SUSE 5565 Published by

Several security updates have been released for SUSE Linux, addressing various vulnerabilities in different packages. Among these are updates for kubernetes and its older version, which were classified as important, indicating their severity. Additionally, moderate-risk updates have been issued for libxml2, abseil-cpp, traefik, mupdf, python311-asgiref, and azure-cli-core. Security updates were also released for avahi and golang-github-prometheus-prometheus on openSUSE platforms, with the latter being critical.

SUSE-SU-2026:0570-1: moderate: Security update for libxml2
SUSE-SU-2026:0572-1: important: Security update for kubernetes
SUSE-SU-2026:0573-1: important: Security update for kubernetes-old
SUSE-SU-2026:0574-1: important: Security update for libsoup2
SUSE-SU-2026:0575-1: low: Security update for libpcap
SUSE-SU-2026:0576-1: moderate: Security update for abseil-cpp
openSUSE-SU-2026:20239-1: critical: Security update for golang-github-prometheus-prometheus
openSUSE-SU-2026:10217-1: moderate: traefik-3.6.8-1.1 on GA media
openSUSE-SU-2026:10214-1: moderate: mupdf-1.27.1-1.1 on GA media
openSUSE-SU-2026:10216-1: moderate: python311-asgiref-3.11.1-1.1 on GA media
openSUSE-SU-2026:10213-1: moderate: libxml2-16-2.14.5-4.1 on GA media
openSUSE-SU-2026:10211-1: moderate: azure-cli-core-2.83.0-2.1 on GA media
SUSE-SU-2026:0577-1: moderate: Security update for avahi




SUSE-SU-2026:0570-1: moderate: Security update for libxml2


# Security update for libxml2

Announcement ID: SUSE-SU-2026:0570-1
Release Date: 2026-02-17T16:38:53Z
Rating: moderate
References:

* bsc#1247850
* bsc#1247858
* bsc#1250553
* bsc#1256807
* bsc#1256808
* bsc#1256809
* bsc#1256811
* bsc#1256812
* bsc#1257593
* bsc#1257594
* bsc#1257595

Cross-References:

* CVE-2025-10911
* CVE-2025-8732
* CVE-2026-0990
* CVE-2026-0992
* CVE-2026-1757

CVSS scores:

* CVE-2025-10911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-10911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-10911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-8732 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-8732 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-8732 ( NVD ): 1.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-8732 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-0990 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0990 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0990 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0992 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0992 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-0992 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-1757 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-1757 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-1757 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Micro 5.5

An update that solves five vulnerabilities and has six security fixes can now be
installed.

## Description:

This update for libxml2 fixes the following issues:

* CVE-2026-0990: Fixed a call stack overflow leading to application crash due
to infinite recursion in `xmlCatalogXMLResolveURI`. (bsc#1256807,
bsc#1256811)
* CVE-2026-0992: Fixed an excessive resource consumption when processing XML
catalogs due to exponential behavior. (bsc#1256809, bsc#1256812)
* CVE-2026-1757: Fixed a memory leak in the `xmllint` interactive shell.
(bsc#1257594, bsc#1257595)
* CVE-2025-10911: Fixed a use-after-free with key data stored cross-RVT.
(bsc#1250553)
* CVE-2025-8732: Fixed an infinite recursion in catalog parsing functions when
processing malformed SGML catalog files. (bsc#1247858)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-570=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-570=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-570=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libxml2-tools-debuginfo-2.10.3-150500.5.38.1
* python3-libxml2-debuginfo-2.10.3-150500.5.38.1
* libxml2-2-debuginfo-2.10.3-150500.5.38.1
* python311-libxml2-debuginfo-2.10.3-150500.5.38.1
* python3-libxml2-2.10.3-150500.5.38.1
* libxml2-devel-2.10.3-150500.5.38.1
* libxml2-debugsource-2.10.3-150500.5.38.1
* python311-libxml2-2.10.3-150500.5.38.1
* libxml2-tools-2.10.3-150500.5.38.1
* libxml2-python-debugsource-2.10.3-150500.5.38.1
* libxml2-2-2.10.3-150500.5.38.1
* openSUSE Leap 15.5 (x86_64)
* libxml2-2-32bit-debuginfo-2.10.3-150500.5.38.1
* libxml2-devel-32bit-2.10.3-150500.5.38.1
* libxml2-2-32bit-2.10.3-150500.5.38.1
* openSUSE Leap 15.5 (noarch)
* libxml2-doc-2.10.3-150500.5.38.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libxml2-devel-64bit-2.10.3-150500.5.38.1
* libxml2-2-64bit-2.10.3-150500.5.38.1
* libxml2-2-64bit-debuginfo-2.10.3-150500.5.38.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libxml2-tools-debuginfo-2.10.3-150500.5.38.1
* python3-libxml2-debuginfo-2.10.3-150500.5.38.1
* libxml2-2-debuginfo-2.10.3-150500.5.38.1
* python311-libxml2-debuginfo-2.10.3-150500.5.38.1
* python3-libxml2-2.10.3-150500.5.38.1
* libxml2-devel-2.10.3-150500.5.38.1
* libxml2-debugsource-2.10.3-150500.5.38.1
* python311-libxml2-2.10.3-150500.5.38.1
* libxml2-tools-2.10.3-150500.5.38.1
* libxml2-python-debugsource-2.10.3-150500.5.38.1
* libxml2-2-2.10.3-150500.5.38.1
* openSUSE Leap 15.6 (x86_64)
* libxml2-2-32bit-debuginfo-2.10.3-150500.5.38.1
* libxml2-devel-32bit-2.10.3-150500.5.38.1
* libxml2-2-32bit-2.10.3-150500.5.38.1
* openSUSE Leap 15.6 (noarch)
* libxml2-doc-2.10.3-150500.5.38.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libxml2-tools-debuginfo-2.10.3-150500.5.38.1
* python3-libxml2-debuginfo-2.10.3-150500.5.38.1
* libxml2-2-debuginfo-2.10.3-150500.5.38.1
* python3-libxml2-2.10.3-150500.5.38.1
* libxml2-debugsource-2.10.3-150500.5.38.1
* libxml2-tools-2.10.3-150500.5.38.1
* libxml2-python-debugsource-2.10.3-150500.5.38.1
* libxml2-2-2.10.3-150500.5.38.1

## References:

* https://www.suse.com/security/cve/CVE-2025-10911.html
* https://www.suse.com/security/cve/CVE-2025-8732.html
* https://www.suse.com/security/cve/CVE-2026-0990.html
* https://www.suse.com/security/cve/CVE-2026-0992.html
* https://www.suse.com/security/cve/CVE-2026-1757.html
* https://bugzilla.suse.com/show_bug.cgi?id=1247850
* https://bugzilla.suse.com/show_bug.cgi?id=1247858
* https://bugzilla.suse.com/show_bug.cgi?id=1250553
* https://bugzilla.suse.com/show_bug.cgi?id=1256807
* https://bugzilla.suse.com/show_bug.cgi?id=1256808
* https://bugzilla.suse.com/show_bug.cgi?id=1256809
* https://bugzilla.suse.com/show_bug.cgi?id=1256811
* https://bugzilla.suse.com/show_bug.cgi?id=1256812
* https://bugzilla.suse.com/show_bug.cgi?id=1257593
* https://bugzilla.suse.com/show_bug.cgi?id=1257594
* https://bugzilla.suse.com/show_bug.cgi?id=1257595



SUSE-SU-2026:0572-1: important: Security update for kubernetes


# Security update for kubernetes

Announcement ID: SUSE-SU-2026:0572-1
Release Date: 2026-02-17T18:47:14Z
Rating: important
References:

Affected Products:

* Containers Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that can now be installed.

## Description:

This update for kubernetes rebuilds it against the current GO security release.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-572=1 SUSE-2026-572=1

* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-572=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.35-client-1.35.0-150600.13.25.1
* kubernetes1.35-client-common-1.35.0-150600.13.25.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.35-client-bash-completion-1.35.0-150600.13.25.1
* kubernetes1.35-client-fish-completion-1.35.0-150600.13.25.1
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* kubernetes1.35-client-1.35.0-150600.13.25.1
* kubernetes1.35-client-common-1.35.0-150600.13.25.1
* Containers Module 15-SP7 (noarch)
* kubernetes1.35-client-bash-completion-1.35.0-150600.13.25.1



SUSE-SU-2026:0573-1: important: Security update for kubernetes-old


# Security update for kubernetes-old

Announcement ID: SUSE-SU-2026:0573-1
Release Date: 2026-02-17T18:47:31Z
Rating: important
References:

Affected Products:

* Containers Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that can now be installed.

