correct root if definitely pointing to a file - fixes #8428
* pool: add --max-buffer-memory to limit total buffer memory usage
* filter: Add `--hash-filter` to deterministically select a subset of
files
* build: update golang.org/x/net to 0.36.0. to fix CVE-2025-22869
* rc: add add short parameter to core/stats to not return transferring
and checking
* fs: fix corruption of SizeSuffix with "B" suffix in config (eg
--min-size)
* filters: show --min-size and --max-size in --dump filters
* build: check docs for edits of autogenerated sections
* Add jack to contributors
* docs: fix incorrect mentions of vfs-cache-min-free-size
* fs/object: fix memory object out of bounds Seek
* serve nfs: fix unlikely crash
* docs: update minimum OS requirements for go1.24
* cmd/gitannex: Tweak parsing of "rcloneremotename" config
* cmd/gitannex: Drop var rebindings now that we have go1.23
* docs: add note for using rclone cat for slicing out a byte range from
a file
* rcserver: improve content-type check
* build: modernize Go usage
* build: update all dependencies and fix deprecations
* build: update golang.org/x/crypto to v0.35.0 to fix CVE-2025-22869
* build: make go1.23 the minimum go version
* cmd/gitannex: Add to integration tests
* cmd/gitannex: Simplify verbose failures in tests
* cmd/gitannex: Port unit tests to fstest
* vfs: fix integration test failures
* azureblob: fix errors not being retried when doing single part copy
* azureblob: handle retry error codes more carefully
* touch: make touch obey --transfers
* Add luzpaz to contributors
* Add Dave Vasilevsky to contributors
* docs: fix various typos
* dropbox: Retry link without expiry
* Dropbox: Support Dropbox Paper
* chore: update contributor email
* docs: correct stable release workflow
* Add Lorenz Brun to contributors
* Add Michael Kebe to contributors
* vfs: fix directory cache serving stale data
* build: fix docker plugin build - fixes #8394
* docs: improved sftp limitations
* Changelog updates from Version v1.69.1
* docs: add FileLu as sponsors and tidy sponsor logos
* accounting: fix percentDiff calculation -- fixes #8345
* vfs: fix the cache failing to upload symlinks when --links was
specified
* Add jbagwell-akamai to contributors
* Add ll3006 to contributors
* doc: add note on concurrency of rclone purge
* s3: add latest Linode Object Storage endpoints
* cmd: fix crash if rclone is invoked without any arguments - Fixes #8378
* build: disable docker builds on PRs & add missing dockerfile changes
* sync: copy dir modtimes even when copyEmptySrcDirs is false - fixes
#8317
* sync: add tests to check dir modtimes are kept when syncing
* fix golangci-lint errors
* bisync: fix false positive on integration tests
* s3: split the GCS quirks into -s3-use-x-id and
-s3-sign-accept-encoding #8373
* Add Joel K Biju to contributors
* stats: fix the speed not getting updated after a pause in the
processing
* opendrive: added --opendrive-access flag to handle permissions
* bisync: fix listings missing concurrent modifications - fixes #8359
* Added parallel docker builds and caching for go build in the container
* smb: improve connection pooling efficiency
* lib/oauthutil: fix redirect URL mismatch errors - fixes #8351
* b2: fix "fatal error: concurrent map writes" - fixes #8355
* Add Alexander Minbaev to contributors
* Add Zachary Vorhies to contributors
* Add Jess to contributors
* s3: add IBM IAM signer - fixes #7617
* serve nfs: update docs to note Windows is not supported - fixes #8352
* cmd/config(update remote): introduce --no-output option
* s3: add DigitalOcean regions SFO2, LON1, TOR1, BLR1
* sync: fix cpu spinning when empty directory finding with leading
slashes
* s3: fix handling of objects with // in #5858
* azureblob: fix handling of objects with // in #5858
* fstest: add integration tests objects with // on bucket based backends
#5858
* fs/list: tweak directory listing assertions after allowing // names
* lib/bucket: fix tidying of // in object keys #5858
* lib/bucket: add IsAllSlashes function
* azureblob: remove uncommitted blocks on InvalidBlobOrBlock error
* azureblob: implement multipart server side copy
* azureblob: speed up server side copies for small files #8249
* azureblob: cleanup uncommitted blocks on upload errors
* azureblob: factor readMetaData into readMetaDataAlways returning blob
properties
* Add b-wimmer to contributors
* azurefiles: add --azurefiles-use-az and
--azurefiles-disable-instance-discovery
* onedrive: mark German (de) region as deprecated
* Add Trevor Starick to contributors
* Add hiddenmarten to contributors
* Add Corentin Barreau to contributors
* Add Bruno Fernandes to contributors
* Add Moises Lima to contributors
* Add izouxv to contributors
* Add Robin Schneider to contributors
* Add Tim White to contributors
* Add Christoph Berger to contributors
* azureblob: add support for `x-ms-tags` header
* rc: disable the metrics server when running `rclone rc`
* internetarchive: add --internetarchive-metadata="key=value" for
