SUSE-SU-2026:0570-1: moderate: Security update for libxml2
SUSE-SU-2026:0572-1: important: Security update for kubernetes
SUSE-SU-2026:0573-1: important: Security update for kubernetes-old
SUSE-SU-2026:0574-1: important: Security update for libsoup2
SUSE-SU-2026:0575-1: low: Security update for libpcap
SUSE-SU-2026:0576-1: moderate: Security update for abseil-cpp
openSUSE-SU-2026:20239-1: critical: Security update for golang-github-prometheus-prometheus
openSUSE-SU-2026:10217-1: moderate: traefik-3.6.8-1.1 on GA media
openSUSE-SU-2026:10214-1: moderate: mupdf-1.27.1-1.1 on GA media
openSUSE-SU-2026:10216-1: moderate: python311-asgiref-3.11.1-1.1 on GA media
openSUSE-SU-2026:10213-1: moderate: libxml2-16-2.14.5-4.1 on GA media
openSUSE-SU-2026:10211-1: moderate: azure-cli-core-2.83.0-2.1 on GA media
SUSE-SU-2026:0577-1: moderate: Security update for avahi
SUSE-SU-2026:0570-1: moderate: Security update for libxml2
# Security update for libxml2
Announcement ID: SUSE-SU-2026:0570-1
Release Date: 2026-02-17T16:38:53Z
Rating: moderate
References:
* bsc#1247850
* bsc#1247858
* bsc#1250553
* bsc#1256807
* bsc#1256808
* bsc#1256809
* bsc#1256811
* bsc#1256812
* bsc#1257593
* bsc#1257594
* bsc#1257595
Cross-References:
* CVE-2025-10911
* CVE-2025-8732
* CVE-2026-0990
* CVE-2026-0992
* CVE-2026-1757
CVSS scores:
* CVE-2025-10911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-10911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-10911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-8732 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-8732 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-8732 ( NVD ): 1.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-8732 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-0990 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0990 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0990 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0992 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0992 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-0992 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-1757 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-1757 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-1757 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Micro 5.5
An update that solves five vulnerabilities and has six security fixes can now be
installed.
## Description:
This update for libxml2 fixes the following issues:
* CVE-2026-0990: Fixed a call stack overflow leading to application crash due
to infinite recursion in `xmlCatalogXMLResolveURI`. (bsc#1256807,
bsc#1256811)
* CVE-2026-0992: Fixed an excessive resource consumption when processing XML
catalogs due to exponential behavior. (bsc#1256809, bsc#1256812)
* CVE-2026-1757: Fixed a memory leak in the `xmllint` interactive shell.
(bsc#1257594, bsc#1257595)
* CVE-2025-10911: Fixed a use-after-free with key data stored cross-RVT.
(bsc#1250553)
* CVE-2025-8732: Fixed an infinite recursion in catalog parsing functions when
processing malformed SGML catalog files. (bsc#1247858)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-570=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-570=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-570=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libxml2-tools-debuginfo-2.10.3-150500.5.38.1
* python3-libxml2-debuginfo-2.10.3-150500.5.38.1
* libxml2-2-debuginfo-2.10.3-150500.5.38.1
* python311-libxml2-debuginfo-2.10.3-150500.5.38.1
* python3-libxml2-2.10.3-150500.5.38.1
* libxml2-devel-2.10.3-150500.5.38.1
* libxml2-debugsource-2.10.3-150500.5.38.1
* python311-libxml2-2.10.3-150500.5.38.1
* libxml2-tools-2.10.3-150500.5.38.1
* libxml2-python-debugsource-2.10.3-150500.5.38.1
* libxml2-2-2.10.3-150500.5.38.1
* openSUSE Leap 15.5 (x86_64)