## Description:

This update for kubernetes-old rebuilds it against the current GO security
release.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-573=1 openSUSE-SLE-15.6-2026-573=1

* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-573=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.33-client-1.33.7-150600.13.25.1
* kubernetes1.33-client-common-1.33.7-150600.13.25.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.33-client-fish-completion-1.33.7-150600.13.25.1
* kubernetes1.33-client-bash-completion-1.33.7-150600.13.25.1
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* kubernetes1.33-client-1.33.7-150600.13.25.1
* kubernetes1.33-client-common-1.33.7-150600.13.25.1
* Containers Module 15-SP7 (noarch)
* kubernetes1.33-client-bash-completion-1.33.7-150600.13.25.1



SUSE-SU-2026:0574-1: important: Security update for libsoup2


# Security update for libsoup2

Announcement ID: SUSE-SU-2026:0574-1
Release Date: 2026-02-18T08:03:13Z
Rating: important
References:

* bsc#1243422
* bsc#1256418
* bsc#1257598

Cross-References:

* CVE-2025-4476
* CVE-2026-0716
* CVE-2026-1761

CVSS scores:

* CVE-2025-4476 ( SUSE ): 2.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-4476 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-4476 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-0716 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0716 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L
* CVE-2026-0716 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-1761 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-1761 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-1761 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves three vulnerabilities can now be installed.

## Description:

This update for libsoup2 fixes the following issues:

* CVE-2026-1761: incorrect length calculation when parsing of multipart HTTP
responses can lead to a stack-based buffer overflow (bsc#1257598).
* CVE-2026-0716: improper bounds handling may allow out-of-bounds read
(bsc#1256418).
* CVE-2025-4476: null pointer dereference may lead to denial of service
(bsc#1243422).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-574=1 openSUSE-SLE-15.6-2026-574=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-574=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-574=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-574=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libsoup2-debugsource-2.74.3-150600.4.24.1
* libsoup2-devel-2.74.3-150600.4.24.1
* libsoup-2_4-1-2.74.3-150600.4.24.1
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.24.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.24.1
* openSUSE Leap 15.6 (x86_64)
* libsoup-2_4-1-32bit-2.74.3-150600.4.24.1
* libsoup-2_4-1-32bit-debuginfo-2.74.3-150600.4.24.1
* libsoup2-devel-32bit-2.74.3-150600.4.24.1
* openSUSE Leap 15.6 (noarch)
* libsoup2-lang-2.74.3-150600.4.24.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libsoup2-devel-64bit-2.74.3-150600.4.24.1
* libsoup-2_4-1-64bit-debuginfo-2.74.3-150600.4.24.1
* libsoup-2_4-1-64bit-2.74.3-150600.4.24.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libsoup2-debugsource-2.74.3-150600.4.24.1
* libsoup2-devel-2.74.3-150600.4.24.1
* libsoup-2_4-1-2.74.3-150600.4.24.1
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.24.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.24.1
* Basesystem Module 15-SP7 (noarch)
* libsoup2-lang-2.74.3-150600.4.24.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libsoup2-debugsource-2.74.3-150600.4.24.1
* libsoup2-devel-2.74.3-150600.4.24.1
* libsoup-2_4-1-2.74.3-150600.4.24.1
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.24.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.24.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* libsoup2-lang-2.74.3-150600.4.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libsoup2-debugsource-2.74.3-150600.4.24.1
* libsoup2-devel-2.74.3-150600.4.24.1
* libsoup-2_4-1-2.74.3-150600.4.24.1
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.24.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* libsoup2-lang-2.74.3-150600.4.24.1

## References:

* https://www.suse.com/security/cve/CVE-2025-4476.html
* https://www.suse.com/security/cve/CVE-2026-0716.html
* https://www.suse.com/security/cve/CVE-2026-1761.html
* https://bugzilla.suse.com/show_bug.cgi?id=1243422
* https://bugzilla.suse.com/show_bug.cgi?id=1256418
* https://bugzilla.suse.com/show_bug.cgi?id=1257598



SUSE-SU-2026:0575-1: low: Security update for libpcap


# Security update for libpcap

Announcement ID: SUSE-SU-2026:0575-1
Release Date: 2026-02-18T09:10:48Z
Rating: low
References:

* bsc#1255765

Cross-References:

* CVE-2025-11961

CVSS scores:

* CVE-2025-11961 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-11961 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-11961 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4

An update that solves one vulnerability can now be installed.