setting item metadata
* lib/batcher: Deprecate unused option: batch_commit_timeout
* s3: Added new storage class to magalu provider
* http servers: add --user-from-header to use for authentication
* b2: add SkipDestructive handling to backend commands - fixes #8194
* vfs: close the change notify channel on Shutdown
* Docker image: Add label org.opencontainers.image.source for release
notes in Renovate dependency updates
* docs: add OneDrive Impersonate instructions - fixes #5610
* docs: explain the stringArray flag parameter descriptor
* iclouddrive: add notes on ADP and Missing PCS cookies - fixes #8310
* docs: fix typos found by codespell in docs and code comments
* fs: fix confusing "didn't find section in config file" error
* vfs: fix race detected by race detector
* Add Jonathan Giannuzzi to contributors
* Add Spencer McCullough to contributors
* Add Matt Ickstadt to contributors
* smb: add support for kerberos authentication
* drive: added `backend moveid` command
* docs: fix reference to serves3 setting disable_multipart_uploads which
was renamed
* docs: fix link to Rclone Serve S3
* serve s3: fix list objects encoding-type
* build: update gopkg.in/yaml.v2 to v3
* build: update all dependencies
* bisync: fix go vet problems with go1.24
* build: update to go1.24rc1 and make go1.22 the minimum required version
* version: add --deps flag to show dependencies and other build info
* doc: make man page well formed for whatis - fixes #7430
* Start v1.70.0-DEV development
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-151=1
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2026-151=1
Package List:
- openSUSE Backports SLE-15-SP7 (aarch64 i586 ppc64le s390x x86_64):
rclone-1.73.5-bp157.2.3.1
rclone-debuginfo-1.73.5-bp157.2.3.1
- openSUSE Backports SLE-15-SP7 (noarch):
rclone-bash-completion-1.73.5-bp157.2.3.1
rclone-zsh-completion-1.73.5-bp157.2.3.1
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):
rclone-1.73.5-bp156.2.6.1
- openSUSE Backports SLE-15-SP6 (noarch):
rclone-bash-completion-1.73.5-bp156.2.6.1
rclone-zsh-completion-1.73.5-bp156.2.6.1
References:
https://www.suse.com/security/cve/CVE-2023-45286.html
https://www.suse.com/security/cve/CVE-2023-45288.html
https://www.suse.com/security/cve/CVE-2023-48795.html
https://www.suse.com/security/cve/CVE-2024-24786.html
https://www.suse.com/security/cve/CVE-2024-45337.html
https://www.suse.com/security/cve/CVE-2024-45338.html
https://www.suse.com/security/cve/CVE-2024-51744.html
https://www.suse.com/security/cve/CVE-2024-52522.html
https://www.suse.com/security/cve/CVE-2025-22869.html
https://www.suse.com/security/cve/CVE-2025-22870.html
https://www.suse.com/security/cve/CVE-2025-30204.html
https://www.suse.com/security/cve/CVE-2025-58181.html
https://www.suse.com/security/cve/CVE-2025-68121.html
https://www.suse.com/security/cve/CVE-2026-1229.html
https://www.suse.com/security/cve/CVE-2026-27141.html
https://www.suse.com/security/cve/CVE-2026-33186.html
https://www.suse.com/security/cve/CVE-2026-41176.html
https://www.suse.com/security/cve/CVE-2026-41179.html
https://bugzilla.suse.com/1140423
https://bugzilla.suse.com/1232964
https://bugzilla.suse.com/1233422
https://bugzilla.suse.com/1262438
https://bugzilla.suse.com/1262439
openSUSE-SU-2026:0150-1: important: Security update for flannel
openSUSE Security Update: Security update for flannel
_______________________________
Announcement ID: openSUSE-SU-2026:0150-1
Rating: important
References: #1260847 #1260853
Cross-References: CVE-2026-33343 CVE-2026-33413
CVSS scores:
CVE-2026-33343 (SUSE): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVE-2026-33413 (SUSE): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for flannel fixes the following issues:
- Update to version 0.28.4:
* fix go version (don't set patch version) (#2428)
* Bump flannel-cni-plugin to v1.9.1-flannel1 (#2427)
* Bump the other-go-modules group across 1 directory with 3 updates
(#2425)
* Bump the tencent group with 2 updates (#2417)
* Bump the etcd group with 4 updates (#2398), includes fix for
CVE-2026-33413 (boo#1260853) and CVE-2026-33343 (boo#1260847)
* Bump go.opentelemetry.io/otel/sdk from 1.40.0 to 1.43.0 (#2420)
* Bump go to 1.25 (#2424)
* Bump actions/upload-pages-artifact from 4.0.0 to 5.0.0
* Bump docker/build-push-action from 7.0.0 to 7.1.0
* Bump docker/login-action from 4.0.0 to 4.1.0
* Verify the kubectl sha256sum
* Secure makefile (#2414)
* Improve the security of Dockerfile
* Bump github/codeql-action from 4.34.1 to 4.35.1 (#2409)
* Bump actions/deploy-pages from 4.0.5 to 5.0.0
* lease: only print BackendData when json.Marshal succeeds
* vxlan: delete v6 direct route with correct Route struct
* fix: honor --stderrthreshold flag when --logtostderr is enabled
* Bump actions/configure-pages from 5.0.0 to 6.0.0
* Bump actions/setup-go from 6.3.0 to 6.4.0
* don't use unquoted shell vars in extensions backend example
* Don't use shell invocations in extensions backend.