* libxml2-2-32bit-debuginfo-2.10.3-150500.5.38.1
* libxml2-devel-32bit-2.10.3-150500.5.38.1
* libxml2-2-32bit-2.10.3-150500.5.38.1
* openSUSE Leap 15.5 (noarch)
* libxml2-doc-2.10.3-150500.5.38.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libxml2-devel-64bit-2.10.3-150500.5.38.1
* libxml2-2-64bit-2.10.3-150500.5.38.1
* libxml2-2-64bit-debuginfo-2.10.3-150500.5.38.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libxml2-tools-debuginfo-2.10.3-150500.5.38.1
* python3-libxml2-debuginfo-2.10.3-150500.5.38.1
* libxml2-2-debuginfo-2.10.3-150500.5.38.1
* python311-libxml2-debuginfo-2.10.3-150500.5.38.1
* python3-libxml2-2.10.3-150500.5.38.1
* libxml2-devel-2.10.3-150500.5.38.1
* libxml2-debugsource-2.10.3-150500.5.38.1
* python311-libxml2-2.10.3-150500.5.38.1
* libxml2-tools-2.10.3-150500.5.38.1
* libxml2-python-debugsource-2.10.3-150500.5.38.1
* libxml2-2-2.10.3-150500.5.38.1
* openSUSE Leap 15.6 (x86_64)
* libxml2-2-32bit-debuginfo-2.10.3-150500.5.38.1
* libxml2-devel-32bit-2.10.3-150500.5.38.1
* libxml2-2-32bit-2.10.3-150500.5.38.1
* openSUSE Leap 15.6 (noarch)
* libxml2-doc-2.10.3-150500.5.38.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libxml2-tools-debuginfo-2.10.3-150500.5.38.1
* python3-libxml2-debuginfo-2.10.3-150500.5.38.1
* libxml2-2-debuginfo-2.10.3-150500.5.38.1
* python3-libxml2-2.10.3-150500.5.38.1
* libxml2-debugsource-2.10.3-150500.5.38.1
* libxml2-tools-2.10.3-150500.5.38.1
* libxml2-python-debugsource-2.10.3-150500.5.38.1
* libxml2-2-2.10.3-150500.5.38.1
## References:
* https://www.suse.com/security/cve/CVE-2025-10911.html
* https://www.suse.com/security/cve/CVE-2025-8732.html
* https://www.suse.com/security/cve/CVE-2026-0990.html
* https://www.suse.com/security/cve/CVE-2026-0992.html
* https://www.suse.com/security/cve/CVE-2026-1757.html
* https://bugzilla.suse.com/show_bug.cgi?id=1247850
* https://bugzilla.suse.com/show_bug.cgi?id=1247858
* https://bugzilla.suse.com/show_bug.cgi?id=1250553
* https://bugzilla.suse.com/show_bug.cgi?id=1256807
* https://bugzilla.suse.com/show_bug.cgi?id=1256808
* https://bugzilla.suse.com/show_bug.cgi?id=1256809
* https://bugzilla.suse.com/show_bug.cgi?id=1256811
* https://bugzilla.suse.com/show_bug.cgi?id=1256812
* https://bugzilla.suse.com/show_bug.cgi?id=1257593
* https://bugzilla.suse.com/show_bug.cgi?id=1257594
* https://bugzilla.suse.com/show_bug.cgi?id=1257595
SUSE-SU-2026:0572-1: important: Security update for kubernetes
# Security update for kubernetes
Announcement ID: SUSE-SU-2026:0572-1
Release Date: 2026-02-17T18:47:14Z
Rating: important
References:
Affected Products:
* Containers Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that can now be installed.
## Description:
This update for kubernetes rebuilds it against the current GO security release.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-572=1 SUSE-2026-572=1
* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-572=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.35-client-1.35.0-150600.13.25.1
* kubernetes1.35-client-common-1.35.0-150600.13.25.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.35-client-bash-completion-1.35.0-150600.13.25.1
* kubernetes1.35-client-fish-completion-1.35.0-150600.13.25.1
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* kubernetes1.35-client-1.35.0-150600.13.25.1
* kubernetes1.35-client-common-1.35.0-150600.13.25.1
* Containers Module 15-SP7 (noarch)
* kubernetes1.35-client-bash-completion-1.35.0-150600.13.25.1
SUSE-SU-2026:0573-1: important: Security update for kubernetes-old
# Security update for kubernetes-old
Announcement ID: SUSE-SU-2026:0573-1
Release Date: 2026-02-17T18:47:31Z
Rating: important
References:
Affected Products:
* Containers Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that can now be installed.