## Description:

This update for libpcap fixes the following issues:

* CVE-2025-11961: missing validation of provided MAC-48 address string in
`pcap_ether_aton()` can lead to out-of-bounds read and write (bsc#1255765).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-575=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-575=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-575=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-575=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-575=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-575=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libpcap1-debuginfo-1.10.1-150400.3.9.1
* libpcap1-1.10.1-150400.3.9.1
* libpcap-devel-static-1.10.1-150400.3.9.1
* libpcap-devel-1.10.1-150400.3.9.1
* libpcap-debugsource-1.10.1-150400.3.9.1
* openSUSE Leap 15.4 (x86_64)
* libpcap-devel-32bit-1.10.1-150400.3.9.1
* libpcap1-32bit-debuginfo-1.10.1-150400.3.9.1
* libpcap1-32bit-1.10.1-150400.3.9.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libpcap-devel-64bit-1.10.1-150400.3.9.1
* libpcap1-64bit-debuginfo-1.10.1-150400.3.9.1
* libpcap1-64bit-1.10.1-150400.3.9.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libpcap1-debuginfo-1.10.1-150400.3.9.1
* libpcap1-1.10.1-150400.3.9.1
* libpcap-debugsource-1.10.1-150400.3.9.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libpcap1-debuginfo-1.10.1-150400.3.9.1
* libpcap1-1.10.1-150400.3.9.1
* libpcap-debugsource-1.10.1-150400.3.9.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libpcap1-debuginfo-1.10.1-150400.3.9.1
* libpcap1-1.10.1-150400.3.9.1
* libpcap-debugsource-1.10.1-150400.3.9.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libpcap1-debuginfo-1.10.1-150400.3.9.1
* libpcap1-1.10.1-150400.3.9.1
* libpcap-debugsource-1.10.1-150400.3.9.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libpcap1-debuginfo-1.10.1-150400.3.9.1
* libpcap1-1.10.1-150400.3.9.1
* libpcap-debugsource-1.10.1-150400.3.9.1

## References:

* https://www.suse.com/security/cve/CVE-2025-11961.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255765



SUSE-SU-2026:0576-1: moderate: Security update for abseil-cpp


# Security update for abseil-cpp

Announcement ID: SUSE-SU-2026:0576-1
Release Date: 2026-02-18T09:12:52Z
Rating: moderate
References:

* bsc#1237543

Cross-References:

* CVE-2025-0838

CVSS scores:

* CVE-2025-0838 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:A/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L
* CVE-2025-0838 ( SUSE ): 5.6 CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L
* CVE-2025-0838 ( NVD ): 5.9
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:A/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-0838 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro for Rancher 5.3

An update that solves one vulnerability can now be installed.

## Description:

This update for abseil-cpp fixes the following issues:

Update to version 20230802.3

* CVE-2025-0838: Fixed potential integer overflow in hash container
create/resize (bsc#1237543).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-576=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-576=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-576=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* abseil-cpp-debugsource-20230802.3-150400.10.7.1
* abseil-cpp-devel-20230802.3-150400.10.7.1
* libabsl2308_0_0-20230802.3-150400.10.7.1
* libabsl2308_0_0-debuginfo-20230802.3-150400.10.7.1
* openSUSE Leap 15.4 (x86_64)
* libabsl2308_0_0-32bit-20230802.3-150400.10.7.1
* libabsl2308_0_0-32bit-debuginfo-20230802.3-150400.10.7.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libabsl2308_0_0-64bit-debuginfo-20230802.3-150400.10.7.1
* libabsl2308_0_0-64bit-20230802.3-150400.10.7.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* abseil-cpp-debugsource-20230802.3-150400.10.7.1
* libabsl2308_0_0-20230802.3-150400.10.7.1
* libabsl2308_0_0-debuginfo-20230802.3-150400.10.7.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* abseil-cpp-debugsource-20230802.3-150400.10.7.1
* libabsl2308_0_0-20230802.3-150400.10.7.1
* libabsl2308_0_0-debuginfo-20230802.3-150400.10.7.1