* Bump google.golang.org/grpc from 1.71.1 to 1.79.3
* Bump ossf/scorecard-action from 2.4.1 to 2.4.3
* Bump actions/upload-artifact from 4.6.1 to 7.0.0
* Bump docker/metadata-action from 5.10.0 to 6.0.0
* Bump actions/checkout from 4.2.2 to 6.0.2
* Bump docker/setup-buildx-action from 3.12.0 to 4.0.0
* Bump aquasecurity/trivy-action from 0.33.1 to 0.35.0
* Bump docker/setup-qemu-action from 3.7.0 to 4.0.0
* [StepSecurity] Apply security best practices
* Bump actions/attest-build-provenance from 3.2.0 to 4.1.0
* Fix logic in AddBlackholeV4Route and AddBlackholeV6Route to correctly
check for existing routes
* Added check for nftables before checking br_netfilter module
* Bump golang.org/x/crypto from 0.36.0 to 0.45.0
* Bump k8s deps to v0.32.10
* Bump golang-ci-lint to v2.7.2
* Bump golangci/golangci-lint-action from 6.1.1 to 9.2.0
* Additional check on podCIDR
* ip: improve primary address selection to account for address flags
* Added TAG to fix bin version
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2026-150=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):
flannel-0.28.4-bp156.4.6.1
- openSUSE Backports SLE-15-SP6 (noarch):
flannel-k8s-yaml-0.28.4-bp156.4.6.1
References:
https://www.suse.com/security/cve/CVE-2026-33343.html
https://www.suse.com/security/cve/CVE-2026-33413.html
https://bugzilla.suse.com/1260847
https://bugzilla.suse.com/1260853
openSUSE-SU-2026:0149-1: important: Security update for flannel
openSUSE Security Update: Security update for flannel
_______________________________
Announcement ID: openSUSE-SU-2026:0149-1
Rating: important
References: #1260847 #1260853
Cross-References: CVE-2026-33343 CVE-2026-33413
CVSS scores:
CVE-2026-33343 (SUSE): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVE-2026-33413 (SUSE): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for flannel fixes the following issues:
- Update to version 0.28.4:
* fix go version (don't set patch version) (#2428)
* Bump flannel-cni-plugin to v1.9.1-flannel1 (#2427)
* Bump the other-go-modules group across 1 directory with 3 updates
(#2425)
* Bump the tencent group with 2 updates (#2417)
* Bump the etcd group with 4 updates (#2398), includes fix for
CVE-2026-33413 (boo#1260853) and CVE-2026-33343 (boo#1260847)
* Bump go.opentelemetry.io/otel/sdk from 1.40.0 to 1.43.0 (#2420)
* Bump go to 1.25 (#2424)
* Bump actions/upload-pages-artifact from 4.0.0 to 5.0.0
* Bump docker/build-push-action from 7.0.0 to 7.1.0
* Bump docker/login-action from 4.0.0 to 4.1.0
* Verify the kubectl sha256sum
* Secure makefile (#2414)
* Improve the security of Dockerfile
* Bump github/codeql-action from 4.34.1 to 4.35.1 (#2409)
* Bump actions/deploy-pages from 4.0.5 to 5.0.0
* lease: only print BackendData when json.Marshal succeeds
* vxlan: delete v6 direct route with correct Route struct
* fix: honor --stderrthreshold flag when --logtostderr is enabled
* Bump actions/configure-pages from 5.0.0 to 6.0.0
* Bump actions/setup-go from 6.3.0 to 6.4.0
* don't use unquoted shell vars in extensions backend example
* Don't use shell invocations in extensions backend.
