SUSE 5580 Published by

Several security updates have been released for SUSE Linux, including one marked as "important" and the rest as "moderate". These updates affect various packages such as libsoup, Django, joserfc, libblkid-devel, freetype2-devel, roundcubemail, and python-joserfc. The security update for libsoup is considered the most critical of these fixes due to its designation as "important".

SUSE-SU-2026:0833-1: important: Security update for libsoup
openSUSE-SU-2026:10292-1: moderate: python311-Django-5.2.12-1.1 on GA media
openSUSE-SU-2026:10293-1: moderate: python311-joserfc-1.6.3-1.1 on GA media
openSUSE-SU-2026:10288-1: moderate: libblkid-devel-2.41.3-4.1 on GA media
openSUSE-SU-2026:10289-1: moderate: freetype2-devel-2.14.2-1.1 on GA media
openSUSE-SU-2026:20323-1: important: Security update for roundcubemail
openSUSE-SU-2026:20322-1: important: Security update for python-joserfc




SUSE-SU-2026:0833-1: important: Security update for libsoup


# Security update for libsoup

Announcement ID: SUSE-SU-2026:0833-1
Release Date: 2026-03-05T19:55:57Z
Rating: important
References:

* bsc#1257398
* bsc#1257441
* bsc#1257597

Cross-References:

* CVE-2026-1467
* CVE-2026-1539
* CVE-2026-1760

CVSS scores:

* CVE-2026-1467 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
* CVE-2026-1467 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-1467 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2026-1539 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N
* CVE-2026-1539 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
* CVE-2026-1539 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
* CVE-2026-1760 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2026-1760 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
* CVE-2026-1760 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves three vulnerabilities can now be installed.

## Description:

This update for libsoup fixes the following issues:

* CVE-2026-1467: lack of input sanitization can lead to unintended or
unauthorized HTTP requests (bsc#1257398).
* CVE-2026-1539: proxy authentication credentials leaked via the Proxy-
Authorization header when handling HTTP redirects (bsc#1257441).
* CVE-2026-1760: improper handling of HTTP requests combining certain headers
by SoupServer can lead to HTTP request smuggling and potential DoS
(bsc#1257597).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-833=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-833=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-833=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-833=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-833=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-833=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-833=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-833=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-833=1

## Package List:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.37.1
* libsoup-debugsource-3.0.4-150400.3.37.1
* libsoup-3_0-0-3.0.4-150400.3.37.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.37.1
* libsoup-devel-3.0.4-150400.3.37.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.37.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.37.1
* libsoup-debugsource-3.0.4-150400.3.37.1
* libsoup-3_0-0-3.0.4-150400.3.37.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.37.1
* libsoup-devel-3.0.4-150400.3.37.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* libsoup-lang-3.0.4-150400.3.37.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.37.1
* libsoup-debugsource-3.0.4-150400.3.37.1
* libsoup-3_0-0-3.0.4-150400.3.37.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.37.1
* libsoup-devel-3.0.4-150400.3.37.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* libsoup-lang-3.0.4-150400.3.37.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.37.1
* libsoup-debugsource-3.0.4-150400.3.37.1
* libsoup-3_0-0-3.0.4-150400.3.37.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.37.1
* libsoup-devel-3.0.4-150400.3.37.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.37.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.37.1
* libsoup-debugsource-3.0.4-150400.3.37.1
* libsoup-3_0-0-3.0.4-150400.3.37.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.37.1
* libsoup-devel-3.0.4-150400.3.37.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.37.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.37.1
* libsoup-debugsource-3.0.4-150400.3.37.1
* libsoup-3_0-0-3.0.4-150400.3.37.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.37.1
* libsoup-devel-3.0.4-150400.3.37.1
* openSUSE Leap 15.4 (x86_64)
* libsoup-3_0-0-32bit-debuginfo-3.0.4-150400.3.37.1
* libsoup-devel-32bit-3.0.4-150400.3.37.1
* libsoup-3_0-0-32bit-3.0.4-150400.3.37.1
* openSUSE Leap 15.4 (noarch)
* libsoup-lang-3.0.4-150400.3.37.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libsoup-3_0-0-64bit-debuginfo-3.0.4-150400.3.37.1
* libsoup-3_0-0-64bit-3.0.4-150400.3.37.1
* libsoup-devel-64bit-3.0.4-150400.3.37.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.37.1
* libsoup-debugsource-3.0.4-150400.3.37.1
* libsoup-3_0-0-3.0.4-150400.3.37.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.37.1
* libsoup-devel-3.0.4-150400.3.37.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.37.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.37.1
* libsoup-debugsource-3.0.4-150400.3.37.1
* libsoup-3_0-0-3.0.4-150400.3.37.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.37.1
* libsoup-devel-3.0.4-150400.3.37.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.37.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.37.1
* libsoup-debugsource-3.0.4-150400.3.37.1
* libsoup-3_0-0-3.0.4-150400.3.37.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.37.1
* libsoup-devel-3.0.4-150400.3.37.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.37.1