## References:

* https://www.suse.com/security/cve/CVE-2025-0838.html
* https://bugzilla.suse.com/show_bug.cgi?id=1237543



openSUSE-SU-2026:20239-1: critical: Security update for golang-github-prometheus-prometheus


openSUSE security update: security update for golang-github-prometheus-prometheus
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20239-1
Rating: critical
References:

* bsc#1257442
* bsc#1257841
* bsc#1257897

Cross-References:

* CVE-2025-61140
* CVE-2026-1615
* CVE-2026-25547

CVSS scores:

* CVE-2025-61140 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-61140 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-1615 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-1615 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-25547 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25547 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 3 vulnerabilities and has 3 bug fixes can now be installed.

Description:

This update for golang-github-prometheus-prometheus fixes the following issues:

- CVE-2026-25547: Fixed an unbounded brace range expansion leading to excessive CPU and memory consumption. (bsc#1257841)
- CVE-2026-1615: Fixed arbitrary code injection due to unsafe evaluation of user-supplied JSON Path expressions in jsonpath. (bsc#1257897)
- CVE-2025-61140: Fixed a function vulnerable to prototype pollution in jsonpath. (bsc#1257442)

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-290=1

Package List:

- openSUSE Leap 16.0:

golang-github-prometheus-prometheus-3.5.0-160000.2.1

References:

* https://www.suse.com/security/cve/CVE-2025-61140.html
* https://www.suse.com/security/cve/CVE-2026-1615.html
* https://www.suse.com/security/cve/CVE-2026-25547.html



openSUSE-SU-2026:10217-1: moderate: traefik-3.6.8-1.1 on GA media


# traefik-3.6.8-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10217-1
Rating: moderate

Cross-References:

* CVE-2026-25949

CVSS scores:

* CVE-2026-25949 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25949 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the traefik-3.6.8-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* traefik 3.6.8-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25949.html



openSUSE-SU-2026:10214-1: moderate: mupdf-1.27.1-1.1 on GA media


# mupdf-1.27.1-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10214-1
Rating: moderate

Cross-References:

* CVE-2025-55780
* CVE-2026-25556

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the mupdf-1.27.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* mupdf 1.27.1-1.1
* mupdf-devel-static 1.27.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-55780.html
* https://www.suse.com/security/cve/CVE-2026-25556.html



openSUSE-SU-2026:10216-1: moderate: python311-asgiref-3.11.1-1.1 on GA media


# python311-asgiref-3.11.1-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10216-1
Rating: moderate

Cross-References:

* CVE-2025-14550

CVSS scores:

* CVE-2025-14550 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python311-asgiref-3.11.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311-asgiref 3.11.1-1.1
* python312-asgiref 3.11.1-1.1
* python313-asgiref 3.11.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-14550.html



openSUSE-SU-2026:10213-1: moderate: libxml2-16-2.14.5-4.1 on GA media


# libxml2-16-2.14.5-4.1 on GA media

Announcement ID: openSUSE-SU-2026:10213-1
Rating: moderate

Cross-References:

* CVE-2025-8732
* CVE-2026-0990
* CVE-2026-0992

CVSS scores:

* CVE-2025-8732 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-8732 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0990 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0990 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0992 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-0992 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 3 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the libxml2-16-2.14.5-4.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libxml2-16 2.14.5-4.1
* libxml2-16-32bit 2.14.5-4.1
* libxml2-devel 2.14.5-4.1
* libxml2-devel-32bit 2.14.5-4.1
* libxml2-doc 2.14.5-4.1
* libxml2-tools 2.14.5-4.1

## References:

* https://www.suse.com/security/cve/CVE-2025-8732.html
* https://www.suse.com/security/cve/CVE-2026-0990.html
* https://www.suse.com/security/cve/CVE-2026-0992.html



openSUSE-SU-2026:10211-1: moderate: azure-cli-core-2.83.0-2.1 on GA media


# azure-cli-core-2.83.0-2.1 on GA media

Announcement ID: openSUSE-SU-2026:10211-1
Rating: moderate

Cross-References:

* CVE-2025-24049

CVSS scores:

* CVE-2025-24049 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-24049 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the azure-cli-core-2.83.0-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* azure-cli-core 2.83.0-2.1

## References:

* https://www.suse.com/security/cve/CVE-2025-24049.html



SUSE-SU-2026:0577-1: moderate: Security update for avahi


# Security update for avahi

Announcement ID: SUSE-SU-2026:0577-1
Release Date: 2026-02-18T15:49:25Z
Rating: moderate
References:

* bsc#1256498
* bsc#1256499
* bsc#1256500

Cross-References:

* CVE-2025-68276
* CVE-2025-68468
* CVE-2025-68471

CVSS scores:

* CVE-2025-68276 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68276 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68468 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68468 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-68468 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-68471 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68471 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-68471 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4

An update that solves three vulnerabilities can now be installed.

## Description:

This update for avahi fixes the following issues:

* CVE-2025-68276: Fixed refuse to create wide-area record browsers when wide-
area is off (bsc#1256498)
* CVE-2025-68471: Fixed DoS bug by changing assert to return (bsc#1256500)
* CVE-2025-68468: Fixed DoS bug by removing incorrect assertion (bsc#1256499)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-577=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-577=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-577=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-577=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-577=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-577=1

## Package List:

* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libavahi-common3-debuginfo-0.8-150400.7.26.1
* libavahi-core7-0.8-150400.7.26.1
* libavahi-core7-debuginfo-0.8-150400.7.26.1
* libavahi-client3-debuginfo-0.8-150400.7.26.1
* avahi-debugsource-0.8-150400.7.26.1
* libavahi-common3-0.8-150400.7.26.1
* libavahi-client3-0.8-150400.7.26.1
* avahi-0.8-150400.7.26.1
* avahi-debuginfo-0.8-150400.7.26.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libavahi-common3-debuginfo-0.8-150400.7.26.1
* libavahi-core7-0.8-150400.7.26.1
* libavahi-core7-debuginfo-0.8-150400.7.26.1
* libavahi-client3-debuginfo-0.8-150400.7.26.1
* avahi-debugsource-0.8-150400.7.26.1
* libavahi-common3-0.8-150400.7.26.1
* libavahi-client3-0.8-150400.7.26.1
* avahi-0.8-150400.7.26.1
* avahi-debuginfo-0.8-150400.7.26.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libavahi-common3-debuginfo-0.8-150400.7.26.1
* libavahi-core7-0.8-150400.7.26.1
* libavahi-core7-debuginfo-0.8-150400.7.26.1
* libavahi-client3-debuginfo-0.8-150400.7.26.1
* avahi-debugsource-0.8-150400.7.26.1
* libavahi-common3-0.8-150400.7.26.1
* libavahi-client3-0.8-150400.7.26.1
* avahi-0.8-150400.7.26.1
* avahi-debuginfo-0.8-150400.7.26.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libhowl0-0.8-150400.7.26.1
* libavahi-core7-0.8-150400.7.26.1
* libavahi-core7-debuginfo-0.8-150400.7.26.1
* libavahi-gobject0-0.8-150400.7.26.1
* python3-avahi-gtk-0.8-150400.7.26.1
* libdns_sd-debuginfo-0.8-150400.7.26.1
* libavahi-qt5-devel-0.8-150400.7.26.1
