SUSE-SU-2026:0459-1: important: Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda
SUSE-SU-2026:0457-1: important: Security update for nodejs20
SUSE-SU-2026:0456-1: important: Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda
SUSE-SU-2026:0458-1: important: Security update for glib2
SUSE-SU-2026:0460-1: important: Security update for python-wheel
openSUSE-SU-2026:0044-1: important: Security update for tcpreplay
openSUSE-SU-2026:20199-1: low: Security update for micropython
openSUSE-SU-2026:20198-1: important: Security update for xorg-x11-server
openSUSE-SU-2026:10182-1: moderate: snpguest-0.10.0-2.1 on GA media
openSUSE-SU-2026:10177-1: moderate: gnutls-3.8.12-1.1 on GA media
openSUSE-SU-2026:10180-1: moderate: rustup-1.28.2~0-3.1 on GA media
openSUSE-SU-2026:10181-1: moderate: sccache-0.13.0~1-2.1 on GA media
openSUSE-SU-2026:10178-1: moderate: libmunge2-0.5.18-1.1 on GA media
SUSE-SU-2026:0471-1: important: Security update for the Linux Kernel
SUSE-SU-2026:0474-1: important: Security update for the Linux Kernel
SUSE-SU-2026:0475-1: important: Security update for the Linux Kernel
SUSE-SU-2026:0476-1: important: Security update for python-azure-core
SUSE-SU-2026:0480-1: important: Security update for helm
openSUSE-SU-2026:0045-1: moderate: Security update for assimp
SUSE-SU-2026:0459-1: important: Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda
# Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed,
nvidia-persistenced.cuda
Announcement ID: SUSE-SU-2026:0459-1
Release Date: 2026-02-11T23:29:39Z
Rating: important
References:
* bsc#1254801
* bsc#1255858
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that has two security fixes can now be installed.
## Description:
This update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-
persistenced.cuda fixes the following issues:
Changes in nvidia-open-driver-G06-signed:
* updated CUDA variant to version 580.126.09
* update non-CUDA variant to version 580.126.09 (bsc#1255858)
* update non-CUDA variant to version 580.119.02 (bsc#1254801)
Changes in nvidia-persistenced.cuda:
* update to version 580.126.09
Changes in nvidia-modprobe.cuda:
* update to version 580.126.09
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-459=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-459=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-459=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-459=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-459=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-459=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-459=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-459=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-459=1
## Package List:
* openSUSE Leap 15.4 (aarch64 x86_64)
* nvidia-persistenced-debuginfo-580.126.09-150400.9.12.1
* nvidia-modprobe-debuginfo-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-modprobe-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150400.107.1
* nvidia-modprobe-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* openSUSE Leap 15.4 (noarch)
* nvidia-open-driver-G06-signed-cuda-check-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-check-580.126.09-150400.107.1
* openSUSE Leap 15.4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150400.107.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* nvidia-persistenced-debuginfo-580.126.09-150400.9.12.1
* nvidia-modprobe-debuginfo-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150400.107.1
* nvidia-modprobe-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nvidia-modprobe-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150400.107.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* nvidia-persistenced-debuginfo-580.126.09-150400.9.12.1
* nvidia-modprobe-debuginfo-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150400.107.1
* nvidia-modprobe-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nvidia-modprobe-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150400.107.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64)
* nvidia-persistenced-debuginfo-580.126.09-150400.9.12.1
* nvidia-modprobe-debuginfo-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150400.107.1
* nvidia-modprobe-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nvidia-modprobe-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150400.107.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* nvidia-modprobe-debuginfo-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-580.126.09-150400.9.12.1
* nvidia-persistenced-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nvidia-modprobe-580.126.09-150400.9.12.1
* nvidia-persistenced-debuginfo-580.126.09-150400.9.12.1
* nvidia-modprobe-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1254801
* https://bugzilla.suse.com/show_bug.cgi?id=1255858
SUSE-SU-2026:0457-1: important: Security update for nodejs20
# Security update for nodejs20
Announcement ID: SUSE-SU-2026:0457-1
Release Date: 2026-02-11T22:21:24Z
Rating: important
References:
* bsc#1256569
* bsc#1256570
* bsc#1256571
* bsc#1256573
* bsc#1256574
* bsc#1256576
* bsc#1256848
Cross-References:
* CVE-2025-55130
* CVE-2025-55131
* CVE-2025-55132
* CVE-2025-59465
* CVE-2025-59466
* CVE-2026-21637
* CVE-2026-22036
CVSS scores:
* CVE-2025-55130 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55130 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55130 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-55130 ( NVD ): 7.1 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-55131 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55131 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55131 ( NVD ): 7.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
* CVE-2025-55132 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-55132 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-55132 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-55132 ( NVD ): 2.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
* CVE-2025-59465 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-59465 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59465 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59466 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-59466 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59466 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59466 ( NVD ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-21637 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-21637 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-21637 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-21637 ( NVD ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22036 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-22036 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22036 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22036 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves seven vulnerabilities can now be installed.
## Description:
This update for nodejs20 fixes the following issues:
* Update to 20.20.0:
* CVE-2026-22036: Updated undici to 6.23.0 (bsc#1256848)
* CVE-2025-59465: Add TLSSocket default error handler (bsc#1256573)
* CVE-2025-55132: Disable futimes when permission model is enabled
(bsc#1256571)
* CVE-2025-55130: Require full read and write to symlink APIs (bsc#1256569)
* CVE-2025-59466: Rethrow stack overflow exceptions in async_hooks
(bsc#1256574)
* CVE-2025-55131: Refactor unsafe buffer creation to remove zero-fill toggle
(bsc#1256570)
* CVE-2026-21637: Route callback exceptions through error handlers
(bsc#1256576)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-457=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-457=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-457=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-457=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-457=1
## Package List:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* nodejs20-debugsource-20.20.0-150500.11.24.1
* nodejs20-20.20.0-150500.11.24.1
* nodejs20-devel-20.20.0-150500.11.24.1
* nodejs20-debuginfo-20.20.0-150500.11.24.1
* npm20-20.20.0-150500.11.24.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* nodejs20-docs-20.20.0-150500.11.24.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* nodejs20-debugsource-20.20.0-150500.11.24.1
* nodejs20-20.20.0-150500.11.24.1
* nodejs20-devel-20.20.0-150500.11.24.1
* nodejs20-debuginfo-20.20.0-150500.11.24.1
* npm20-20.20.0-150500.11.24.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* nodejs20-docs-20.20.0-150500.11.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* nodejs20-debugsource-20.20.0-150500.11.24.1
* nodejs20-20.20.0-150500.11.24.1
* nodejs20-devel-20.20.0-150500.11.24.1
* nodejs20-debuginfo-20.20.0-150500.11.24.1
* npm20-20.20.0-150500.11.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* nodejs20-docs-20.20.0-150500.11.24.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* corepack20-20.20.0-150500.11.24.1
* nodejs20-debugsource-20.20.0-150500.11.24.1
* nodejs20-20.20.0-150500.11.24.1
* nodejs20-devel-20.20.0-150500.11.24.1
* nodejs20-debuginfo-20.20.0-150500.11.24.1
* npm20-20.20.0-150500.11.24.1
* openSUSE Leap 15.5 (noarch)
* nodejs20-docs-20.20.0-150500.11.24.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* nodejs20-debugsource-20.20.0-150500.11.24.1
* nodejs20-20.20.0-150500.11.24.1
* nodejs20-devel-20.20.0-150500.11.24.1
* nodejs20-debuginfo-20.20.0-150500.11.24.1
* npm20-20.20.0-150500.11.24.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* nodejs20-docs-20.20.0-150500.11.24.1
## References:
* https://www.suse.com/security/cve/CVE-2025-55130.html
* https://www.suse.com/security/cve/CVE-2025-55131.html
* https://www.suse.com/security/cve/CVE-2025-55132.html
* https://www.suse.com/security/cve/CVE-2025-59465.html
* https://www.suse.com/security/cve/CVE-2025-59466.html
* https://www.suse.com/security/cve/CVE-2026-21637.html
* https://www.suse.com/security/cve/CVE-2026-22036.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256569
* https://bugzilla.suse.com/show_bug.cgi?id=1256570
* https://bugzilla.suse.com/show_bug.cgi?id=1256571
* https://bugzilla.suse.com/show_bug.cgi?id=1256573
* https://bugzilla.suse.com/show_bug.cgi?id=1256574
* https://bugzilla.suse.com/show_bug.cgi?id=1256576
* https://bugzilla.suse.com/show_bug.cgi?id=1256848
SUSE-SU-2026:0456-1: important: Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda
# Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed,
nvidia-persistenced.cuda
Announcement ID: SUSE-SU-2026:0456-1
Release Date: 2026-02-11T22:21:03Z
Rating: important
References:
* bsc#1254801
* bsc#1255858
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has two security fixes can now be installed.