## Description:
This update for kubernetes-old rebuilds it against the current GO security
release.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-573=1 openSUSE-SLE-15.6-2026-573=1
* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-573=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.33-client-1.33.7-150600.13.25.1
* kubernetes1.33-client-common-1.33.7-150600.13.25.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.33-client-fish-completion-1.33.7-150600.13.25.1
* kubernetes1.33-client-bash-completion-1.33.7-150600.13.25.1
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* kubernetes1.33-client-1.33.7-150600.13.25.1
* kubernetes1.33-client-common-1.33.7-150600.13.25.1
* Containers Module 15-SP7 (noarch)
* kubernetes1.33-client-bash-completion-1.33.7-150600.13.25.1
SUSE-SU-2026:0574-1: important: Security update for libsoup2
# Security update for libsoup2
Announcement ID: SUSE-SU-2026:0574-1
Release Date: 2026-02-18T08:03:13Z
Rating: important
References:
* bsc#1243422
* bsc#1256418
* bsc#1257598
Cross-References:
* CVE-2025-4476
* CVE-2026-0716
* CVE-2026-1761
CVSS scores:
* CVE-2025-4476 ( SUSE ): 2.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-4476 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-4476 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-0716 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0716 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L
* CVE-2026-0716 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-1761 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-1761 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-1761 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves three vulnerabilities can now be installed.
## Description:
This update for libsoup2 fixes the following issues:
* CVE-2026-1761: incorrect length calculation when parsing of multipart HTTP
responses can lead to a stack-based buffer overflow (bsc#1257598).
* CVE-2026-0716: improper bounds handling may allow out-of-bounds read
(bsc#1256418).
* CVE-2025-4476: null pointer dereference may lead to denial of service
(bsc#1243422).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-574=1 openSUSE-SLE-15.6-2026-574=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-574=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-574=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-574=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libsoup2-debugsource-2.74.3-150600.4.24.1
* libsoup2-devel-2.74.3-150600.4.24.1
* libsoup-2_4-1-2.74.3-150600.4.24.1
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.24.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.24.1
* openSUSE Leap 15.6 (x86_64)
* libsoup-2_4-1-32bit-2.74.3-150600.4.24.1
* libsoup-2_4-1-32bit-debuginfo-2.74.3-150600.4.24.1
* libsoup2-devel-32bit-2.74.3-150600.4.24.1
* openSUSE Leap 15.6 (noarch)
* libsoup2-lang-2.74.3-150600.4.24.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libsoup2-devel-64bit-2.74.3-150600.4.24.1
* libsoup-2_4-1-64bit-debuginfo-2.74.3-150600.4.24.1
* libsoup-2_4-1-64bit-2.74.3-150600.4.24.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libsoup2-debugsource-2.74.3-150600.4.24.1
* libsoup2-devel-2.74.3-150600.4.24.1
* libsoup-2_4-1-2.74.3-150600.4.24.1
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.24.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.24.1
* Basesystem Module 15-SP7 (noarch)
* libsoup2-lang-2.74.3-150600.4.24.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libsoup2-debugsource-2.74.3-150600.4.24.1
* libsoup2-devel-2.74.3-150600.4.24.1
* libsoup-2_4-1-2.74.3-150600.4.24.1
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.24.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.24.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* libsoup2-lang-2.74.3-150600.4.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libsoup2-debugsource-2.74.3-150600.4.24.1
* libsoup2-devel-2.74.3-150600.4.24.1
* libsoup-2_4-1-2.74.3-150600.4.24.1
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.24.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* libsoup2-lang-2.74.3-150600.4.24.1
## References:
* https://www.suse.com/security/cve/CVE-2025-4476.html
* https://www.suse.com/security/cve/CVE-2026-0716.html
* https://www.suse.com/security/cve/CVE-2026-1761.html
* https://bugzilla.suse.com/show_bug.cgi?id=1243422
* https://bugzilla.suse.com/show_bug.cgi?id=1256418
* https://bugzilla.suse.com/show_bug.cgi?id=1257598
SUSE-SU-2026:0575-1: low: Security update for libpcap
# Security update for libpcap
Announcement ID: SUSE-SU-2026:0575-1
Release Date: 2026-02-18T09:10:48Z
Rating: low
References:
* bsc#1255765
Cross-References:
* CVE-2025-11961
CVSS scores:
* CVE-2025-11961 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-11961 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-11961 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
An update that solves one vulnerability can now be installed.