* Bump google.golang.org/grpc from 1.71.1 to 1.79.3
* Bump ossf/scorecard-action from 2.4.1 to 2.4.3
* Bump actions/upload-artifact from 4.6.1 to 7.0.0
* Bump docker/metadata-action from 5.10.0 to 6.0.0
* Bump actions/checkout from 4.2.2 to 6.0.2
* Bump docker/setup-buildx-action from 3.12.0 to 4.0.0
* Bump aquasecurity/trivy-action from 0.33.1 to 0.35.0
* Bump docker/setup-qemu-action from 3.7.0 to 4.0.0
* [StepSecurity] Apply security best practices
* Bump actions/attest-build-provenance from 3.2.0 to 4.1.0
* Fix logic in AddBlackholeV4Route and AddBlackholeV6Route to correctly
check for existing routes
* Added check for nftables before checking br_netfilter module
* Bump golang.org/x/crypto from 0.36.0 to 0.45.0
* Bump k8s deps to v0.32.10
* Bump golang-ci-lint to v2.7.2
* Bump golangci/golangci-lint-action from 6.1.1 to 9.2.0
* Additional check on podCIDR
* ip: improve primary address selection to account for address flags
* Added TAG to fix bin version
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-149=1
Package List:
- openSUSE Backports SLE-15-SP7 (aarch64 i586 ppc64le s390x x86_64):
flannel-0.28.4-bp157.2.6.1
- openSUSE Backports SLE-15-SP7 (noarch):
flannel-k8s-yaml-0.28.4-bp157.2.6.1
References:
https://www.suse.com/security/cve/CVE-2026-33343.html
https://www.suse.com/security/cve/CVE-2026-33413.html
https://bugzilla.suse.com/1260847
https://bugzilla.suse.com/1260853
openSUSE-SU-2026:0148-1: critical: Security update for cacti, cacti-spine
openSUSE Security Update: Security update for cacti, cacti-spine
_______________________________
Announcement ID: openSUSE-SU-2026:0148-1
Rating: critical
References: #1231027 #1231369 #1231370 #1231371 #1231372
#1236482 #1236486 #1236487 #1236488 #1236489
#1236490
Cross-References: CVE-2024-43362 CVE-2024-43363 CVE-2024-43364
CVE-2024-43365 CVE-2024-45598 CVE-2024-54145
CVE-2024-54146 CVE-2025-22604 CVE-2025-24367
CVE-2025-24368
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that solves 10 vulnerabilities and has one errata
is now available.
Description:
This update for cacti, cacti-spine fixes the following issues:
cacti 1.2.30:
- Unable to add new users
- When using Automation Rules, specifying graph criteria may cause issues
- When transferring a system from a backup if the poller has not run
recently rrdtool issues are found
- When translating, quotes may cause incorrect text to appear
- When using Boost for the first time, warnings may appear
- When refreshing forms, items may be checked incorrectly by xmacan
cacti 1.2.29:
- CVE-2025-22604 GHSA-c5j8-jxj3-hh36 - Authenticated RCE via multi-line
SNMP responses (bsc#1236488)
- CVE-2025-24368 GHSA-f9c7-7rc3-574c - SQL Injection vulnerability when
using tree rules through Automation API (bsc#1236490)
- CVE-2024-54145 GHSA-fh3x-69rr-qqpp - SQL Injection vulnerability when
request automation devices (bsc#1236487)
- CVE-2025-24367 GHSA-fxrq-fr7h-9rqq - Arbitrary File Creation leading
to RCE (bsc#1236489)
- CVE-2024-45598 GHSA-pv2c-97pp-vxwg - Local File Inclusion (LFI)
Vulnerability via Poller Standard Error Log Path (bsc#1236482)
- CVE-2024-54146 GHSA-vj9g-P7F2-4wqj - SQL Injection vulnerability when
view host template (bsc#1236486)
- issue: Temporary table names may incorrectly think they have a schema
- issue: When using Preset Time to view graphs, it is using a fixed
point rather than relative time
- issue: Fix issue where RRA files are not automatically removed
- issue: Fix invalid help link for Automation Networks
- issue: Unable to disable a tree within the GUI
- issue: When removing graphs, RRA files may be left behind
- issue: Improve compatibility with ping under FreeBSD
- issue: Improve compatibility wtih Slice RRD tool under PHP 8.x
- issue: Allow IPv6 formats to use colons without port
- issue: Update Fortigate, Aruba OSCX and Clearpass templates
- issue: When a plugin is disabled, unable to use GUI to enable it again
- issue: When upgrading, ensure that replication only runs as necessary
- issue: Improve caching and syncing issues with replication
- issue: Improve caching techniques for database calls
- issue: Improve compatibility for Error constants under PHP 8.4
- issue: When running the upgrade database script, cursor is left in the
middle of the row
- issue: Guest page does not automatically refresh
- issue: When installing, conversion of tables may produce collation
errors
- feature: Add HPE Nimble/Alletra template
- feature: When installing, only convert core cacti tables
- Add /srv/www directories to filelist [boo#1231027]
- fix for cacti-cron.timer & cacti-cron.service failing after upgrade has
already removed
- replace cacti-cron.timer & cacti-cron.service with cactid.service to fix
thold & other "sub poller" poller processes not running.