## References:

* https://www.suse.com/security/cve/CVE-2026-1467.html
* https://www.suse.com/security/cve/CVE-2026-1539.html
* https://www.suse.com/security/cve/CVE-2026-1760.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257398
* https://bugzilla.suse.com/show_bug.cgi?id=1257441
* https://bugzilla.suse.com/show_bug.cgi?id=1257597



openSUSE-SU-2026:10292-1: moderate: python311-Django-5.2.12-1.1 on GA media


# python311-Django-5.2.12-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10292-1
Rating: moderate

Cross-References:

* CVE-2026-25674

CVSS scores:

* CVE-2026-25674 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-25674 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python311-Django-5.2.12-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311-Django 5.2.12-1.1
* python313-Django 5.2.12-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25674.html



openSUSE-SU-2026:10293-1: moderate: python311-joserfc-1.6.3-1.1 on GA media


# python311-joserfc-1.6.3-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10293-1
Rating: moderate

Cross-References:

* CVE-2026-27932

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python311-joserfc-1.6.3-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311-joserfc 1.6.3-1.1
* python313-joserfc 1.6.3-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-27932.html



openSUSE-SU-2026:10288-1: moderate: libblkid-devel-2.41.3-4.1 on GA media


# libblkid-devel-2.41.3-4.1 on GA media

Announcement ID: openSUSE-SU-2026:10288-1
Rating: moderate

Cross-References:

* CVE-2026-3184

CVSS scores:

* CVE-2026-3184 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-3184 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the libblkid-devel-2.41.3-4.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libblkid-devel 2.41.3-4.1
* libblkid-devel-32bit 2.41.3-4.1
* libblkid-devel-static 2.41.3-4.1
* libblkid1 2.41.3-4.1
* libblkid1-32bit 2.41.3-4.1
* libfdisk-devel 2.41.3-4.1
* libfdisk-devel-32bit 2.41.3-4.1
* libfdisk-devel-static 2.41.3-4.1
* libfdisk1 2.41.3-4.1
* libfdisk1-32bit 2.41.3-4.1
* libmount-devel 2.41.3-4.1
* libmount-devel-32bit 2.41.3-4.1
* libmount-devel-static 2.41.3-4.1
* libmount1 2.41.3-4.1
* libmount1-32bit 2.41.3-4.1
* libsmartcols-devel 2.41.3-4.1
* libsmartcols-devel-32bit 2.41.3-4.1
* libsmartcols-devel-static 2.41.3-4.1
* libsmartcols1 2.41.3-4.1
* libsmartcols1-32bit 2.41.3-4.1
* libuuid-devel 2.41.3-4.1
* libuuid-devel-32bit 2.41.3-4.1
* libuuid-devel-static 2.41.3-4.1
* libuuid1 2.41.3-4.1
* libuuid1-32bit 2.41.3-4.1
* util-linux 2.41.3-4.1
* util-linux-lang 2.41.3-4.1

## References:

* https://www.suse.com/security/cve/CVE-2026-3184.html



openSUSE-SU-2026:10289-1: moderate: freetype2-devel-2.14.2-1.1 on GA media


# freetype2-devel-2.14.2-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10289-1
Rating: moderate

Cross-References:

* CVE-2026-23865

CVSS scores:

* CVE-2026-23865 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-23865 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the freetype2-devel-2.14.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* freetype2-devel 2.14.2-1.1
* freetype2-devel-32bit 2.14.2-1.1
* freetype2-profile-tti35 2.14.2-1.1
* ftdump 2.14.2-1.1
* libfreetype6 2.14.2-1.1
* libfreetype6-32bit 2.14.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-23865.html



openSUSE-SU-2026:20323-1: important: Security update for roundcubemail


openSUSE security update: security update for roundcubemail
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20323-1
Rating: important
References:

* bsc#1255306
* bsc#1255308
* bsc#1257909
* bsc#1258052

Cross-References:

* CVE-2025-68460
* CVE-2025-68461
* CVE-2026-25916
* CVE-2026-26079

CVSS scores:

* CVE-2026-26079 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
* CVE-2026-26079 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 4 vulnerabilities and has 4 bug fixes can now be installed.

Description:

This update for roundcubemail fixes the following issues:

Changes to roundcubemail:

Update to 1.6.13:

This is a security update to the stable version 1.6 of Roundcube Webmail.
It provides fixes to recently reported security vulnerabilities:
+ Fix CSS injection vulnerability reported by CERT Polska (boo#1258052,
CVE-2026-26079).
+ Fix remote image blocking bypass via SVG content reported by nullcathedral
(boo#1257909, CVE-2026-25916).

This version is considered stable and we recommend to update all productive
installations of Roundcube 1.6.x with it. Please do backup your data
before updating!