## Description:
This update for libpcap fixes the following issues:
* CVE-2025-11961: missing validation of provided MAC-48 address string in
`pcap_ether_aton()` can lead to out-of-bounds read and write (bsc#1255765).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-575=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-575=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-575=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-575=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-575=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-575=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libpcap1-debuginfo-1.10.1-150400.3.9.1
* libpcap1-1.10.1-150400.3.9.1
* libpcap-devel-static-1.10.1-150400.3.9.1
* libpcap-devel-1.10.1-150400.3.9.1
* libpcap-debugsource-1.10.1-150400.3.9.1
* openSUSE Leap 15.4 (x86_64)
* libpcap-devel-32bit-1.10.1-150400.3.9.1
* libpcap1-32bit-debuginfo-1.10.1-150400.3.9.1
* libpcap1-32bit-1.10.1-150400.3.9.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libpcap-devel-64bit-1.10.1-150400.3.9.1
* libpcap1-64bit-debuginfo-1.10.1-150400.3.9.1
* libpcap1-64bit-1.10.1-150400.3.9.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libpcap1-debuginfo-1.10.1-150400.3.9.1
* libpcap1-1.10.1-150400.3.9.1
* libpcap-debugsource-1.10.1-150400.3.9.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libpcap1-debuginfo-1.10.1-150400.3.9.1
* libpcap1-1.10.1-150400.3.9.1
* libpcap-debugsource-1.10.1-150400.3.9.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libpcap1-debuginfo-1.10.1-150400.3.9.1
* libpcap1-1.10.1-150400.3.9.1
* libpcap-debugsource-1.10.1-150400.3.9.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libpcap1-debuginfo-1.10.1-150400.3.9.1
* libpcap1-1.10.1-150400.3.9.1
* libpcap-debugsource-1.10.1-150400.3.9.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libpcap1-debuginfo-1.10.1-150400.3.9.1
* libpcap1-1.10.1-150400.3.9.1
* libpcap-debugsource-1.10.1-150400.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2025-11961.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255765
SUSE-SU-2026:0576-1: moderate: Security update for abseil-cpp
# Security update for abseil-cpp
Announcement ID: SUSE-SU-2026:0576-1
Release Date: 2026-02-18T09:12:52Z
Rating: moderate
References:
* bsc#1237543
Cross-References:
* CVE-2025-0838
CVSS scores:
* CVE-2025-0838 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:A/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L
* CVE-2025-0838 ( SUSE ): 5.6 CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L
* CVE-2025-0838 ( NVD ): 5.9
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:A/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-0838 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro for Rancher 5.3
An update that solves one vulnerability can now be installed.
## Description:
This update for abseil-cpp fixes the following issues:
Update to version 20230802.3
* CVE-2025-0838: Fixed potential integer overflow in hash container
create/resize (bsc#1237543).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-576=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-576=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-576=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* abseil-cpp-debugsource-20230802.3-150400.10.7.1
* abseil-cpp-devel-20230802.3-150400.10.7.1
* libabsl2308_0_0-20230802.3-150400.10.7.1
* libabsl2308_0_0-debuginfo-20230802.3-150400.10.7.1
* openSUSE Leap 15.4 (x86_64)
* libabsl2308_0_0-32bit-20230802.3-150400.10.7.1
* libabsl2308_0_0-32bit-debuginfo-20230802.3-150400.10.7.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libabsl2308_0_0-64bit-debuginfo-20230802.3-150400.10.7.1
* libabsl2308_0_0-64bit-20230802.3-150400.10.7.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* abseil-cpp-debugsource-20230802.3-150400.10.7.1
* libabsl2308_0_0-20230802.3-150400.10.7.1
* libabsl2308_0_0-debuginfo-20230802.3-150400.10.7.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* abseil-cpp-debugsource-20230802.3-150400.10.7.1
* libabsl2308_0_0-20230802.3-150400.10.7.1
* libabsl2308_0_0-debuginfo-20230802.3-150400.10.7.1
## References:
* https://www.suse.com/security/cve/CVE-2025-0838.html
* https://bugzilla.suse.com/show_bug.cgi?id=1237543
openSUSE-SU-2026:20239-1: critical: Security update for golang-github-prometheus-prometheus
openSUSE security update: security update for golang-github-prometheus-prometheus
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20239-1
Rating: critical
References:
* bsc#1257442
* bsc#1257841
* bsc#1257897
Cross-References:
* CVE-2025-61140
* CVE-2026-1615
* CVE-2026-25547
CVSS scores:
* CVE-2025-61140 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-61140 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-1615 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-1615 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-25547 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25547 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 3 vulnerabilities and has 3 bug fixes can now be installed.