## Description:
This update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-
persistenced.cuda fixes the following issues:
Changes in nvidia-open-driver-G06-signed:
* updated CUDA variant to version 580.126.09
* update non-CUDA variant to version 580.126.09 (bsc#1255858)
* update non-CUDA variant to version 580.119.02 (bsc#1254801)
Changes in nvidia-persistenced.cuda:
* update to version 580.126.09
Changes in nvidia-modprobe.cuda:
* update to version 580.126.09
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-456=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-456=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-456=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-456=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-456=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-456=1
## Package List:
* openSUSE Leap 15.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-debuginfo-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-modprobe-debugsource-580.126.09-150500.12.6.1
* nvidia-persistenced-debuginfo-580.126.09-150500.12.6.1
* nvidia-persistenced-debugsource-580.126.09-150500.12.6.1
* nvidia-persistenced-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-580.126.09-150500.12.6.1
* nv-prefer-signed-open-driver-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* openSUSE Leap 15.5 (noarch)
* nvidia-open-driver-G06-signed-cuda-check-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-check-580.126.09-150500.3.85.1
* openSUSE Leap 15.5 (aarch64)
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150500.3.85.1
* nv-prefer-signed-open-driver-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-debuginfo-580.126.09-150500.12.6.1
* nvidia-persistenced-debuginfo-580.126.09-150500.12.6.1
* nvidia-modprobe-debugsource-580.126.09-150500.12.6.1
* nvidia-persistenced-debugsource-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-persistenced-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-580.126.09-150500.12.6.1
* nv-prefer-signed-open-driver-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64)
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-debuginfo-580.126.09-150500.12.6.1
* nvidia-persistenced-debuginfo-580.126.09-150500.12.6.1
* nvidia-modprobe-debugsource-580.126.09-150500.12.6.1
* nvidia-persistenced-debugsource-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-persistenced-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-580.126.09-150500.12.6.1
* nv-prefer-signed-open-driver-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64)
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-debuginfo-580.126.09-150500.12.6.1
* nvidia-persistenced-debuginfo-580.126.09-150500.12.6.1
* nvidia-modprobe-debugsource-580.126.09-150500.12.6.1
* nvidia-persistenced-debugsource-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-persistenced-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-580.126.09-150500.12.6.1
* nv-prefer-signed-open-driver-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64)
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-debuginfo-580.126.09-150500.12.6.1
* nvidia-persistenced-debuginfo-580.126.09-150500.12.6.1
* nvidia-modprobe-debugsource-580.126.09-150500.12.6.1
* nvidia-persistenced-debugsource-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-persistenced-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-580.126.09-150500.12.6.1
* nv-prefer-signed-open-driver-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1254801
* https://bugzilla.suse.com/show_bug.cgi?id=1255858
SUSE-SU-2026:0458-1: important: Security update for glib2
# Security update for glib2
Announcement ID: SUSE-SU-2026:0458-1
Release Date: 2026-02-11T23:29:09Z
Rating: important
References:
* bsc#1257049
Cross-References:
* CVE-2026-0988
CVSS scores:
* CVE-2026-0988 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0988 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-0988 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for glib2 fixes the following issues:
* CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to
integer wraparound in content type parsing (bsc#1257354).
* CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to
miscalculated buffer boundaries in the Base64 encoding routine
(bsc#1257355).
* CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds
access due to integer overflow in Unicode case conversion (bsc#1257353).
* CVE-2026-0988: Fixed a potential integer overflow in
g_buffered_input_stream_peek (bsc#1257049).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-458=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-458=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-458=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-458=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-458=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-458=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-458=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-458=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-458=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-458=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-458=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-458=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-458=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-458=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* gio-branding-upstream-2.70.5-150400.3.34.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tests-devel-debuginfo-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* glib2-tests-devel-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* glib2-doc-2.70.5-150400.3.34.1
* glib2-devel-static-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* openSUSE Leap 15.4 (x86_64)
* glib2-devel-32bit-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* glib2-devel-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-32bit-2.70.5-150400.3.34.1
* glib2-tools-32bit-2.70.5-150400.3.34.1
* glib2-tools-32bit-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libgio-2_0-0-64bit-2.70.5-150400.3.34.1
* libgmodule-2_0-0-64bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-64bit-2.70.5-150400.3.34.1
* libglib-2_0-0-64bit-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-64bit-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-64bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-64bit-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-64bit-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-64bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-64bit-2.70.5-150400.3.34.1
* glib2-tools-64bit-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-64bit-2.70.5-150400.3.34.1
* glib2-tools-64bit-2.70.5-150400.3.34.1
* libgmodule-2_0-0-64bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64)
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64)
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
## References:
* https://www.suse.com/security/cve/CVE-2026-0988.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257049
SUSE-SU-2026:0460-1: important: Security update for python-wheel
# Security update for python-wheel
Announcement ID: SUSE-SU-2026:0460-1
Release Date: 2026-02-11T23:30:24Z
Rating: important
References:
* bsc#1257100
Cross-References:
* CVE-2026-24049
CVSS scores:
* CVE-2026-24049 ( SUSE ): 7.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2026-24049 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-24049 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for python-wheel fixes the following issues:
* CVE-2026-24049: Fixed absent path sanitization can cause arbitrary file
permission modification (bsc#1257100).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-460=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-460=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-460=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-460=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-460=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-460=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-460=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-460=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-460=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-460=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-460=1
## Package List:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* openSUSE Leap 15.4 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* openSUSE Leap 15.6 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* Public Cloud Module 15-SP4 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
## References:
* https://www.suse.com/security/cve/CVE-2026-24049.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257100
openSUSE-SU-2026:0044-1: important: Security update for tcpreplay
openSUSE Security Update: Security update for tcpreplay
_______________________________
Announcement ID: openSUSE-SU-2026:0044-1
Rating: important
References: #1218249 #1221324 #1222131 #1243845 #1247919
#1248322 #1248595 #1248596 #1248597 #1248964
#1250356
Cross-References: CVE-2023-4256 CVE-2023-43279 CVE-2024-22654
CVE-2024-3024 CVE-2025-51006 CVE-2025-8746
CVE-2025-9157 CVE-2025-9384 CVE-2025-9385
CVE-2025-9386 CVE-2025-9649
CVSS scores:
CVE-2024-22654 (SUSE): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CVE-2025-8746 (SUSE): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that fixes 11 vulnerabilities is now available.
Description:
This update for tcpreplay fixes the following issues:
- update to 4.5.2:
* features added since 4.4.4
- fix/recalculate header checksum for ipv6-frag
- IPv6 frag checksum support
- AF_XDP socket support
- tcpreplay -w (write into a pcap file)
- tcpreaplay --fixhdrlen
- --include and --exclude options
- SLL2 support
- Haiku support
* security fixes reported for 4.4.4 fixed in 4.5.2
- CVE-2023-4256 / boo#1218249
- CVE-2023-43279 / boo#1221324
- CVE-2024-3024 / boo#1222131 (likely)
- CVE-2024-22654 / boo#1243845
- CVE-2025-9157 / boo#1248322
- CVE-2025-9384 / boo#1248595
- CVE-2025-9385 / boo#1248596
- CVE-2025-9386 / boo#1248597
- CVE-2025-9649 / boo#1248964
- CVE-2025-51006 / boo#1250356
- see https://github.com/appneta/tcpreplay/compare/v4.4.4...v4.5.2 for
full changelog
- security fix for CVE-2025-8746 / boo#1247919
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-44=1
Package List:
- openSUSE Backports SLE-15-SP7 (aarch64 i586 ppc64le s390x x86_64):
tcpreplay-4.5.2-bp157.2.3.1
References:
https://www.suse.com/security/cve/CVE-2023-4256.html
https://www.suse.com/security/cve/CVE-2023-43279.html
https://www.suse.com/security/cve/CVE-2024-22654.html
https://www.suse.com/security/cve/CVE-2024-3024.html
https://www.suse.com/security/cve/CVE-2025-51006.html
https://www.suse.com/security/cve/CVE-2025-8746.html
https://www.suse.com/security/cve/CVE-2025-9157.html
https://www.suse.com/security/cve/CVE-2025-9384.html
https://www.suse.com/security/cve/CVE-2025-9385.html
https://www.suse.com/security/cve/CVE-2025-9386.html
https://www.suse.com/security/cve/CVE-2025-9649.html
https://bugzilla.suse.com/1218249
https://bugzilla.suse.com/1221324
https://bugzilla.suse.com/1222131
https://bugzilla.suse.com/1243845
https://bugzilla.suse.com/1247919
https://bugzilla.suse.com/1248322
https://bugzilla.suse.com/1248595
https://bugzilla.suse.com/1248596
https://bugzilla.suse.com/1248597
https://bugzilla.suse.com/1248964
https://bugzilla.suse.com/1250356
openSUSE-SU-2026:20199-1: low: Security update for micropython
openSUSE security update: security update for micropython
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20199-1
Rating: low
References:
* bsc#1257803
Cross-References:
* CVE-2026-1998
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for micropython fixes the following issues:
Changes in micropython:
- CVE-2026-1998: Fixed segmentation fault in `mp_map_lookup` via `mp_import_all` (bsc#1257803).
- Version 1.26.1
* esp32: update esp_tinyusb component to v1.7.6
* tools: add an environment variable MICROPY_MAINTAINER_BUILD
* esp32: add IDF Component Lockfiles to git repo
* shared/tinyusb: fix hang from new tx_overwritabe_if_not_connected flag
* shared/tinyusb/mp_usbd_cdc: rewrite USB CDC TX loop
* tools/mpremote: don't apply Espressif DTR/RTS quirk to TinyUSB CDC dev
- Fix building on single core systems
* Skip tests/thread/stress_schedule.py when single core system detected
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-packagehub-122=1
Package List:
- openSUSE Leap 16.0:
micropython-1.26.1-bp160.1.1
mpremote-1.26.1-bp160.1.1
mpy-tools-1.26.1-bp160.1.1
References:
* https://www.suse.com/security/cve/CVE-2026-1998.html
openSUSE-SU-2026:20198-1: important: Security update for xorg-x11-server
openSUSE security update: security update for xorg-x11-server
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20198-1
Rating: important
References:
* bsc#1251958
* bsc#1251959
* bsc#1251960
Cross-References:
* CVE-2025-62229
* CVE-2025-62230
* CVE-2025-62231
CVSS scores:
* CVE-2025-62229 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-62229 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-62230 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-62230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-62231 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-62231 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 3 vulnerabilities and has 3 bug fixes can now be installed.
Description:
This update for xorg-x11-server fixes the following issues:
- CVE-2025-62229: Fixed use-after-free in XPresentNotify structures creation (bsc#1251958).
- CVE-2025-62230: Fixed use-after-free in Xkb client resource removal (bsc#1251959).