* libavahi-libevent1-debuginfo-0.8-150400.7.26.1
* libavahi-ui-gtk3-0-0.8-150400.7.26.1
* avahi-compat-howl-devel-0.8-150400.7.26.1
* libavahi-client3-0.8-150400.7.26.1
* avahi-autoipd-0.8-150400.7.26.1
* libavahi-common3-debuginfo-0.8-150400.7.26.1
* python3-avahi-0.8-150400.7.26.1
* libavahi-qt5-1-0.8-150400.7.26.1
* avahi-debugsource-0.8-150400.7.26.1
* libdns_sd-0.8-150400.7.26.1
* libavahi-gobject0-debuginfo-0.8-150400.7.26.1
* avahi-autoipd-debuginfo-0.8-150400.7.26.1
* libhowl0-debuginfo-0.8-150400.7.26.1
* avahi-0.8-150400.7.26.1
* avahi-debuginfo-0.8-150400.7.26.1
* typelib-1_0-Avahi-0_6-0.8-150400.7.26.1
* libavahi-devel-0.8-150400.7.26.1
* libavahi-qt5-1-debuginfo-0.8-150400.7.26.1
* avahi-glib2-debugsource-0.8-150400.7.26.1
* libavahi-glib1-debuginfo-0.8-150400.7.26.1
* avahi-utils-gtk-0.8-150400.7.26.1
* avahi-utils-debuginfo-0.8-150400.7.26.1
* avahi-qt5-debugsource-0.8-150400.7.26.1
* avahi-utils-0.8-150400.7.26.1
* libavahi-glib-devel-0.8-150400.7.26.1
* libavahi-ui-gtk3-0-debuginfo-0.8-150400.7.26.1
* avahi-compat-mDNSResponder-devel-0.8-150400.7.26.1
* libavahi-client3-debuginfo-0.8-150400.7.26.1
* avahi-utils-gtk-debuginfo-0.8-150400.7.26.1
* libavahi-gobject-devel-0.8-150400.7.26.1
* libavahi-common3-0.8-150400.7.26.1
* libavahi-libevent1-0.8-150400.7.26.1
* libavahi-glib1-0.8-150400.7.26.1
* openSUSE Leap 15.4 (x86_64)
* libavahi-glib1-32bit-debuginfo-0.8-150400.7.26.1
* libdns_sd-32bit-debuginfo-0.8-150400.7.26.1
* libavahi-glib1-32bit-0.8-150400.7.26.1
* libdns_sd-32bit-0.8-150400.7.26.1
* libavahi-common3-32bit-0.8-150400.7.26.1
* libavahi-common3-32bit-debuginfo-0.8-150400.7.26.1
* avahi-32bit-debuginfo-0.8-150400.7.26.1
* libavahi-client3-32bit-0.8-150400.7.26.1
* libavahi-client3-32bit-debuginfo-0.8-150400.7.26.1
* openSUSE Leap 15.4 (noarch)
* avahi-lang-0.8-150400.7.26.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libavahi-client3-64bit-debuginfo-0.8-150400.7.26.1
* libavahi-client3-64bit-0.8-150400.7.26.1
* avahi-64bit-debuginfo-0.8-150400.7.26.1
* libdns_sd-64bit-0.8-150400.7.26.1
* libavahi-glib1-64bit-debuginfo-0.8-150400.7.26.1
* libavahi-common3-64bit-0.8-150400.7.26.1
* libavahi-common3-64bit-debuginfo-0.8-150400.7.26.1
* libavahi-glib1-64bit-0.8-150400.7.26.1
* libdns_sd-64bit-debuginfo-0.8-150400.7.26.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libavahi-common3-debuginfo-0.8-150400.7.26.1
* libavahi-core7-0.8-150400.7.26.1
* libavahi-core7-debuginfo-0.8-150400.7.26.1
* libavahi-client3-debuginfo-0.8-150400.7.26.1
* avahi-debugsource-0.8-150400.7.26.1
* libavahi-common3-0.8-150400.7.26.1
* libavahi-client3-0.8-150400.7.26.1
* avahi-0.8-150400.7.26.1
* avahi-debuginfo-0.8-150400.7.26.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libavahi-common3-debuginfo-0.8-150400.7.26.1
* libavahi-core7-0.8-150400.7.26.1
* libavahi-core7-debuginfo-0.8-150400.7.26.1
* libavahi-client3-debuginfo-0.8-150400.7.26.1
* avahi-debugsource-0.8-150400.7.26.1
* libavahi-common3-0.8-150400.7.26.1
* libavahi-client3-0.8-150400.7.26.1
* avahi-0.8-150400.7.26.1
* avahi-debuginfo-0.8-150400.7.26.1

## References:

* https://www.suse.com/security/cve/CVE-2025-68276.html
* https://www.suse.com/security/cve/CVE-2025-68468.html
* https://www.suse.com/security/cve/CVE-2025-68471.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256498
* https://bugzilla.suse.com/show_bug.cgi?id=1256499
* https://bugzilla.suse.com/show_bug.cgi?id=1256500