cacti 1.2.28:
- CVE-2024-43365 GHSA-49f2-hwx9-qffr: XSS vulnerability when creating
external links with the consolenewsection parameter (bsc#1231372)
- CVE-2024-43364 GHSA-fgc6-g8gc-wcg5: XSS vulnerability when creating
external links with the title parameter (bsc#1231371)
- CVE-2024-43363 GHSA-gxq4-mv8h-6qj4: RCE vulnerability can be executed
via Log Poisoning (bsc#1231370)
- CVE-2024-43362 GHSA-wh9c-v56x-v77c: XSS vulnerability when creating
external links with the fileurl parameter
- issue: When using LDAP authentication the first time, warnings may
appear in logs
- issue: When installing, a replication loop for plugin_realms may occur
- issue: When installing, remote poller may attempt to sync with other
pollers
- issue: When a Data Query has a space, indexes may not be properly
escaped
- issue: Boost does not always order data source records properly
- issue: Add IP address to the login audit for successful logins by
xmacan
- issue: Undefined variable error may sometimes occur when dealing with
RRD output by MSS970
- issue: When export to CSV, only the first line of notes is included
- issue: When rendering forms, missing default value can cause errors
- issue: Allow hosted content to be executable for the links page
- issue: When closing database connections, some may linger incorrectly
- issue: When changing passwords, an infinite loop may occur by
ddb4github
- issue: When using Cacti Daemon, a "Cron out of sync" message may be
reported
- issue: Add ability to filter/sort users by group or last login time
- issue: When using List View, unable to add Graphs to a Report
- issue: When using SNMPv3, some devices may show polling issues
- issue: Limit table conversion to Cacti core tables
- issue: Fix issues with posix-based kills on Windows
- issue: When installing, password changes may fail on new installations
- issue: When using structured RRD folders, permission issues may be
flagged incorrectly
- issue: When unable to locate a valid theme, new default will be Modern
- issue: Properly cache the data source information for dsstats
processing
- issue: When reindexing, verify all fields may not work as intended
- feature: Add ability to log database connections/disconnections
- feature: Add Ping Method where connection refused assumes host is up
- feature: When displaying graphs, default end time does not show full
24 hour period
- feature: Add --id to remove_device.php
- feature: Add Location and Site to Graph List View
- feature: Add more verbose logging to Boost
- feature: Update jQuery to 3.7.1
- feature: Update jQueryUI to 1.14.0
- feature: Update Purify.js to 3.1.6
- feature: Update billboard.js to 3.13.0
- feature: Improve the performance of the repopulation of the poller
cache
Changes in cacti-spine:
cacti-spine 1.2.30:
- no changes
- Bump/rebuild to match Cacti 1.2.30
cacti-spine 1.2.28:
- When using Ping or SNMP Uptime, host is not always detected properly
- Add Ping Method where connection refused assumes host is up
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-148=1
Package List:
- openSUSE Backports SLE-15-SP7 (noarch):
cacti-1.2.30-bp157.2.3.1
References:
https://www.suse.com/security/cve/CVE-2024-43362.html
https://www.suse.com/security/cve/CVE-2024-43363.html
https://www.suse.com/security/cve/CVE-2024-43364.html
https://www.suse.com/security/cve/CVE-2024-43365.html
https://www.suse.com/security/cve/CVE-2024-45598.html
https://www.suse.com/security/cve/CVE-2024-54145.html
https://www.suse.com/security/cve/CVE-2024-54146.html
https://www.suse.com/security/cve/CVE-2025-22604.html
https://www.suse.com/security/cve/CVE-2025-24367.html
https://www.suse.com/security/cve/CVE-2025-24368.html
https://bugzilla.suse.com/1231027
https://bugzilla.suse.com/1231369
https://bugzilla.suse.com/1231370
https://bugzilla.suse.com/1231371
https://bugzilla.suse.com/1231372
https://bugzilla.suse.com/1236482
https://bugzilla.suse.com/1236486
https://bugzilla.suse.com/1236487
https://bugzilla.suse.com/1236488
https://bugzilla.suse.com/1236489
https://bugzilla.suse.com/1236490
SUSE-SU-2026:1568-1: moderate: Security update for haproxy
# Security update for haproxy
Announcement ID: SUSE-SU-2026:1568-1
Release Date: 2026-04-23T12:11:11Z
Rating: moderate
References:
* bsc#1262103
Cross-References:
* CVE-2026-33555
CVSS scores:
* CVE-2026-33555 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
* CVE-2026-33555 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2026-33555 ( NVD ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise High Availability Extension 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for haproxy fixes the following issue:
* CVE-2026-33555: Request smuggling via HTTP/3 parser desynchronization
(bsc#1262103).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1568=1
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2026-1568=1
* SUSE Linux Enterprise High Availability Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2026-1568=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* haproxy-2.8.11+git0.01c1056a4-150600.3.12.1
* haproxy-debugsource-2.8.11+git0.01c1056a4-150600.3.12.1