- CVE-2025-62231: Fixed value overflow in Xkb extension XkbSetCompatMap() (bsc#1251960).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-254=1
Package List:
- openSUSE Leap 16.0:
xorg-x11-server-21.1.15-160000.3.1
xorg-x11-server-Xvfb-21.1.15-160000.3.1
xorg-x11-server-extra-21.1.15-160000.3.1
xorg-x11-server-sdk-21.1.15-160000.3.1
xorg-x11-server-source-21.1.15-160000.3.1
xorg-x11-server-wrapper-21.1.15-160000.3.1
References:
* https://www.suse.com/security/cve/CVE-2025-62229.html
* https://www.suse.com/security/cve/CVE-2025-62230.html
* https://www.suse.com/security/cve/CVE-2025-62231.html
openSUSE-SU-2026:10182-1: moderate: snpguest-0.10.0-2.1 on GA media
# snpguest-0.10.0-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10182-1
Rating: moderate
Cross-References:
* CVE-2026-25727
CVSS scores:
* CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the snpguest-0.10.0-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* snpguest 0.10.0-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-25727.html
openSUSE-SU-2026:10177-1: moderate: gnutls-3.8.12-1.1 on GA media
# gnutls-3.8.12-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10177-1
Rating: moderate
Cross-References:
* CVE-2025-14831
* CVE-2026-1584
CVSS scores:
* CVE-2025-14831 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-14831 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-1584 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the gnutls-3.8.12-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* gnutls 3.8.12-1.1
* libgnutls-dane-devel 3.8.12-1.1
* libgnutls-dane0 3.8.12-1.1
* libgnutls-devel 3.8.12-1.1
* libgnutls-devel-32bit 3.8.12-1.1
* libgnutls-devel-doc 3.8.12-1.1
* libgnutls30 3.8.12-1.1
* libgnutls30-32bit 3.8.12-1.1
* libgnutlsxx-devel 3.8.12-1.1
* libgnutlsxx30 3.8.12-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-14831.html
* https://www.suse.com/security/cve/CVE-2026-1584.html
openSUSE-SU-2026:10180-1: moderate: rustup-1.28.2~0-3.1 on GA media
# rustup-1.28.2~0-3.1 on GA media
Announcement ID: openSUSE-SU-2026:10180-1
Rating: moderate
Cross-References:
* CVE-2026-25727
CVSS scores:
* CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the rustup-1.28.2~0-3.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* rustup 1.28.2~0-3.1
## References:
* https://www.suse.com/security/cve/CVE-2026-25727.html
openSUSE-SU-2026:10181-1: moderate: sccache-0.13.0~1-2.1 on GA media
# sccache-0.13.0~1-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10181-1
Rating: moderate
Cross-References:
* CVE-2026-25727
CVSS scores:
* CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the sccache-0.13.0~1-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* sccache 0.13.0~1-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-25727.html
openSUSE-SU-2026:10178-1: moderate: libmunge2-0.5.18-1.1 on GA media
# libmunge2-0.5.18-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10178-1
Rating: moderate
Cross-References:
* CVE-2026-25506
CVSS scores:
* CVE-2026-25506 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the libmunge2-0.5.18-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libmunge2 0.5.18-1.1
* munge 0.5.18-1.1
* munge-devel 0.5.18-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-25506.html
SUSE-SU-2026:0471-1: important: Security update for the Linux Kernel
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2026:0471-1
Release Date: 2026-02-12T11:25:55Z
Rating: important
References:
* bsc#1228490
* bsc#1233563
* bsc#1234842
* bsc#1241437
* bsc#1242909
* bsc#1246184
* bsc#1246447
* bsc#1247030
* bsc#1247712
* bsc#1248211
* bsc#1249307
* bsc#1250032
* bsc#1250082
* bsc#1250705
* bsc#1250748
* bsc#1252511
* bsc#1252712
* bsc#1252900
* bsc#1253087
* bsc#1253451
* bsc#1254378
* bsc#1254447
* bsc#1254465
* bsc#1254510
* bsc#1254767
* bsc#1254842
* bsc#1254845
* bsc#1255377
* bsc#1255401
* bsc#1256528
* bsc#1256609
* bsc#1256610
* bsc#1256612
* bsc#1256616
* bsc#1256617
* bsc#1256623
* bsc#1256641
* bsc#1256664
* bsc#1256665
* bsc#1256682
* bsc#1256726
* bsc#1256728
* bsc#1256759
* bsc#1256779
* bsc#1256792
* bsc#1257154
* bsc#1257158
* bsc#1257232
* bsc#1257236
* bsc#1257296
* bsc#1257332
* bsc#1257473
* bsc#1257603
* jsc#PED-3527
* jsc#PED-5065
* jsc#PED-5475
* jsc#PED-5477
* jsc#PED-5511
* jsc#PED-6041
* jsc#PED-6068
* jsc#PED-6069
* jsc#PED-6070
* jsc#PED-6071
* jsc#PED-6116
* jsc#PED-6120
Cross-References:
* CVE-2023-53714
* CVE-2024-42103
* CVE-2024-53070
* CVE-2024-53149
* CVE-2025-22047
* CVE-2025-37813
* CVE-2025-38243
* CVE-2025-38322
* CVE-2025-38379
* CVE-2025-38539
* CVE-2025-39689
* CVE-2025-39813
* CVE-2025-39829
* CVE-2025-39913
* CVE-2025-40097
* CVE-2025-40202
* CVE-2025-40257
* CVE-2025-40259
* CVE-2025-68284
* CVE-2025-68285
* CVE-2025-68775
* CVE-2025-68804
* CVE-2025-68808
* CVE-2025-68813
* CVE-2025-68819
* CVE-2025-71078
* CVE-2025-71081
* CVE-2025-71083
* CVE-2025-71085
* CVE-2025-71089
* CVE-2025-71111
* CVE-2025-71112
* CVE-2025-71120
* CVE-2025-71136
* CVE-2025-71147
* CVE-2026-22999
* CVE-2026-23001
* CVE-2026-23010
CVSS scores:
* CVE-2023-53714 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53149 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-53149 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53149 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22047 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22047 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37813 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37813 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38243 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38243 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38322 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-38322 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-38322 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38379 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38379 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38539 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38539 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39689 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39813 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40097 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40202 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68284 ( SUSE ): 7.0
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68284 ( SUSE ): 7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-68285 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68285 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68775 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68775 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68804 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68804 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68813 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68813 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71081 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71081 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71083 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71085 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71085 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71089 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71089 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71111 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71112 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71112 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71120 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71147 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71147 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22999 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23001 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23001 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23010 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves 38 vulnerabilities, contains 12 features and has 15
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 kernel was updated to fix various security
issues
The following security issues were fixed:
* CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).
* CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845).
* CVE-2025-68284: libceph: prevent potential out-of-bounds writes in
handle_auth_session_key() (bsc#1255377).
* CVE-2025-68285: libceph: fix potential use-after-free in
have_mon_and_osd_map() (bsc#1255401).
* CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket
(bsc#1256665).
* CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path
(bsc#1256641).
* CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of
calipso_skbuff_setattr() (bsc#1256623).
* CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
* CVE-2025-71112: net: hns3: add VLAN id validation before using
(bsc#1256726).
* CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
gss_token in gss_read_proxy_verf (bsc#1256779).
* CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
qfq_change_class() (bsc#1257236).
* CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source()
(bsc#1257232).
* CVE-2026-23010: ipv6: Fix use-after-free in inet6_addr_del() (bsc#1257332).
The following non security issues were fixed:
* bpf/selftests: test_select_reuseport_kern: Remove unused header
(bsc#1257603).
* btrfs: do not strictly require dirty metadata threshold for metadata
writepages (stable-fixes).
* cifs: Fix copy offload to flush destination region (bsc#1252511).
* cifs: Fix flushing, invalidation and file size with copy_file_range()
(bsc#1252511).
* cifs: add new field to track the last access time of cfid (git-fixes).
* ext4: use optimized mballoc scanning regardless of inode format
(bsc#1254378).
* ice: use netif_get_num_default_rss_queues() (bsc#1247712).
* mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations
(bsc#1253087).
* net: hv_netvsc: reject RSS hash key programming without RX indirection table
(bsc#1257473).
* net: tcp: allow zero-window ACK update the window (bsc#1254767).
* sched: Increase sched_tick_remote timeout (bsc#1254510).
* scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).
* smb: change return type of cached_dir_lease_break() to bool (git-fixes).
* smb: client: ensure open_cached_dir_by_dentry() only returns valid cfid
(git-fixes).
* smb: client: remove unused fid_lock (git-fixes).
* smb: client: short-circuit in open_cached_dir_by_dentry() if !dentry (git-
fixes).
* smb: client: split cached_fid bitfields to avoid shared-byte RMW races
(bsc#1250748).
* smb: client: update cfid->last_access_time in open_cached_dir_by_dentry()
(git-fixes).
* smb: improve directory cache reuse for readdir operations (bsc#1252712).