CHANGELOG
+ Managesieve: Fix handling of string-list format values for date
tests in Out of Office (#10075)
+ Fix CSS injection vulnerability reported by CERT Polska.
+ Fix remote image blocking bypass via SVG content reported by nullcathedral.

Update to 1.6.12:

This is a security update to the stable version 1.6 of Roundcube Webmail.
It provides fixes to recently reported security vulnerabilities:

+ Fix Cross-Site-Scripting vulnerability via SVG's animate tag
reported by Valentin T., CrowdStrike (boo#1255308, CVE-2025-68461).
+ Fix Information Disclosure vulnerability in the HTML style
sanitizer reported by somerandomdev (boo#1255306, CVE-2025-68460).

This version is considered stable and we recommend to update all
productive installations of Roundcube 1.6.x with it.

+ Support IPv6 in database DSN (#9937)
+ Don't force specific error_reporting setting
+ Fix compatibility with PHP 8.5 regarding array_first()
+ Remove X-XSS-Protection example from .htaccess file (#9875)
+ Fix "Assign to group" action state after creation of a first group (#9889)
+ Fix bug where contacts search would fail if contactlist_fields contained vcard fields (#9850)
+ Fix bug where an mbox export file could include inconsistent message delimiters (#9879)
+ Fix parsing of inline styles that aren't well-formatted (#9948)
+ Fix Cross-Site-Scripting vulnerability via SVG's animate tag
+ Fix Information Disclosure vulnerability in the HTML style sanitizer

Update to 1.6.11

This is a security update to the stable version 1.6 of Roundcube Webmail.
It provides fixes to recently reported security vulnerabilities:
* Fix Post-Auth RCE via PHP Object Deserialization reported by firs0v.

- CHANGELOG
* Managesieve: Fix match-type selector (remove unsupported options) in delete header action (#9610)
* Improve installer to fix confusion about disabling SMTP authentication (#9801)
* Fix PHP warning in index.php (#9813)
* OAuth: Fix/improve token refresh
* Fix dark mode bug where wrong colors were used for blockquotes in HTML mail preview (#9820)
* Fix HTML message preview if it contains floating tables (#9804)
* Fix removing/expiring redis/memcache records when using a key prefix
* Fix bug where a wrong SPECIAL-USE folder could have been detected, if there were more than one per-type (#9781)
* Fix a default value and documentation of password_ldap_encodage option (#9658)
* Remove mobile/floating Create button from the list in Settings > Folders (#9661)
* Fix Delete and Empty buttons state while creating a folder (#9047)
* Fix connecting to LDAP using ldapi:// URI (#8990)
* Fix cursor position on "below the quote" reply in HTML mode (#8700)
* Fix bug where attachments with content type of application/vnd.ms-tnef were not parsed (#7119)

Update to 1.6.10:

This is the next service release to update the stable version 1.6.
* IMAP: Partial support for ANNOTATE-EXPERIMENT-1 extension (RFC 5257)
* OAuth: Support standard authentication with short-living password received with OIDC token (#9530)
* Fix PHP warnings (#9616, #9611)
* Fix whitespace handling in vCard line continuation (#9637)
* Fix current script state after initial scripts creation in managesieve_kolab_master mode
* Fix rcube_imap::get_vendor() result (and PHP warning) on Zimbra server (#9650)
* Fix regression causing inline SVG images to be missing in mail preview (#9644)
* Fix plugin "virtuser_file" to handle backward slashes in username (#9668)
* Fix PHP fatal error when parsing some malformed BODYSTRUCTURE responses (#9689)
* Fix insert_or_update() and reading database server config on PostgreSQL (#9710)
* Fix Oauth issues with use_secure_urls=true (#9722)
* Fix handling of binary mail parts (e.g. PDF) encoded with quoted-printable (#9728)
* Fix links in comments and config to https:// where available (#9759, #9756)
* Fix decoding of attachment names encoded using both RFC2231 and RFC2047 standards (#9725)

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-packagehub-151=1

Package List:

- openSUSE Leap 16.0:

roundcubemail-1.6.13-bp160.1.1

References:

* https://www.suse.com/security/cve/CVE-2025-68460.html
* https://www.suse.com/security/cve/CVE-2025-68461.html
* https://www.suse.com/security/cve/CVE-2026-25916.html
* https://www.suse.com/security/cve/CVE-2026-26079.html



openSUSE-SU-2026:20322-1: important: Security update for python-joserfc


openSUSE security update: security update for python-joserfc
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20322-1
Rating: important
References:

* bsc#1259154

Cross-References:

* CVE-2026-27932

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for python-joserfc fixes the following issues:

Changes in python-joserfc:

- CVE-2026-27932: unbounded PBKDF2 iteration count can lead to a denial of service (bsc#1259154)

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-packagehub-150=1

Package List:

- openSUSE Leap 16.0:

python313-joserfc-1.1.0-bp160.2.1

References:

* https://www.suse.com/security/cve/CVE-2026-27932.html