* haproxy-debuginfo-2.8.11+git0.01c1056a4-150600.3.12.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* haproxy-2.8.11+git0.01c1056a4-150600.3.12.1
* haproxy-debugsource-2.8.11+git0.01c1056a4-150600.3.12.1
* haproxy-debuginfo-2.8.11+git0.01c1056a4-150600.3.12.1
* SUSE Linux Enterprise High Availability Extension 15 SP7 (aarch64 ppc64le
s390x x86_64)
* haproxy-2.8.11+git0.01c1056a4-150600.3.12.1
* haproxy-debugsource-2.8.11+git0.01c1056a4-150600.3.12.1
* haproxy-debuginfo-2.8.11+git0.01c1056a4-150600.3.12.1
## References:
* https://www.suse.com/security/cve/CVE-2026-33555.html
* https://bugzilla.suse.com/show_bug.cgi?id=1262103
SUSE-SU-2026:1574-1: important: Security update for the Linux Kernel
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2026:1574-1
Release Date: 2026-04-23T15:52:59Z
Rating: important
References:
* bsc#1215492
* bsc#1246057
* bsc#1256675
* bsc#1257773
* bsc#1259797
* bsc#1260005
* bsc#1260009
* bsc#1260347
* bsc#1260562
Cross-References:
* CVE-2025-38234
* CVE-2025-68818
* CVE-2026-23103
* CVE-2026-23243
* CVE-2026-23272
* CVE-2026-23274
* CVE-2026-23317
CVSS scores:
* CVE-2025-38234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38234 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23103 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23243 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23243 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23243 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23272 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23272 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23272 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23274 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23274 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23317 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23317 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23317 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Micro 5.5
An update that solves seven vulnerabilities and has two security fixes can now
be installed.
## Description:
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2025-38234: sched/rt: Fix race in push_rt_task (bsc#1246057).
* CVE-2025-68818: scsi: Revert "scsi: qla2xxx: Perform lockless command
completion in abort path" (bsc#1256675).
* CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).
* CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write
(bsc#1259797).
* CVE-2026-23272: netfilter: nf_tables: unconditionally bump set->nelems
before insertion (bsc#1260009).
* CVE-2026-23274: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer
labels (bsc#1260005).
* CVE-2026-23317: drm/vmwgfx: Return the correct value in vmw_translate_ptr
functions (bsc#1260562).
The following non-security bugs were fixed:
* PCI/ACS: Fix 'pci=config_acs=' parameter (git-fixes).
* PCI: Fix lock symmetry in pci_slot_unlock() (git-fixes).
* PCI: Fix pci_slot_trylock() error handling (git-fixes).
* PCI: dwc: ep: Return -ENOMEM for allocation failures (git-fixes).
* PCI: tegra194: Fix duplicate PLL disable in pex_ep_event_pex_rst_assert()
(git-fixes).
* nvme-fc: use ctrl state getter (git-fixes bsc#1215492).
* nvme-pci: fix queue unquiesce check on slot_reset (git-fixes).
* nvme-pci: skip nvme_write_sq_db on empty rqlist (git-fixes).
* x86/platform/uv: Handle deconfigured sockets (bsc#1260347).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1574=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1574=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.127.1
* kernel-devel-rt-5.14.21-150500.13.127.1
* openSUSE Leap 15.5 (x86_64)
* dlm-kmp-rt-5.14.21-150500.13.127.1
* kernel-rt-optional-debuginfo-5.14.21-150500.13.127.1
* kernel-rt-devel-5.14.21-150500.13.127.1
* kernel-rt-optional-5.14.21-150500.13.127.1
* reiserfs-kmp-rt-5.14.21-150500.13.127.1
* kernel-rt_debug-vdso-5.14.21-150500.13.127.1
* kernel-rt-extra-5.14.21-150500.13.127.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.127.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.127.1
* ocfs2-kmp-rt-5.14.21-150500.13.127.1
* kselftests-kmp-rt-debuginfo-5.14.21-150500.13.127.1
* gfs2-kmp-rt-5.14.21-150500.13.127.1
* kernel-rt-debugsource-5.14.21-150500.13.127.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.127.1
* reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.127.1
* kernel-syms-rt-5.14.21-150500.13.127.1
* kernel-rt-livepatch-5.14.21-150500.13.127.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.127.1
* kernel-rt-debuginfo-5.14.21-150500.13.127.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.127.1
* kselftests-kmp-rt-5.14.21-150500.13.127.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.127.1
* cluster-md-kmp-rt-5.14.21-150500.13.127.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.127.1
* kernel-rt-livepatch-devel-5.14.21-150500.13.127.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.127.1
* kernel-rt-vdso-5.14.21-150500.13.127.1
* kernel-rt_debug-devel-5.14.21-150500.13.127.1
* kernel-rt-extra-debuginfo-5.14.21-150500.13.127.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.127.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.127.1