* x86: make page fault handling disable interrupts properly (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-471=1 openSUSE-SLE-15.6-2026-471=1
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2026-471=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-471=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-471=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-471=1
## Package List:
* openSUSE Leap 15.6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (noarch)
* kernel-source-6.4.0-150600.23.87.1
* kernel-source-vanilla-6.4.0-150600.23.87.1
* kernel-macros-6.4.0-150600.23.87.1
* kernel-docs-html-6.4.0-150600.23.87.1
* kernel-devel-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (nosrc ppc64le x86_64)
* kernel-debug-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (ppc64le x86_64)
* kernel-debug-debuginfo-6.4.0-150600.23.87.1
* kernel-debug-devel-debuginfo-6.4.0-150600.23.87.1
* kernel-debug-devel-6.4.0-150600.23.87.1
* kernel-debug-debugsource-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (x86_64)
* kernel-default-vdso-debuginfo-6.4.0-150600.23.87.1
* kernel-default-vdso-6.4.0-150600.23.87.1
* kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.87.1
* kernel-kvmsmall-vdso-6.4.0-150600.23.87.1
* kernel-debug-vdso-debuginfo-6.4.0-150600.23.87.1
* kernel-debug-vdso-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-6.4.0-150600.23.87.1
* kernel-default-base-6.4.0-150600.23.87.1.150600.12.40.1
* kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.87.1
* kernel-default-base-rebuild-6.4.0-150600.23.87.1.150600.12.40.1
* kernel-kvmsmall-debuginfo-6.4.0-150600.23.87.1
* kernel-kvmsmall-debugsource-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kernel-default-extra-6.4.0-150600.23.87.1
* ocfs2-kmp-default-6.4.0-150600.23.87.1
* reiserfs-kmp-default-6.4.0-150600.23.87.1
* dlm-kmp-default-6.4.0-150600.23.87.1
* kernel-default-debuginfo-6.4.0-150600.23.87.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-livepatch-6.4.0-150600.23.87.1
* kernel-obs-build-6.4.0-150600.23.87.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.87.1
* kernel-obs-build-debugsource-6.4.0-150600.23.87.1
* gfs2-kmp-default-6.4.0-150600.23.87.1
* kernel-default-extra-debuginfo-6.4.0-150600.23.87.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.87.1
* dlm-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-debugsource-6.4.0-150600.23.87.1
* kernel-default-optional-6.4.0-150600.23.87.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-syms-6.4.0-150600.23.87.1
* kselftests-kmp-default-6.4.0-150600.23.87.1
* kselftests-kmp-default-debuginfo-6.4.0-150600.23.87.1
* cluster-md-kmp-default-6.4.0-150600.23.87.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-devel-6.4.0-150600.23.87.1
* kernel-obs-qa-6.4.0-150600.23.87.1
* kernel-default-optional-debuginfo-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_20-debugsource-1-150600.13.3.1
* kernel-default-livepatch-devel-6.4.0-150600.23.87.1
* kernel-livepatch-6_4_0-150600_23_87-default-debuginfo-1-150600.13.3.1
* kernel-livepatch-6_4_0-150600_23_87-default-1-150600.13.3.1
* openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.87.1
* kernel-zfcpdump-debugsource-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (nosrc)
* dtb-aarch64-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (aarch64)
* dtb-amlogic-6.4.0-150600.23.87.1
* kernel-64kb-devel-6.4.0-150600.23.87.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.87.1
* kernel-64kb-debugsource-6.4.0-150600.23.87.1
* kernel-64kb-debuginfo-6.4.0-150600.23.87.1
* dtb-marvell-6.4.0-150600.23.87.1
* dtb-mediatek-6.4.0-150600.23.87.1
* dtb-broadcom-6.4.0-150600.23.87.1
* dtb-nvidia-6.4.0-150600.23.87.1
* gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.87.1
* cluster-md-kmp-64kb-6.4.0-150600.23.87.1
* kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.87.1
* gfs2-kmp-64kb-6.4.0-150600.23.87.1
* dtb-qcom-6.4.0-150600.23.87.1
* dtb-freescale-6.4.0-150600.23.87.1
* dtb-amazon-6.4.0-150600.23.87.1
* dtb-hisilicon-6.4.0-150600.23.87.1
* kernel-64kb-optional-debuginfo-6.4.0-150600.23.87.1
* dlm-kmp-64kb-6.4.0-150600.23.87.1
* dtb-lg-6.4.0-150600.23.87.1
* dtb-renesas-6.4.0-150600.23.87.1
* cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.87.1
* dtb-apm-6.4.0-150600.23.87.1
* dtb-altera-6.4.0-150600.23.87.1
* dtb-amd-6.4.0-150600.23.87.1
* reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.87.1
* dtb-sprd-6.4.0-150600.23.87.1
* kernel-64kb-extra-debuginfo-6.4.0-150600.23.87.1
* dtb-allwinner-6.4.0-150600.23.87.1
* dtb-socionext-6.4.0-150600.23.87.1
* ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.87.1
* dtb-cavium-6.4.0-150600.23.87.1
* kernel-64kb-extra-6.4.0-150600.23.87.1
* kernel-64kb-optional-6.4.0-150600.23.87.1
* dtb-apple-6.4.0-150600.23.87.1
* ocfs2-kmp-64kb-6.4.0-150600.23.87.1
* dtb-exynos-6.4.0-150600.23.87.1
* dtb-xilinx-6.4.0-150600.23.87.1
* dlm-kmp-64kb-debuginfo-6.4.0-150600.23.87.1
* kselftests-kmp-64kb-6.4.0-150600.23.87.1
* reiserfs-kmp-64kb-6.4.0-150600.23.87.1
* dtb-rockchip-6.4.0-150600.23.87.1
* dtb-arm-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.87.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.87.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* kernel-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-debugsource-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* dlm-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.87.1
* kernel-default-debugsource-6.4.0-150600.23.87.1
* cluster-md-kmp-default-6.4.0-150600.23.87.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-devel-6.4.0-150600.23.87.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-obs-build-debugsource-6.4.0-150600.23.87.1
* gfs2-kmp-default-6.4.0-150600.23.87.1
* ocfs2-kmp-default-6.4.0-150600.23.87.1
* reiserfs-kmp-default-6.4.0-150600.23.87.1
* dlm-kmp-default-6.4.0-150600.23.87.1
* kernel-default-debuginfo-6.4.0-150600.23.87.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-syms-6.4.0-150600.23.87.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-obs-build-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64)
* kernel-64kb-devel-6.4.0-150600.23.87.1
* kernel-64kb-debuginfo-6.4.0-150600.23.87.1
* kernel-64kb-debugsource-6.4.0-150600.23.87.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-6.4.0-150600.23.87.1.150600.12.40.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* kernel-devel-6.4.0-150600.23.87.1
* kernel-macros-6.4.0-150600.23.87.1
* kernel-source-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch nosrc)
* kernel-docs-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.87.1
* kernel-zfcpdump-debugsource-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* dlm-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-base-6.4.0-150600.23.87.1.150600.12.40.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.87.1
* kernel-default-debugsource-6.4.0-150600.23.87.1
* cluster-md-kmp-default-6.4.0-150600.23.87.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-devel-6.4.0-150600.23.87.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-obs-build-debugsource-6.4.0-150600.23.87.1
* gfs2-kmp-default-6.4.0-150600.23.87.1
* ocfs2-kmp-default-6.4.0-150600.23.87.1
* reiserfs-kmp-default-6.4.0-150600.23.87.1
* dlm-kmp-default-6.4.0-150600.23.87.1
* kernel-default-debuginfo-6.4.0-150600.23.87.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-syms-6.4.0-150600.23.87.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-obs-build-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (nosrc ppc64le
x86_64)
* kernel-default-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* kernel-devel-6.4.0-150600.23.87.1
* kernel-macros-6.4.0-150600.23.87.1
* kernel-source-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-6.4.0-150600.23.87.1
* kernel-default-debugsource-6.4.0-150600.23.87.1
* kernel-default-debuginfo-6.4.0-150600.23.87.1
* kernel-livepatch-6_4_0-150600_23_87-default-debuginfo-1-150600.13.3.1
* kernel-livepatch-SLE15-SP6_Update_20-debugsource-1-150600.13.3.1
* kernel-livepatch-6_4_0-150600_23_87-default-1-150600.13.3.1
* kernel-default-livepatch-6.4.0-150600.23.87.1
## References:
* https://www.suse.com/security/cve/CVE-2023-53714.html
* https://www.suse.com/security/cve/CVE-2024-42103.html
* https://www.suse.com/security/cve/CVE-2024-53070.html
* https://www.suse.com/security/cve/CVE-2024-53149.html
* https://www.suse.com/security/cve/CVE-2025-22047.html
* https://www.suse.com/security/cve/CVE-2025-37813.html
* https://www.suse.com/security/cve/CVE-2025-38243.html
* https://www.suse.com/security/cve/CVE-2025-38322.html
* https://www.suse.com/security/cve/CVE-2025-38379.html
* https://www.suse.com/security/cve/CVE-2025-38539.html
* https://www.suse.com/security/cve/CVE-2025-39689.html
* https://www.suse.com/security/cve/CVE-2025-39813.html
* https://www.suse.com/security/cve/CVE-2025-39829.html
* https://www.suse.com/security/cve/CVE-2025-39913.html
* https://www.suse.com/security/cve/CVE-2025-40097.html
* https://www.suse.com/security/cve/CVE-2025-40202.html
* https://www.suse.com/security/cve/CVE-2025-40257.html
* https://www.suse.com/security/cve/CVE-2025-40259.html
* https://www.suse.com/security/cve/CVE-2025-68284.html
* https://www.suse.com/security/cve/CVE-2025-68285.html
* https://www.suse.com/security/cve/CVE-2025-68775.html
* https://www.suse.com/security/cve/CVE-2025-68804.html
* https://www.suse.com/security/cve/CVE-2025-68808.html
* https://www.suse.com/security/cve/CVE-2025-68813.html
* https://www.suse.com/security/cve/CVE-2025-68819.html
* https://www.suse.com/security/cve/CVE-2025-71078.html
* https://www.suse.com/security/cve/CVE-2025-71081.html
* https://www.suse.com/security/cve/CVE-2025-71083.html
* https://www.suse.com/security/cve/CVE-2025-71085.html
* https://www.suse.com/security/cve/CVE-2025-71089.html
* https://www.suse.com/security/cve/CVE-2025-71111.html
* https://www.suse.com/security/cve/CVE-2025-71112.html
* https://www.suse.com/security/cve/CVE-2025-71120.html
* https://www.suse.com/security/cve/CVE-2025-71136.html
* https://www.suse.com/security/cve/CVE-2025-71147.html
* https://www.suse.com/security/cve/CVE-2026-22999.html
* https://www.suse.com/security/cve/CVE-2026-23001.html
* https://www.suse.com/security/cve/CVE-2026-23010.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228490
* https://bugzilla.suse.com/show_bug.cgi?id=1233563
* https://bugzilla.suse.com/show_bug.cgi?id=1234842
* https://bugzilla.suse.com/show_bug.cgi?id=1241437
* https://bugzilla.suse.com/show_bug.cgi?id=1242909
* https://bugzilla.suse.com/show_bug.cgi?id=1246184
* https://bugzilla.suse.com/show_bug.cgi?id=1246447
* https://bugzilla.suse.com/show_bug.cgi?id=1247030
* https://bugzilla.suse.com/show_bug.cgi?id=1247712
* https://bugzilla.suse.com/show_bug.cgi?id=1248211
* https://bugzilla.suse.com/show_bug.cgi?id=1249307
* https://bugzilla.suse.com/show_bug.cgi?id=1250032
* https://bugzilla.suse.com/show_bug.cgi?id=1250082
* https://bugzilla.suse.com/show_bug.cgi?id=1250705
* https://bugzilla.suse.com/show_bug.cgi?id=1250748
* https://bugzilla.suse.com/show_bug.cgi?id=1252511
* https://bugzilla.suse.com/show_bug.cgi?id=1252712
* https://bugzilla.suse.com/show_bug.cgi?id=1252900