Description:
This update for golang-github-prometheus-prometheus fixes the following issues:
- CVE-2026-25547: Fixed an unbounded brace range expansion leading to excessive CPU and memory consumption. (bsc#1257841)
- CVE-2026-1615: Fixed arbitrary code injection due to unsafe evaluation of user-supplied JSON Path expressions in jsonpath. (bsc#1257897)
- CVE-2025-61140: Fixed a function vulnerable to prototype pollution in jsonpath. (bsc#1257442)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-290=1
Package List:
- openSUSE Leap 16.0:
golang-github-prometheus-prometheus-3.5.0-160000.2.1
References:
* https://www.suse.com/security/cve/CVE-2025-61140.html
* https://www.suse.com/security/cve/CVE-2026-1615.html
* https://www.suse.com/security/cve/CVE-2026-25547.html
openSUSE-SU-2026:10217-1: moderate: traefik-3.6.8-1.1 on GA media
# traefik-3.6.8-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10217-1
Rating: moderate
Cross-References:
* CVE-2026-25949
CVSS scores:
* CVE-2026-25949 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25949 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the traefik-3.6.8-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* traefik 3.6.8-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-25949.html
openSUSE-SU-2026:10214-1: moderate: mupdf-1.27.1-1.1 on GA media
# mupdf-1.27.1-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10214-1
Rating: moderate
Cross-References:
* CVE-2025-55780
* CVE-2026-25556
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the mupdf-1.27.1-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* mupdf 1.27.1-1.1
* mupdf-devel-static 1.27.1-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-55780.html
* https://www.suse.com/security/cve/CVE-2026-25556.html
openSUSE-SU-2026:10216-1: moderate: python311-asgiref-3.11.1-1.1 on GA media
# python311-asgiref-3.11.1-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10216-1
Rating: moderate
Cross-References:
* CVE-2025-14550
CVSS scores:
* CVE-2025-14550 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the python311-asgiref-3.11.1-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python311-asgiref 3.11.1-1.1
* python312-asgiref 3.11.1-1.1
* python313-asgiref 3.11.1-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-14550.html
openSUSE-SU-2026:10213-1: moderate: libxml2-16-2.14.5-4.1 on GA media
# libxml2-16-2.14.5-4.1 on GA media
Announcement ID: openSUSE-SU-2026:10213-1
Rating: moderate
Cross-References:
* CVE-2025-8732
* CVE-2026-0990
* CVE-2026-0992
CVSS scores:
* CVE-2025-8732 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-8732 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0990 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0990 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0992 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-0992 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 3 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the libxml2-16-2.14.5-4.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libxml2-16 2.14.5-4.1
* libxml2-16-32bit 2.14.5-4.1
* libxml2-devel 2.14.5-4.1
* libxml2-devel-32bit 2.14.5-4.1
* libxml2-doc 2.14.5-4.1
* libxml2-tools 2.14.5-4.1
## References:
* https://www.suse.com/security/cve/CVE-2025-8732.html
* https://www.suse.com/security/cve/CVE-2026-0990.html
* https://www.suse.com/security/cve/CVE-2026-0992.html
openSUSE-SU-2026:10211-1: moderate: azure-cli-core-2.83.0-2.1 on GA media
# azure-cli-core-2.83.0-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10211-1
Rating: moderate
Cross-References:
* CVE-2025-24049
CVSS scores:
* CVE-2025-24049 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-24049 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the azure-cli-core-2.83.0-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* azure-cli-core 2.83.0-2.1
## References:
* https://www.suse.com/security/cve/CVE-2025-24049.html
SUSE-SU-2026:0577-1: moderate: Security update for avahi
# Security update for avahi
Announcement ID: SUSE-SU-2026:0577-1
Release Date: 2026-02-18T15:49:25Z
Rating: moderate
References:
* bsc#1256498
* bsc#1256499
* bsc#1256500
Cross-References:
* CVE-2025-68276
* CVE-2025-68468
* CVE-2025-68471
CVSS scores:
* CVE-2025-68276 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68276 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68468 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68468 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-68468 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-68471 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68471 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-68471 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
An update that solves three vulnerabilities can now be installed.