* openSUSE Leap 15.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.127.1
* kernel-rt_debug-5.14.21-150500.13.127.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.127.1
* kernel-devel-rt-5.14.21-150500.13.127.1
* SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.127.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* kernel-rt-debuginfo-5.14.21-150500.13.127.1
* kernel-rt-debugsource-5.14.21-150500.13.127.1
## References:
* https://www.suse.com/security/cve/CVE-2025-38234.html
* https://www.suse.com/security/cve/CVE-2025-68818.html
* https://www.suse.com/security/cve/CVE-2026-23103.html
* https://www.suse.com/security/cve/CVE-2026-23243.html
* https://www.suse.com/security/cve/CVE-2026-23272.html
* https://www.suse.com/security/cve/CVE-2026-23274.html
* https://www.suse.com/security/cve/CVE-2026-23317.html
* https://bugzilla.suse.com/show_bug.cgi?id=1215492
* https://bugzilla.suse.com/show_bug.cgi?id=1246057
* https://bugzilla.suse.com/show_bug.cgi?id=1256675
* https://bugzilla.suse.com/show_bug.cgi?id=1257773
* https://bugzilla.suse.com/show_bug.cgi?id=1259797
* https://bugzilla.suse.com/show_bug.cgi?id=1260005
* https://bugzilla.suse.com/show_bug.cgi?id=1260009
* https://bugzilla.suse.com/show_bug.cgi?id=1260347
* https://bugzilla.suse.com/show_bug.cgi?id=1260562
SUSE-SU-2026:1577-1: important: Security update for openssl-1_1
# Security update for openssl-1_1
Announcement ID: SUSE-SU-2026:1577-1
Release Date: 2026-04-23T15:53:50Z
Rating: important
References:
* bsc#1260441
* bsc#1260442
* bsc#1260443
* bsc#1260444
* bsc#1261678
Cross-References:
* CVE-2026-28387
* CVE-2026-28388
* CVE-2026-28389
* CVE-2026-28390
* CVE-2026-31789
CVSS scores:
* CVE-2026-28387 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2026-28387 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-28388 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28388 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28389 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-28389 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28389 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28390 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28390 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28390 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-28390 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-31789 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-31789 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves five vulnerabilities can now be installed.
## Description:
This update for openssl-1_1 fixes the following issues:
* CVE-2026-28387: Potential use-after-free in DANE client code (bsc#1260441).
* CVE-2026-28388: NULL Pointer Dereference When Processing a Delta CRL
(bsc#1260442).
* CVE-2026-28389: Possible NULL dereference when processing CMS
KeyAgreeRecipientInfo (bsc#1260443).
* CVE-2026-28390: NULL pointer dereference during processing of a crafted CMS
EnvelopedData message with KeyTransportRecipientInfo (bsc#1261678).
* CVE-2026-31789: Heap buffer overflow in hexadecimal conversion
(bsc#1260444).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1577=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1577=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1577=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* openssl-1_1-debugsource-1.1.1w-150600.5.26.2
* libopenssl1_1-1.1.1w-150600.5.26.2
* openssl-1_1-1.1.1w-150600.5.26.2
* libopenssl-1_1-devel-1.1.1w-150600.5.26.2
* openssl-1_1-debuginfo-1.1.1w-150600.5.26.2
* libopenssl1_1-debuginfo-1.1.1w-150600.5.26.2
* openSUSE Leap 15.6 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1w-150600.5.26.2
* libopenssl-1_1-devel-32bit-1.1.1w-150600.5.26.2
* libopenssl1_1-32bit-1.1.1w-150600.5.26.2
* openSUSE Leap 15.6 (noarch)
* openssl-1_1-doc-1.1.1w-150600.5.26.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* libopenssl-1_1-devel-64bit-1.1.1w-150600.5.26.2
* libopenssl1_1-64bit-debuginfo-1.1.1w-150600.5.26.2
* libopenssl1_1-64bit-1.1.1w-150600.5.26.2
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* openssl-1_1-debugsource-1.1.1w-150600.5.26.2
* libopenssl1_1-1.1.1w-150600.5.26.2
* openssl-1_1-1.1.1w-150600.5.26.2
* libopenssl-1_1-devel-1.1.1w-150600.5.26.2
* openssl-1_1-debuginfo-1.1.1w-150600.5.26.2
* libopenssl1_1-debuginfo-1.1.1w-150600.5.26.2
* SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1w-150600.5.26.2
* libopenssl1_1-32bit-1.1.1w-150600.5.26.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* openssl-1_1-debugsource-1.1.1w-150600.5.26.2
* libopenssl1_1-1.1.1w-150600.5.26.2
* openssl-1_1-1.1.1w-150600.5.26.2
* libopenssl-1_1-devel-1.1.1w-150600.5.26.2
* openssl-1_1-debuginfo-1.1.1w-150600.5.26.2
* libopenssl1_1-debuginfo-1.1.1w-150600.5.26.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1w-150600.5.26.2
* libopenssl1_1-32bit-1.1.1w-150600.5.26.2
## References:
* https://www.suse.com/security/cve/CVE-2026-28387.html
* https://www.suse.com/security/cve/CVE-2026-28388.html
* https://www.suse.com/security/cve/CVE-2026-28389.html
* https://www.suse.com/security/cve/CVE-2026-28390.html
* https://www.suse.com/security/cve/CVE-2026-31789.html