* https://bugzilla.suse.com/show_bug.cgi?id=1253087
* https://bugzilla.suse.com/show_bug.cgi?id=1253451
* https://bugzilla.suse.com/show_bug.cgi?id=1254378
* https://bugzilla.suse.com/show_bug.cgi?id=1254447
* https://bugzilla.suse.com/show_bug.cgi?id=1254465
* https://bugzilla.suse.com/show_bug.cgi?id=1254510
* https://bugzilla.suse.com/show_bug.cgi?id=1254767
* https://bugzilla.suse.com/show_bug.cgi?id=1254842
* https://bugzilla.suse.com/show_bug.cgi?id=1254845
* https://bugzilla.suse.com/show_bug.cgi?id=1255377
* https://bugzilla.suse.com/show_bug.cgi?id=1255401
* https://bugzilla.suse.com/show_bug.cgi?id=1256528
* https://bugzilla.suse.com/show_bug.cgi?id=1256609
* https://bugzilla.suse.com/show_bug.cgi?id=1256610
* https://bugzilla.suse.com/show_bug.cgi?id=1256612
* https://bugzilla.suse.com/show_bug.cgi?id=1256616
* https://bugzilla.suse.com/show_bug.cgi?id=1256617
* https://bugzilla.suse.com/show_bug.cgi?id=1256623
* https://bugzilla.suse.com/show_bug.cgi?id=1256641
* https://bugzilla.suse.com/show_bug.cgi?id=1256664
* https://bugzilla.suse.com/show_bug.cgi?id=1256665
* https://bugzilla.suse.com/show_bug.cgi?id=1256682
* https://bugzilla.suse.com/show_bug.cgi?id=1256726
* https://bugzilla.suse.com/show_bug.cgi?id=1256728
* https://bugzilla.suse.com/show_bug.cgi?id=1256759
* https://bugzilla.suse.com/show_bug.cgi?id=1256779
* https://bugzilla.suse.com/show_bug.cgi?id=1256792
* https://bugzilla.suse.com/show_bug.cgi?id=1257154
* https://bugzilla.suse.com/show_bug.cgi?id=1257158
* https://bugzilla.suse.com/show_bug.cgi?id=1257232
* https://bugzilla.suse.com/show_bug.cgi?id=1257236
* https://bugzilla.suse.com/show_bug.cgi?id=1257296
* https://bugzilla.suse.com/show_bug.cgi?id=1257332
* https://bugzilla.suse.com/show_bug.cgi?id=1257473
* https://bugzilla.suse.com/show_bug.cgi?id=1257603
* https://jira.suse.com/browse/PED-3527
* https://jira.suse.com/browse/PED-5065
* https://jira.suse.com/browse/PED-5475
* https://jira.suse.com/browse/PED-5477
* https://jira.suse.com/browse/PED-5511
* https://jira.suse.com/browse/PED-6041
* https://jira.suse.com/browse/PED-6068
* https://jira.suse.com/browse/PED-6069
* https://jira.suse.com/browse/PED-6070
* https://jira.suse.com/browse/PED-6071
* https://jira.suse.com/browse/PED-6116
* https://jira.suse.com/browse/PED-6120
SUSE-SU-2026:0474-1: important: Security update for the Linux Kernel
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2026:0474-1
Release Date: 2026-02-12T11:28:52Z
Rating: important
References:
* bsc#1220137
* bsc#1220144
* bsc#1222323
* bsc#1223007
* bsc#1225049
* bsc#1233038
* bsc#1235905
* bsc#1236104
* bsc#1236208
* bsc#1237885
* bsc#1237906
* bsc#1238414
* bsc#1238754
* bsc#1238763
* bsc#1244758
* bsc#1244904
* bsc#1245110
* bsc#1245210
* bsc#1245723
* bsc#1245751
* bsc#1247177
* bsc#1247483
* bsc#1248306
* bsc#1248377
* bsc#1249156
* bsc#1249158
* bsc#1249827
* bsc#1252785
* bsc#1253028
* bsc#1253087
* bsc#1253409
* bsc#1253702
* bsc#1254447
* bsc#1254462
* bsc#1254463
* bsc#1254464
* bsc#1254465
* bsc#1254767
* bsc#1254842
* bsc#1255171
* bsc#1255251
* bsc#1255377
* bsc#1255401
* bsc#1255594
* bsc#1255908
* bsc#1256095
* bsc#1256582
* bsc#1256612
* bsc#1256623
* bsc#1256641
* bsc#1256726
* bsc#1256744
* bsc#1256779
* bsc#1256792
* bsc#1257232
* bsc#1257236
* bsc#1257296
* bsc#1257473
Cross-References:
* CVE-2022-49604
* CVE-2022-49943
* CVE-2022-49980
* CVE-2022-50232
* CVE-2022-50697
* CVE-2023-52433
* CVE-2023-52874
* CVE-2023-52923
* CVE-2023-53178
* CVE-2023-53407
* CVE-2023-53412
* CVE-2023-53417
* CVE-2023-53418
* CVE-2023-53714
* CVE-2023-54142
* CVE-2023-54243
* CVE-2024-26581
* CVE-2024-26661
* CVE-2024-26832
* CVE-2024-50143
* CVE-2024-54031
* CVE-2025-21658
* CVE-2025-21760
* CVE-2025-21764
* CVE-2025-21765
* CVE-2025-21766
* CVE-2025-38068
* CVE-2025-38129
* CVE-2025-38159
* CVE-2025-38375
* CVE-2025-38563
* CVE-2025-38565
* CVE-2025-38684
* CVE-2025-40044
* CVE-2025-40139
* CVE-2025-40257
* CVE-2025-40300
* CVE-2025-68183
* CVE-2025-68284
* CVE-2025-68285
* CVE-2025-68312
* CVE-2025-68771
* CVE-2025-68813
* CVE-2025-71085
* CVE-2025-71089
* CVE-2025-71112
* CVE-2025-71116
* CVE-2025-71120
* CVE-2026-22999
* CVE-2026-23001
CVSS scores:
* CVE-2022-49604 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49604 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49604 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49943 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49943 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-49943 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49980 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49980 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50697 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50697 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52433 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52433 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52874 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
* CVE-2023-52874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52923 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53178 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53407 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53407 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53407 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53412 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53417 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53417 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53417 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53418 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53418 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53714 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54243 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54243 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-26581 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26832 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50143 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50143 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-54031 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21658 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21766 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38068 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38068 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38159 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38159 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38375 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38375 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38375 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38563 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-38563 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38565 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38565 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38565 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40044 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40044 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-40139 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40300 ( SUSE ): 8.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2025-40300 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2025-40300 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68183 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68183 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68284 ( SUSE ): 7.0
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68284 ( SUSE ): 7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-68285 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68285 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68312 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68771 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68813 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68813 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71085 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71085 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71089 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71089 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71112 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71112 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71116 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71116 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-71120 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22999 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23001 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23001 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 50 vulnerabilities and has eight security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP5 kernel was updated to fix various security
issues
The following security issues were fixed:
* CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant
uninit (bsc#1255594).
* CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
(bsc#1256095).
* CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free
(bsc#1255908).
* CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210).
* CVE-2025-38129: page_pool: fix inconsistency for page_pool_ring_lock()
(bsc#1245723).
* CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out
of bounds (bsc#1245751).
* CVE-2025-38375: virtio-net: ensure the received length does not exceed
allocated size (bsc#1247177).
* CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).
* CVE-2025-40300: Documentation/hw-vuln: Add VMSCAPE documentation
(bsc#1247483).
* CVE-2025-68183: ima: don't clear IMA_DIGSIG flag when setting or removing
non-IMA xattr (bsc#1255251).
* CVE-2025-68284: libceph: prevent potential out-of-bounds writes in
handle_auth_session_key() (bsc#1255377).
* CVE-2025-68285: libceph: fix potential use-after-free in
have_mon_and_osd_map() (bsc#1255401).
* CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171).
* CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain
(bsc#1256582).
* CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path
(bsc#1256641).
* CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of
calipso_skbuff_setattr() (bsc#1256623).
* CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
* CVE-2025-71112: net: hns3: add VLAN id validation before using
(bsc#1256726).
* CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted
osdmaps (bsc#1256744).
* CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
gss_token in gss_read_proxy_verf (bsc#1256779).
* CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
qfq_change_class() (bsc#1257236).
* CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source()
(bsc#1257232).
The following non security issues were fixed:
* mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations
(bsc#1253087).
* net: hv_netvsc: reject RSS hash key programming without RX indirection table
(bsc#1257473).
* net: tcp: allow zero-window ACK update the window (bsc#1254767).
* net: tcp: send zero-window ACK when no memory (bsc#1254767).
* scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).
* tcp: correct handling of extreme memory squeeze (bsc#1254767).