## Description:
This update for avahi fixes the following issues:
* CVE-2025-68276: Fixed refuse to create wide-area record browsers when wide-
area is off (bsc#1256498)
* CVE-2025-68471: Fixed DoS bug by changing assert to return (bsc#1256500)
* CVE-2025-68468: Fixed DoS bug by removing incorrect assertion (bsc#1256499)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-577=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-577=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-577=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-577=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-577=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-577=1
## Package List:
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libavahi-common3-debuginfo-0.8-150400.7.26.1
* libavahi-core7-0.8-150400.7.26.1
* libavahi-core7-debuginfo-0.8-150400.7.26.1
* libavahi-client3-debuginfo-0.8-150400.7.26.1
* avahi-debugsource-0.8-150400.7.26.1
* libavahi-common3-0.8-150400.7.26.1
* libavahi-client3-0.8-150400.7.26.1
* avahi-0.8-150400.7.26.1
* avahi-debuginfo-0.8-150400.7.26.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libavahi-common3-debuginfo-0.8-150400.7.26.1
* libavahi-core7-0.8-150400.7.26.1
* libavahi-core7-debuginfo-0.8-150400.7.26.1
* libavahi-client3-debuginfo-0.8-150400.7.26.1
* avahi-debugsource-0.8-150400.7.26.1
* libavahi-common3-0.8-150400.7.26.1
* libavahi-client3-0.8-150400.7.26.1
* avahi-0.8-150400.7.26.1
* avahi-debuginfo-0.8-150400.7.26.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libavahi-common3-debuginfo-0.8-150400.7.26.1
* libavahi-core7-0.8-150400.7.26.1
* libavahi-core7-debuginfo-0.8-150400.7.26.1
* libavahi-client3-debuginfo-0.8-150400.7.26.1
* avahi-debugsource-0.8-150400.7.26.1
* libavahi-common3-0.8-150400.7.26.1
* libavahi-client3-0.8-150400.7.26.1
* avahi-0.8-150400.7.26.1
* avahi-debuginfo-0.8-150400.7.26.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libhowl0-0.8-150400.7.26.1
* libavahi-core7-0.8-150400.7.26.1
* libavahi-core7-debuginfo-0.8-150400.7.26.1
* libavahi-gobject0-0.8-150400.7.26.1
* python3-avahi-gtk-0.8-150400.7.26.1
* libdns_sd-debuginfo-0.8-150400.7.26.1
* libavahi-qt5-devel-0.8-150400.7.26.1
* libavahi-libevent1-debuginfo-0.8-150400.7.26.1
* libavahi-ui-gtk3-0-0.8-150400.7.26.1
* avahi-compat-howl-devel-0.8-150400.7.26.1
* libavahi-client3-0.8-150400.7.26.1
* avahi-autoipd-0.8-150400.7.26.1
* libavahi-common3-debuginfo-0.8-150400.7.26.1
* python3-avahi-0.8-150400.7.26.1
* libavahi-qt5-1-0.8-150400.7.26.1
* avahi-debugsource-0.8-150400.7.26.1
* libdns_sd-0.8-150400.7.26.1
* libavahi-gobject0-debuginfo-0.8-150400.7.26.1
* avahi-autoipd-debuginfo-0.8-150400.7.26.1
* libhowl0-debuginfo-0.8-150400.7.26.1
* avahi-0.8-150400.7.26.1
* avahi-debuginfo-0.8-150400.7.26.1
* typelib-1_0-Avahi-0_6-0.8-150400.7.26.1