* https://bugzilla.suse.com/show_bug.cgi?id=1260441
* https://bugzilla.suse.com/show_bug.cgi?id=1260442
* https://bugzilla.suse.com/show_bug.cgi?id=1260443
* https://bugzilla.suse.com/show_bug.cgi?id=1260444
* https://bugzilla.suse.com/show_bug.cgi?id=1261678
SUSE-SU-2026:1576-1: important: Security update for gdk-pixbuf
# Security update for gdk-pixbuf
Announcement ID: SUSE-SU-2026:1576-1
Release Date: 2026-04-23T15:53:32Z
Rating: important
References:
* bsc#1261210
Cross-References:
* CVE-2026-5201
CVSS scores:
* CVE-2026-5201 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-5201 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-5201 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for gdk-pixbuf fixes the following issue:
* CVE-2026-5201: Denial of Service via heap-based buffer overflow when
processing a specially crafted JPEG image (bsc#1261210).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1576=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1576=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1576=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1576=1
## Package List:
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libgdk_pixbuf-2_0-0-2.42.12-150600.3.11.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150600.3.11.1
* gdk-pixbuf-debugsource-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-2.42.12-150600.3.11.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150600.3.11.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150600.3.11.1
* gdk-pixbuf-devel-2.42.12-150600.3.11.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150600.3.11.1
* gdk-pixbuf-thumbnailer-2.42.12-150600.3.11.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150600.3.11.1
* Basesystem Module 15-SP7 (noarch)
* gdk-pixbuf-lang-2.42.12-150600.3.11.1
* Basesystem Module 15-SP7 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150600.3.11.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150600.3.11.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libgdk_pixbuf-2_0-0-2.42.12-150600.3.11.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150600.3.11.1
* gdk-pixbuf-debugsource-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-2.42.12-150600.3.11.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150600.3.11.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150600.3.11.1
* gdk-pixbuf-devel-2.42.12-150600.3.11.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150600.3.11.1
* gdk-pixbuf-thumbnailer-2.42.12-150600.3.11.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150600.3.11.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* gdk-pixbuf-lang-2.42.12-150600.3.11.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150600.3.11.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150600.3.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libgdk_pixbuf-2_0-0-2.42.12-150600.3.11.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150600.3.11.1
* gdk-pixbuf-debugsource-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-2.42.12-150600.3.11.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150600.3.11.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150600.3.11.1
* gdk-pixbuf-devel-2.42.12-150600.3.11.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150600.3.11.1
* gdk-pixbuf-thumbnailer-2.42.12-150600.3.11.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150600.3.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* gdk-pixbuf-lang-2.42.12-150600.3.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150600.3.11.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150600.3.11.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libgdk_pixbuf-2_0-0-2.42.12-150600.3.11.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150600.3.11.1
* gdk-pixbuf-debugsource-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-2.42.12-150600.3.11.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150600.3.11.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150600.3.11.1
* gdk-pixbuf-devel-2.42.12-150600.3.11.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150600.3.11.1
* gdk-pixbuf-thumbnailer-2.42.12-150600.3.11.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150600.3.11.1
* openSUSE Leap 15.6 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150600.3.11.1
* gdk-pixbuf-devel-32bit-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150600.3.11.1
* gdk-pixbuf-devel-32bit-debuginfo-2.42.12-150600.3.11.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150600.3.11.1
* openSUSE Leap 15.6 (noarch)
* gdk-pixbuf-lang-2.42.12-150600.3.11.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libgdk_pixbuf-2_0-0-64bit-2.42.12-150600.3.11.1
* libgdk_pixbuf-2_0-0-64bit-debuginfo-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-64bit-2.42.12-150600.3.11.1
* gdk-pixbuf-devel-64bit-2.42.12-150600.3.11.1
* gdk-pixbuf-devel-64bit-debuginfo-2.42.12-150600.3.11.1
* gdk-pixbuf-query-loaders-64bit-debuginfo-2.42.12-150600.3.11.1
## References:
* https://www.suse.com/security/cve/CVE-2026-5201.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261210