* x86: make page fault handling disable interrupts properly (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-474=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-474=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-474=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-474=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-474=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-474=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-474=1
## Package List:
* openSUSE Leap 15.5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (noarch)
* kernel-source-vanilla-5.14.21-150500.55.136.1
* kernel-macros-5.14.21-150500.55.136.1
* kernel-source-5.14.21-150500.55.136.1
* kernel-docs-html-5.14.21-150500.55.136.1
* kernel-devel-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.136.1
* kernel-kvmsmall-debuginfo-5.14.21-150500.55.136.1
* kernel-kvmsmall-debugsource-5.14.21-150500.55.136.1
* kernel-default-base-rebuild-5.14.21-150500.55.136.1.150500.6.67.1
* kernel-default-base-5.14.21-150500.55.136.1.150500.6.67.1
* kernel-kvmsmall-devel-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kselftests-kmp-default-5.14.21-150500.55.136.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.136.1
* kernel-default-devel-5.14.21-150500.55.136.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.136.1
* dlm-kmp-default-5.14.21-150500.55.136.1
* kernel-default-debuginfo-5.14.21-150500.55.136.1
* kernel-obs-build-5.14.21-150500.55.136.1
* kernel-default-extra-debuginfo-5.14.21-150500.55.136.1
* gfs2-kmp-default-5.14.21-150500.55.136.1
* kernel-default-optional-debuginfo-5.14.21-150500.55.136.1
* ocfs2-kmp-default-5.14.21-150500.55.136.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-5.14.21-150500.55.136.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* kernel-syms-5.14.21-150500.55.136.1
* kernel-default-optional-5.14.21-150500.55.136.1
* kernel-default-livepatch-5.14.21-150500.55.136.1
* reiserfs-kmp-default-5.14.21-150500.55.136.1
* kernel-obs-build-debugsource-5.14.21-150500.55.136.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.136.1
* kernel-default-extra-5.14.21-150500.55.136.1
* kernel-obs-qa-5.14.21-150500.55.136.1
* kselftests-kmp-default-debuginfo-5.14.21-150500.55.136.1
* kernel-default-debugsource-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-5.14.21-150500.55.136.1
* kernel-livepatch-SLE15-SP5_Update_35-debugsource-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_136-default-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_136-default-debuginfo-1-150500.11.3.1
* openSUSE Leap 15.5 (x86_64)
* kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.136.1
* kernel-default-vdso-debuginfo-5.14.21-150500.55.136.1
* kernel-default-vdso-5.14.21-150500.55.136.1
* kernel-kvmsmall-vdso-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150500.55.136.1
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (nosrc)
* dtb-aarch64-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (aarch64)
* dtb-lg-5.14.21-150500.55.136.1
* dtb-apm-5.14.21-150500.55.136.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.136.1
* dtb-freescale-5.14.21-150500.55.136.1
* dtb-cavium-5.14.21-150500.55.136.1
* kernel-64kb-devel-5.14.21-150500.55.136.1
* dtb-qcom-5.14.21-150500.55.136.1
* kernel-64kb-optional-5.14.21-150500.55.136.1
* dtb-rockchip-5.14.21-150500.55.136.1
* gfs2-kmp-64kb-5.14.21-150500.55.136.1
* kernel-64kb-debugsource-5.14.21-150500.55.136.1
* dtb-hisilicon-5.14.21-150500.55.136.1
* dtb-marvell-5.14.21-150500.55.136.1
* dtb-renesas-5.14.21-150500.55.136.1
* dlm-kmp-64kb-5.14.21-150500.55.136.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.136.1
* dtb-amlogic-5.14.21-150500.55.136.1
* reiserfs-kmp-64kb-5.14.21-150500.55.136.1
* dtb-sprd-5.14.21-150500.55.136.1
* dtb-broadcom-5.14.21-150500.55.136.1
* dlm-kmp-64kb-debuginfo-5.14.21-150500.55.136.1
* kselftests-kmp-64kb-5.14.21-150500.55.136.1
* dtb-allwinner-5.14.21-150500.55.136.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.136.1
* dtb-xilinx-5.14.21-150500.55.136.1
* kernel-64kb-optional-debuginfo-5.14.21-150500.55.136.1
* dtb-socionext-5.14.21-150500.55.136.1
* dtb-exynos-5.14.21-150500.55.136.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-64kb-5.14.21-150500.55.136.1
* kernel-64kb-extra-5.14.21-150500.55.136.1
* dtb-amazon-5.14.21-150500.55.136.1
* dtb-amd-5.14.21-150500.55.136.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.136.1
* ocfs2-kmp-64kb-5.14.21-150500.55.136.1
* kernel-64kb-debuginfo-5.14.21-150500.55.136.1
* dtb-arm-5.14.21-150500.55.136.1
* dtb-nvidia-5.14.21-150500.55.136.1
* dtb-altera-5.14.21-150500.55.136.1
* dtb-apple-5.14.21-150500.55.136.1
* dtb-mediatek-5.14.21-150500.55.136.1
* kernel-64kb-extra-debuginfo-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.136.1.150500.6.67.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.136.1
* kernel-default-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-macros-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* dlm-kmp-default-5.14.21-150500.55.136.1
* kernel-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-5.14.21-150500.55.136.1
* kernel-default-devel-5.14.21-150500.55.136.1
* kernel-obs-build-5.14.21-150500.55.136.1
* kernel-syms-5.14.21-150500.55.136.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* gfs2-kmp-default-5.14.21-150500.55.136.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.136.1
* ocfs2-kmp-default-5.14.21-150500.55.136.1
* kernel-default-base-5.14.21-150500.55.136.1.150500.6.67.1
* kernel-obs-build-debugsource-5.14.21-150500.55.136.1
* kernel-default-debugsource-5.14.21-150500.55.136.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
nosrc)
* kernel-64kb-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150500.55.136.1
* kernel-64kb-devel-5.14.21-150500.55.136.1
* kernel-64kb-debugsource-5.14.21-150500.55.136.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* kernel-source-5.14.21-150500.55.136.1
* kernel-devel-5.14.21-150500.55.136.1
* kernel-macros-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* dlm-kmp-default-5.14.21-150500.55.136.1
* kernel-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-5.14.21-150500.55.136.1
* kernel-default-devel-5.14.21-150500.55.136.1
* kernel-obs-build-5.14.21-150500.55.136.1
* kernel-syms-5.14.21-150500.55.136.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* gfs2-kmp-default-5.14.21-150500.55.136.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.136.1
* ocfs2-kmp-default-5.14.21-150500.55.136.1
* kernel-default-base-5.14.21-150500.55.136.1.150500.6.67.1
* kernel-obs-build-debugsource-5.14.21-150500.55.136.1
* kernel-default-debugsource-5.14.21-150500.55.136.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150500.55.136.1
* kernel-64kb-devel-5.14.21-150500.55.136.1
* kernel-64kb-debugsource-5.14.21-150500.55.136.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* kernel-source-5.14.21-150500.55.136.1
* kernel-devel-5.14.21-150500.55.136.1
* kernel-macros-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* dlm-kmp-default-5.14.21-150500.55.136.1
* kernel-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-5.14.21-150500.55.136.1
* kernel-default-devel-5.14.21-150500.55.136.1
* kernel-obs-build-5.14.21-150500.55.136.1
* kernel-syms-5.14.21-150500.55.136.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* reiserfs-kmp-default-5.14.21-150500.55.136.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* gfs2-kmp-default-5.14.21-150500.55.136.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.136.1
* ocfs2-kmp-default-5.14.21-150500.55.136.1
* kernel-obs-build-debugsource-5.14.21-150500.55.136.1
* kernel-default-debugsource-5.14.21-150500.55.136.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.136.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64)
* kernel-64kb-debuginfo-5.14.21-150500.55.136.1
* kernel-64kb-devel-5.14.21-150500.55.136.1
* kernel-64kb-debugsource-5.14.21-150500.55.136.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150500.55.136.1.150500.6.67.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* kernel-source-5.14.21-150500.55.136.1
* kernel-devel-5.14.21-150500.55.136.1
* kernel-macros-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150500.55.136.1
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* dlm-kmp-default-5.14.21-150500.55.136.1
* kernel-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-5.14.21-150500.55.136.1
* kernel-default-devel-5.14.21-150500.55.136.1
* kernel-obs-build-5.14.21-150500.55.136.1
* kernel-syms-5.14.21-150500.55.136.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* reiserfs-kmp-default-5.14.21-150500.55.136.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* gfs2-kmp-default-5.14.21-150500.55.136.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.136.1
* ocfs2-kmp-default-5.14.21-150500.55.136.1
* kernel-default-base-5.14.21-150500.55.136.1.150500.6.67.1
* kernel-obs-build-debugsource-5.14.21-150500.55.136.1
* kernel-default-debugsource-5.14.21-150500.55.136.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.136.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* kernel-source-5.14.21-150500.55.136.1
* kernel-devel-5.14.21-150500.55.136.1
* kernel-macros-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-default-debuginfo-5.14.21-150500.55.136.1
* kernel-default-livepatch-devel-5.14.21-150500.55.136.1
* kernel-livepatch-5_14_21-150500_55_136-default-debuginfo-1-150500.11.3.1
* kernel-default-livepatch-5.14.21-150500.55.136.1
* kernel-livepatch-5_14_21-150500_55_136-default-1-150500.11.3.1
* kernel-default-debugsource-5.14.21-150500.55.136.1
* kernel-livepatch-SLE15-SP5_Update_35-debugsource-1-150500.11.3.1
## References:
* https://www.suse.com/security/cve/CVE-2022-49604.html
