SUSE 5633 Published by

MariaDB receives an important security patch for openSUSE Leap 16.0 that resolves a heap buffer overflow capable of triggering crashes or remote code execution. A moderate update for container-suseconnect on the same platform simply switches its build environment to Go version 1.25 without addressing specific exploits. Users running openSUSE Tumbleweed should apply a patch for pocketbase to fix a security issue linked to CVE-2026-33809. The Xen virtualization suite also gets an important update that closes three separate vulnerabilities across several SUSE distributions and mandates a system reboot once applied.

openSUSE-SU-2026:20629-1: important: Security update for mariadb
openSUSE-SU-2026:20628-1: moderate: Security update for container-suseconnect
openSUSE-SU-2026:10628-1: moderate: pocketbase-0.37.3-1.1 on GA media
SUSE-SU-2026:1645-1: important: Security update for xen




openSUSE-SU-2026:20629-1: important: Security update for mariadb


openSUSE security update: security update for mariadb
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20629-1
Rating: important
References:

* bsc#1260081

Cross-References:

* CVE-2026-32710

CVSS scores:

* CVE-2026-32710 ( SUSE ): 8.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-32710 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for mariadb fixes the following issue:

- Update to v11.8.6
- CVE-2026-32710: heap-based buffer overflow via `JSON_SCHEMA_VALID()` can lead to crash or remote code execution (bsc#1260081).

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-645=1

Package List:

- openSUSE Leap 16.0:

libmariadbd-devel-11.8.6-160000.1.1
libmariadbd19-11.8.6-160000.1.1
mariadb-11.8.6-160000.1.1
mariadb-bench-11.8.6-160000.1.1
mariadb-client-11.8.6-160000.1.1
mariadb-errormessages-11.8.6-160000.1.1
mariadb-galera-11.8.6-160000.1.1
mariadb-rpm-macros-11.8.6-160000.1.1
mariadb-test-11.8.6-160000.1.1
mariadb-tools-11.8.6-160000.1.1

References:

* https://www.suse.com/security/cve/CVE-2026-32710.html



openSUSE-SU-2026:20628-1: moderate: Security update for container-suseconnect


openSUSE security update: security update for container-suseconnect
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20628-1
Rating: moderate

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves various issues can now be installed.

Description:

This update for container-suseconnect fixes the following issues:

Changes in container-suseconnect:

- switch to build with go 1.25

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-644=1

Package List:

- openSUSE Leap 16.0:

container-suseconnect-2.5.6-160000.2.1



openSUSE-SU-2026:10628-1: moderate: pocketbase-0.37.3-1.1 on GA media


# pocketbase-0.37.3-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10628-1
Rating: moderate

Cross-References:

* CVE-2026-33809

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the pocketbase-0.37.3-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* pocketbase 0.37.3-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-33809.html



SUSE-SU-2026:1645-1: important: Security update for xen


# Security update for xen

Announcement ID: SUSE-SU-2026:1645-1
Release Date: 2026-04-28T14:46:53Z
Rating: important
References:

* bsc#1262178
* bsc#1262180
* bsc#1262428

Cross-References:

* CVE-2025-54505
* CVE-2026-23557
* CVE-2026-23558

CVSS scores:

* CVE-2025-54505 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2025-54505 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-54505 ( NVD ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23557 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2026-23558 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.3
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2

An update that solves three vulnerabilities can now be installed.

## Description:

This update for xen fixes the following issues:

* CVE-2025-54505: floating point divider state sampling on AMD CPUs AMD-
SN-7053 (bsc#1262428).
* CVE-2026-23557: Xenstored DoS via XS_RESET_WATCHES command (bsc#1262178).
* CVE-2026-23558: grant table v2 race in status page mapping (bsc#1262180).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-1645=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-1645=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-1645=1

## Package List:

* openSUSE Leap 15.3 (aarch64 x86_64 i586)
* xen-debugsource-4.14.6_30-150300.3.97.1
* xen-tools-domU-debuginfo-4.14.6_30-150300.3.97.1
* xen-tools-domU-4.14.6_30-150300.3.97.1
* xen-libs-debuginfo-4.14.6_30-150300.3.97.1
* xen-libs-4.14.6_30-150300.3.97.1
* xen-devel-4.14.6_30-150300.3.97.1
* openSUSE Leap 15.3 (x86_64)
* xen-libs-32bit-debuginfo-4.14.6_30-150300.3.97.1
* xen-libs-32bit-4.14.6_30-150300.3.97.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* xen-doc-html-4.14.6_30-150300.3.97.1
* xen-4.14.6_30-150300.3.97.1
* xen-tools-debuginfo-4.14.6_30-150300.3.97.1
* xen-tools-4.14.6_30-150300.3.97.1
* openSUSE Leap 15.3 (noarch)
* xen-tools-xendomains-wait-disk-4.14.6_30-150300.3.97.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* xen-libs-64bit-4.14.6_30-150300.3.97.1
* xen-libs-64bit-debuginfo-4.14.6_30-150300.3.97.1
* SUSE Linux Enterprise Micro 5.2 (x86_64)
* xen-debugsource-4.14.6_30-150300.3.97.1
* xen-libs-4.14.6_30-150300.3.97.1
* xen-libs-debuginfo-4.14.6_30-150300.3.97.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
* xen-debugsource-4.14.6_30-150300.3.97.1
* xen-libs-4.14.6_30-150300.3.97.1
* xen-libs-debuginfo-4.14.6_30-150300.3.97.1

## References:

* https://www.suse.com/security/cve/CVE-2025-54505.html
* https://www.suse.com/security/cve/CVE-2026-23557.html
* https://www.suse.com/security/cve/CVE-2026-23558.html
* https://bugzilla.suse.com/show_bug.cgi?id=1262178
* https://bugzilla.suse.com/show_bug.cgi?id=1262180
* https://bugzilla.suse.com/show_bug.cgi?id=1262428