* libavahi-devel-0.8-150400.7.26.1
* libavahi-qt5-1-debuginfo-0.8-150400.7.26.1
* avahi-glib2-debugsource-0.8-150400.7.26.1
* libavahi-glib1-debuginfo-0.8-150400.7.26.1
* avahi-utils-gtk-0.8-150400.7.26.1
* avahi-utils-debuginfo-0.8-150400.7.26.1
* avahi-qt5-debugsource-0.8-150400.7.26.1
* avahi-utils-0.8-150400.7.26.1
* libavahi-glib-devel-0.8-150400.7.26.1
* libavahi-ui-gtk3-0-debuginfo-0.8-150400.7.26.1
* avahi-compat-mDNSResponder-devel-0.8-150400.7.26.1
* libavahi-client3-debuginfo-0.8-150400.7.26.1
* avahi-utils-gtk-debuginfo-0.8-150400.7.26.1
* libavahi-gobject-devel-0.8-150400.7.26.1
* libavahi-common3-0.8-150400.7.26.1
* libavahi-libevent1-0.8-150400.7.26.1
* libavahi-glib1-0.8-150400.7.26.1
* openSUSE Leap 15.4 (x86_64)
* libavahi-glib1-32bit-debuginfo-0.8-150400.7.26.1
* libdns_sd-32bit-debuginfo-0.8-150400.7.26.1
* libavahi-glib1-32bit-0.8-150400.7.26.1
* libdns_sd-32bit-0.8-150400.7.26.1
* libavahi-common3-32bit-0.8-150400.7.26.1
* libavahi-common3-32bit-debuginfo-0.8-150400.7.26.1
* avahi-32bit-debuginfo-0.8-150400.7.26.1
* libavahi-client3-32bit-0.8-150400.7.26.1
* libavahi-client3-32bit-debuginfo-0.8-150400.7.26.1
* openSUSE Leap 15.4 (noarch)
* avahi-lang-0.8-150400.7.26.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libavahi-client3-64bit-debuginfo-0.8-150400.7.26.1
* libavahi-client3-64bit-0.8-150400.7.26.1
* avahi-64bit-debuginfo-0.8-150400.7.26.1
* libdns_sd-64bit-0.8-150400.7.26.1
* libavahi-glib1-64bit-debuginfo-0.8-150400.7.26.1
* libavahi-common3-64bit-0.8-150400.7.26.1
* libavahi-common3-64bit-debuginfo-0.8-150400.7.26.1
* libavahi-glib1-64bit-0.8-150400.7.26.1
* libdns_sd-64bit-debuginfo-0.8-150400.7.26.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libavahi-common3-debuginfo-0.8-150400.7.26.1
* libavahi-core7-0.8-150400.7.26.1
* libavahi-core7-debuginfo-0.8-150400.7.26.1
* libavahi-client3-debuginfo-0.8-150400.7.26.1
* avahi-debugsource-0.8-150400.7.26.1
* libavahi-common3-0.8-150400.7.26.1
* libavahi-client3-0.8-150400.7.26.1
* avahi-0.8-150400.7.26.1
* avahi-debuginfo-0.8-150400.7.26.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libavahi-common3-debuginfo-0.8-150400.7.26.1
* libavahi-core7-0.8-150400.7.26.1
* libavahi-core7-debuginfo-0.8-150400.7.26.1
* libavahi-client3-debuginfo-0.8-150400.7.26.1
* avahi-debugsource-0.8-150400.7.26.1
* libavahi-common3-0.8-150400.7.26.1
* libavahi-client3-0.8-150400.7.26.1
* avahi-0.8-150400.7.26.1
* avahi-debuginfo-0.8-150400.7.26.1
## References:
* https://www.suse.com/security/cve/CVE-2025-68276.html
* https://www.suse.com/security/cve/CVE-2025-68468.html
* https://www.suse.com/security/cve/CVE-2025-68471.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256498
* https://bugzilla.suse.com/show_bug.cgi?id=1256499
* https://bugzilla.suse.com/show_bug.cgi?id=1256500