* https://www.suse.com/security/cve/CVE-2022-49943.html
* https://www.suse.com/security/cve/CVE-2022-49980.html
* https://www.suse.com/security/cve/CVE-2022-50232.html
* https://www.suse.com/security/cve/CVE-2022-50697.html
* https://www.suse.com/security/cve/CVE-2023-52433.html
* https://www.suse.com/security/cve/CVE-2023-52874.html
* https://www.suse.com/security/cve/CVE-2023-52923.html
* https://www.suse.com/security/cve/CVE-2023-53178.html
* https://www.suse.com/security/cve/CVE-2023-53407.html
* https://www.suse.com/security/cve/CVE-2023-53412.html
* https://www.suse.com/security/cve/CVE-2023-53417.html
* https://www.suse.com/security/cve/CVE-2023-53418.html
* https://www.suse.com/security/cve/CVE-2023-53714.html
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2023-54243.html
* https://www.suse.com/security/cve/CVE-2024-26581.html
* https://www.suse.com/security/cve/CVE-2024-26661.html
* https://www.suse.com/security/cve/CVE-2024-26832.html
* https://www.suse.com/security/cve/CVE-2024-50143.html
* https://www.suse.com/security/cve/CVE-2024-54031.html
* https://www.suse.com/security/cve/CVE-2025-21658.html
* https://www.suse.com/security/cve/CVE-2025-21760.html
* https://www.suse.com/security/cve/CVE-2025-21764.html
* https://www.suse.com/security/cve/CVE-2025-21765.html
* https://www.suse.com/security/cve/CVE-2025-21766.html
* https://www.suse.com/security/cve/CVE-2025-38068.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://www.suse.com/security/cve/CVE-2025-38159.html
* https://www.suse.com/security/cve/CVE-2025-38375.html
* https://www.suse.com/security/cve/CVE-2025-38563.html
* https://www.suse.com/security/cve/CVE-2025-38565.html
* https://www.suse.com/security/cve/CVE-2025-38684.html
* https://www.suse.com/security/cve/CVE-2025-40044.html
* https://www.suse.com/security/cve/CVE-2025-40139.html
* https://www.suse.com/security/cve/CVE-2025-40257.html
* https://www.suse.com/security/cve/CVE-2025-40300.html
* https://www.suse.com/security/cve/CVE-2025-68183.html
* https://www.suse.com/security/cve/CVE-2025-68284.html
* https://www.suse.com/security/cve/CVE-2025-68285.html
* https://www.suse.com/security/cve/CVE-2025-68312.html
* https://www.suse.com/security/cve/CVE-2025-68771.html
* https://www.suse.com/security/cve/CVE-2025-68813.html
* https://www.suse.com/security/cve/CVE-2025-71085.html
* https://www.suse.com/security/cve/CVE-2025-71089.html
* https://www.suse.com/security/cve/CVE-2025-71112.html
* https://www.suse.com/security/cve/CVE-2025-71116.html
* https://www.suse.com/security/cve/CVE-2025-71120.html
* https://www.suse.com/security/cve/CVE-2026-22999.html
* https://www.suse.com/security/cve/CVE-2026-23001.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220137
* https://bugzilla.suse.com/show_bug.cgi?id=1220144
* https://bugzilla.suse.com/show_bug.cgi?id=1222323
* https://bugzilla.suse.com/show_bug.cgi?id=1223007
* https://bugzilla.suse.com/show_bug.cgi?id=1225049
* https://bugzilla.suse.com/show_bug.cgi?id=1233038
* https://bugzilla.suse.com/show_bug.cgi?id=1235905
* https://bugzilla.suse.com/show_bug.cgi?id=1236104
* https://bugzilla.suse.com/show_bug.cgi?id=1236208
* https://bugzilla.suse.com/show_bug.cgi?id=1237885
* https://bugzilla.suse.com/show_bug.cgi?id=1237906
* https://bugzilla.suse.com/show_bug.cgi?id=1238414
* https://bugzilla.suse.com/show_bug.cgi?id=1238754
* https://bugzilla.suse.com/show_bug.cgi?id=1238763
* https://bugzilla.suse.com/show_bug.cgi?id=1244758
* https://bugzilla.suse.com/show_bug.cgi?id=1244904
* https://bugzilla.suse.com/show_bug.cgi?id=1245110
* https://bugzilla.suse.com/show_bug.cgi?id=1245210
* https://bugzilla.suse.com/show_bug.cgi?id=1245723
* https://bugzilla.suse.com/show_bug.cgi?id=1245751
* https://bugzilla.suse.com/show_bug.cgi?id=1247177
* https://bugzilla.suse.com/show_bug.cgi?id=1247483
* https://bugzilla.suse.com/show_bug.cgi?id=1248306
* https://bugzilla.suse.com/show_bug.cgi?id=1248377
* https://bugzilla.suse.com/show_bug.cgi?id=1249156
* https://bugzilla.suse.com/show_bug.cgi?id=1249158
* https://bugzilla.suse.com/show_bug.cgi?id=1249827
* https://bugzilla.suse.com/show_bug.cgi?id=1252785
* https://bugzilla.suse.com/show_bug.cgi?id=1253028
* https://bugzilla.suse.com/show_bug.cgi?id=1253087
* https://bugzilla.suse.com/show_bug.cgi?id=1253409
* https://bugzilla.suse.com/show_bug.cgi?id=1253702
* https://bugzilla.suse.com/show_bug.cgi?id=1254447
* https://bugzilla.suse.com/show_bug.cgi?id=1254462
* https://bugzilla.suse.com/show_bug.cgi?id=1254463
* https://bugzilla.suse.com/show_bug.cgi?id=1254464
* https://bugzilla.suse.com/show_bug.cgi?id=1254465
* https://bugzilla.suse.com/show_bug.cgi?id=1254767
* https://bugzilla.suse.com/show_bug.cgi?id=1254842
* https://bugzilla.suse.com/show_bug.cgi?id=1255171
* https://bugzilla.suse.com/show_bug.cgi?id=1255251
* https://bugzilla.suse.com/show_bug.cgi?id=1255377
* https://bugzilla.suse.com/show_bug.cgi?id=1255401
* https://bugzilla.suse.com/show_bug.cgi?id=1255594
* https://bugzilla.suse.com/show_bug.cgi?id=1255908
* https://bugzilla.suse.com/show_bug.cgi?id=1256095
* https://bugzilla.suse.com/show_bug.cgi?id=1256582
* https://bugzilla.suse.com/show_bug.cgi?id=1256612
* https://bugzilla.suse.com/show_bug.cgi?id=1256623
* https://bugzilla.suse.com/show_bug.cgi?id=1256641
* https://bugzilla.suse.com/show_bug.cgi?id=1256726
* https://bugzilla.suse.com/show_bug.cgi?id=1256744
* https://bugzilla.suse.com/show_bug.cgi?id=1256779
* https://bugzilla.suse.com/show_bug.cgi?id=1256792
* https://bugzilla.suse.com/show_bug.cgi?id=1257232
* https://bugzilla.suse.com/show_bug.cgi?id=1257236
* https://bugzilla.suse.com/show_bug.cgi?id=1257296
* https://bugzilla.suse.com/show_bug.cgi?id=1257473
SUSE-SU-2026:0475-1: important: Security update for the Linux Kernel
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2026:0475-1
Release Date: 2026-02-12T11:32:57Z
Rating: important
References:
* bsc#1223007
* bsc#1235905
* bsc#1236104
* bsc#1237885
* bsc#1237906
* bsc#1238414
* bsc#1238754
* bsc#1238763
* bsc#1240284
* bsc#1244904
* bsc#1245110
* bsc#1245723
* bsc#1248306
* bsc#1248377
* bsc#1249699
* bsc#1249827
* bsc#1251201
* bsc#1253409
* bsc#1255171
* bsc#1255594
* bsc#1256612
* bsc#1256623
* bsc#1256726
* bsc#1256792
* bsc#1257232
* bsc#1257236
Cross-References:
* CVE-2022-49604
* CVE-2022-49943
* CVE-2022-49980
* CVE-2022-50329
* CVE-2022-50488
* CVE-2022-50697
* CVE-2023-52923
* CVE-2023-52983
* CVE-2023-53178
* CVE-2024-26832
* CVE-2024-54031
* CVE-2025-21760
* CVE-2025-21764
* CVE-2025-21765
* CVE-2025-21766
* CVE-2025-38129
* CVE-2025-38563
* CVE-2025-38565
* CVE-2025-40139
* CVE-2025-68312
* CVE-2025-71085
* CVE-2025-71089
* CVE-2025-71112
* CVE-2026-22999
* CVE-2026-23001
CVSS scores:
* CVE-2022-49604 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49604 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49604 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49943 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49943 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-49943 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49980 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49980 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50329 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50329 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50488 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50488 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50488 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50697 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50697 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52923 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53178 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26832 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54031 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21766 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38563 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-38563 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38565 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38565 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38565 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40139 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68312 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71085 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71085 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71089 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71089 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71112 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71112 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-22999 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23001 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23001 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
An update that solves 25 vulnerabilities and has one security fix can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP3 kernel was updated to fix various security
issues
The following security issues were fixed:
* CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant
uninit (bsc#1255594).
* CVE-2025-38129: page_pool: fix inconsistency for page_pool_ring_lock()
(bsc#1245723).
* CVE-2025-40139: net: ipv4: Consolidate ipv4_mtu and ip_dst_mtu_maybe_forward
(bsc#1253409).
* CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171).
* CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of
calipso_skbuff_setattr() (bsc#1256623).
* CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
* CVE-2025-71112: net: hns3: add VLAN id validation before using
(bsc#1256726).
* CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
qfq_change_class() (bsc#1257236).
* CVE-2026-23001: macvlan: Use 'hash' iterators to simplify code
(bsc#1257232).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-475=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-475=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-475=1
## Package List:
* openSUSE Leap 15.3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (noarch)
* kernel-devel-5.3.18-150300.59.235.1
* kernel-source-5.3.18-150300.59.235.1
* kernel-source-vanilla-5.3.18-150300.59.235.1
* kernel-macros-5.3.18-150300.59.235.1
* kernel-docs-html-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* kselftests-kmp-default-debuginfo-5.3.18-150300.59.235.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.235.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.235.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.235.1
* kernel-syms-5.3.18-150300.59.235.1
* kernel-default-extra-debuginfo-5.3.18-150300.59.235.1
* ocfs2-kmp-default-5.3.18-150300.59.235.1
* kernel-obs-build-5.3.18-150300.59.235.1
* kernel-default-debuginfo-5.3.18-150300.59.235.1
* kernel-default-optional-5.3.18-150300.59.235.1
* kernel-default-livepatch-5.3.18-150300.59.235.1
* kernel-default-devel-5.3.18-150300.59.235.1
* kernel-default-optional-debuginfo-5.3.18-150300.59.235.1
* kernel-default-debugsource-5.3.18-150300.59.235.1
* kernel-default-base-rebuild-5.3.18-150300.59.235.1.150300.18.140.1
* gfs2-kmp-default-5.3.18-150300.59.235.1
* reiserfs-kmp-default-5.3.18-150300.59.235.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.235.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.235.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.235.1
* cluster-md-kmp-default-5.3.18-150300.59.235.1
* kernel-default-base-5.3.18-150300.59.235.1.150300.18.140.1
* kernel-default-extra-5.3.18-150300.59.235.1
* kernel-obs-build-debugsource-5.3.18-150300.59.235.1
* kselftests-kmp-default-5.3.18-150300.59.235.1
* kernel-obs-qa-5.3.18-150300.59.235.1
* dlm-kmp-default-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (nosrc ppc64le x86_64)
* kernel-kvmsmall-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.235.1
* kernel-kvmsmall-devel-5.3.18-150300.59.235.1
* kernel-kvmsmall-debuginfo-5.3.18-150300.59.235.1
* kernel-kvmsmall-debugsource-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* dlm-kmp-preempt-debuginfo-5.3.18-150300.59.235.1
* ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.235.1
* ocfs2-kmp-preempt-5.3.18-150300.59.235.1
* gfs2-kmp-preempt-5.3.18-150300.59.235.1
* kernel-preempt-debugsource-5.3.18-150300.59.235.1
* reiserfs-kmp-preempt-5.3.18-150300.59.235.1
* reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.235.1
* kernel-preempt-extra-debuginfo-5.3.18-150300.59.235.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.235.1
* cluster-md-kmp-preempt-5.3.18-150300.59.235.1
* kernel-preempt-extra-5.3.18-150300.59.235.1
* cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.235.1
* kernel-preempt-devel-5.3.18-150300.59.235.1
* gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.235.1
* kernel-preempt-optional-debuginfo-5.3.18-150300.59.235.1
* kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.235.1
* dlm-kmp-preempt-5.3.18-150300.59.235.1
* kernel-preempt-debuginfo-5.3.18-150300.59.235.1
* kselftests-kmp-preempt-5.3.18-150300.59.235.1
* kernel-preempt-optional-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.235.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (nosrc)
* dtb-aarch64-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (aarch64)
* dtb-nvidia-5.3.18-150300.59.235.1
* dtb-amlogic-5.3.18-150300.59.235.1
* cluster-md-kmp-64kb-5.3.18-150300.59.235.1
* kernel-64kb-extra-5.3.18-150300.59.235.1
* dtb-marvell-5.3.18-150300.59.235.1
* dtb-altera-5.3.18-150300.59.235.1
* dtb-apm-5.3.18-150300.59.235.1
* reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.235.1
* dtb-rockchip-5.3.18-150300.59.235.1
* cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.235.1
* kernel-64kb-optional-debuginfo-5.3.18-150300.59.235.1
* kselftests-kmp-64kb-5.3.18-150300.59.235.1
* dtb-broadcom-5.3.18-150300.59.235.1
* kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.235.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.235.1
* dtb-lg-5.3.18-150300.59.235.1
* dtb-zte-5.3.18-150300.59.235.1
* kernel-64kb-debuginfo-5.3.18-150300.59.235.1
* dtb-al-5.3.18-150300.59.235.1
* gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.235.1
* dtb-renesas-5.3.18-150300.59.235.1
* dtb-amd-5.3.18-150300.59.235.1
* ocfs2-kmp-64kb-5.3.18-150300.59.235.1
* ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.235.1
* reiserfs-kmp-64kb-5.3.18-150300.59.235.1
* dtb-exynos-5.3.18-150300.59.235.1
* dtb-cavium-5.3.18-150300.59.235.1
* dlm-kmp-64kb-debuginfo-5.3.18-150300.59.235.1
* dtb-sprd-5.3.18-150300.59.235.1
* dtb-allwinner-5.3.18-150300.59.235.1
* dtb-freescale-5.3.18-150300.59.235.1
* dtb-socionext-5.3.18-150300.59.235.1
* dlm-kmp-64kb-5.3.18-150300.59.235.1
* dtb-mediatek-5.3.18-150300.59.235.1
* kernel-64kb-devel-5.3.18-150300.59.235.1
* dtb-arm-5.3.18-150300.59.235.1
* dtb-xilinx-5.3.18-150300.59.235.1
* dtb-qcom-5.3.18-150300.59.235.1
* kernel-64kb-extra-debuginfo-5.3.18-150300.59.235.1
* gfs2-kmp-64kb-5.3.18-150300.59.235.1
* kernel-64kb-debugsource-5.3.18-150300.59.235.1
* kernel-64kb-optional-5.3.18-150300.59.235.1
* dtb-hisilicon-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.235.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.235.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.235.1.150300.18.140.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.235.1
* kernel-default-debuginfo-5.3.18-150300.59.235.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.235.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.235.1.150300.18.140.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.235.1
* kernel-default-debuginfo-5.3.18-150300.59.235.1
## References:
* https://www.suse.com/security/cve/CVE-2022-49604.html
* https://www.suse.com/security/cve/CVE-2022-49943.html
* https://www.suse.com/security/cve/CVE-2022-49980.html
* https://www.suse.com/security/cve/CVE-2022-50329.html
* https://www.suse.com/security/cve/CVE-2022-50488.html
* https://www.suse.com/security/cve/CVE-2022-50697.html
* https://www.suse.com/security/cve/CVE-2023-52923.html
* https://www.suse.com/security/cve/CVE-2023-52983.html
* https://www.suse.com/security/cve/CVE-2023-53178.html
* https://www.suse.com/security/cve/CVE-2024-26832.html
* https://www.suse.com/security/cve/CVE-2024-54031.html
* https://www.suse.com/security/cve/CVE-2025-21760.html
* https://www.suse.com/security/cve/CVE-2025-21764.html
* https://www.suse.com/security/cve/CVE-2025-21765.html
* https://www.suse.com/security/cve/CVE-2025-21766.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://www.suse.com/security/cve/CVE-2025-38563.html
* https://www.suse.com/security/cve/CVE-2025-38565.html
* https://www.suse.com/security/cve/CVE-2025-40139.html
* https://www.suse.com/security/cve/CVE-2025-68312.html
* https://www.suse.com/security/cve/CVE-2025-71085.html
* https://www.suse.com/security/cve/CVE-2025-71089.html
* https://www.suse.com/security/cve/CVE-2025-71112.html
* https://www.suse.com/security/cve/CVE-2026-22999.html
* https://www.suse.com/security/cve/CVE-2026-23001.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223007
* https://bugzilla.suse.com/show_bug.cgi?id=1235905
* https://bugzilla.suse.com/show_bug.cgi?id=1236104
* https://bugzilla.suse.com/show_bug.cgi?id=1237885
* https://bugzilla.suse.com/show_bug.cgi?id=1237906
* https://bugzilla.suse.com/show_bug.cgi?id=1238414
* https://bugzilla.suse.com/show_bug.cgi?id=1238754
* https://bugzilla.suse.com/show_bug.cgi?id=1238763
* https://bugzilla.suse.com/show_bug.cgi?id=1240284
* https://bugzilla.suse.com/show_bug.cgi?id=1244904
* https://bugzilla.suse.com/show_bug.cgi?id=1245110
* https://bugzilla.suse.com/show_bug.cgi?id=1245723
* https://bugzilla.suse.com/show_bug.cgi?id=1248306
* https://bugzilla.suse.com/show_bug.cgi?id=1248377
* https://bugzilla.suse.com/show_bug.cgi?id=1249699
* https://bugzilla.suse.com/show_bug.cgi?id=1249827
* https://bugzilla.suse.com/show_bug.cgi?id=1251201
* https://bugzilla.suse.com/show_bug.cgi?id=1253409
* https://bugzilla.suse.com/show_bug.cgi?id=1255171
* https://bugzilla.suse.com/show_bug.cgi?id=1255594
* https://bugzilla.suse.com/show_bug.cgi?id=1256612
* https://bugzilla.suse.com/show_bug.cgi?id=1256623
* https://bugzilla.suse.com/show_bug.cgi?id=1256726
* https://bugzilla.suse.com/show_bug.cgi?id=1256792
* https://bugzilla.suse.com/show_bug.cgi?id=1257232
* https://bugzilla.suse.com/show_bug.cgi?id=1257236
SUSE-SU-2026:0476-1: important: Security update for python-azure-core
# Security update for python-azure-core
Announcement ID: SUSE-SU-2026:0476-1
Release Date: 2026-02-12T11:44:31Z
Rating: important
References:
* bsc#1257703
Cross-References:
* CVE-2026-21226
CVSS scores:
* CVE-2026-21226 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21226 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-21226 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Public Cloud Module 15-SP6
* Public Cloud Module 15-SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for python-azure-core fixes the following issues:
* CVE-2026-21226: Fixed deserialization of untrusted data which may allow an
authorized attacker to execute code over a network. (bsc#1257703)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2026-476=1
* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2026-476=1
* Public Cloud Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2026-476=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-476=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-476=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-476=1
## Package List:
* Public Cloud Module 15-SP5 (noarch)
* python311-azure-core-1.30.0-150400.11.6.1
* Public Cloud Module 15-SP6 (noarch)
* python311-azure-core-1.30.0-150400.11.6.1
* Public Cloud Module 15-SP7 (noarch)
* python311-azure-core-1.30.0-150400.11.6.1
* openSUSE Leap 15.4 (noarch)
* python311-azure-core-1.30.0-150400.11.6.1
* openSUSE Leap 15.6 (noarch)
* python311-azure-core-1.30.0-150400.11.6.1
* Public Cloud Module 15-SP4 (noarch)
* python311-azure-core-1.30.0-150400.11.6.1
## References:
* https://www.suse.com/security/cve/CVE-2026-21226.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257703
SUSE-SU-2026:0480-1: important: Security update for helm
# Security update for helm
Announcement ID: SUSE-SU-2026:0480-1
Release Date: 2026-02-12T15:35:52Z
Rating: important
References:
Affected Products:
* Containers Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7
An update that can now be installed.
## Description:
This update for helm rebuilds it against the current GO security release.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-480=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-480=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-480=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-480=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-480=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-480=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-480=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-480=1
* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-480=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-480=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-480=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-480=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-480=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-480=1
## Package List:
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* openSUSE Leap 15.6 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-fish-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* helm-bash-completion-3.19.1-150000.1.64.1
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* Containers Module 15-SP7 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Package Hub 15 15-SP7 (noarch)
* helm-fish-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
openSUSE-SU-2026:0045-1: moderate: Security update for assimp
openSUSE Security Update: Security update for assimp
_______________________________
Announcement ID: openSUSE-SU-2026:0045-1
Rating: moderate
References: #1241367
Cross-References: CVE-2025-3548
CVSS scores:
CVE-2025-3548 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________
An update that fixes one vulnerability is now available.
Description:
This update for assimp fixes the following issues:
- CVE-2025-3548: Fixed denial of service when processing malformed files
which may lead to an out-of-bounds read (boo#1241367).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2026-45=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le s390x x86_64):
assimp-devel-5.3.1-bp156.3.12.1
libassimp5-5.3.1-bp156.3.12.1
References:
https://www.suse.com/security/cve/CVE-2025-3548.html
https://bugzilla.suse.com/1241367