SUSE 5559 Published by

Several updates have been released for SUSE Linux, including security patches for various packages. Key updates include fixes for the Linux Kernel and important security updates for nvidia-modprobe.cuda and glib2. Additionally, there is a moderate update for assimp and multiple security updates for nodejs20, xorg-x11-server, and helm. The specific updates also cover issues with python-wheel, micropython, snpguest, rustup, sccache, libmunge2, and other packages.

SUSE-SU-2026:0459-1: important: Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda
SUSE-SU-2026:0457-1: important: Security update for nodejs20
SUSE-SU-2026:0456-1: important: Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda
SUSE-SU-2026:0458-1: important: Security update for glib2
SUSE-SU-2026:0460-1: important: Security update for python-wheel
openSUSE-SU-2026:0044-1: important: Security update for tcpreplay
openSUSE-SU-2026:20199-1: low: Security update for micropython
openSUSE-SU-2026:20198-1: important: Security update for xorg-x11-server
openSUSE-SU-2026:10182-1: moderate: snpguest-0.10.0-2.1 on GA media
openSUSE-SU-2026:10177-1: moderate: gnutls-3.8.12-1.1 on GA media
openSUSE-SU-2026:10180-1: moderate: rustup-1.28.2~0-3.1 on GA media
openSUSE-SU-2026:10181-1: moderate: sccache-0.13.0~1-2.1 on GA media
openSUSE-SU-2026:10178-1: moderate: libmunge2-0.5.18-1.1 on GA media
SUSE-SU-2026:0471-1: important: Security update for the Linux Kernel
SUSE-SU-2026:0474-1: important: Security update for the Linux Kernel
SUSE-SU-2026:0475-1: important: Security update for the Linux Kernel
SUSE-SU-2026:0476-1: important: Security update for python-azure-core
SUSE-SU-2026:0480-1: important: Security update for helm
openSUSE-SU-2026:0045-1: moderate: Security update for assimp




SUSE-SU-2026:0459-1: important: Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda


# Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed,
nvidia-persistenced.cuda

Announcement ID: SUSE-SU-2026:0459-1
Release Date: 2026-02-11T23:29:39Z
Rating: important
References:

* bsc#1254801
* bsc#1255858

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that has two security fixes can now be installed.

## Description:

This update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-
persistenced.cuda fixes the following issues:

Changes in nvidia-open-driver-G06-signed:

* updated CUDA variant to version 580.126.09

* update non-CUDA variant to version 580.126.09 (bsc#1255858)

* update non-CUDA variant to version 580.119.02 (bsc#1254801)

Changes in nvidia-persistenced.cuda:

* update to version 580.126.09

Changes in nvidia-modprobe.cuda:

* update to version 580.126.09

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-459=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-459=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-459=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-459=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-459=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-459=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-459=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-459=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-459=1

## Package List:

* openSUSE Leap 15.4 (aarch64 x86_64)
* nvidia-persistenced-debuginfo-580.126.09-150400.9.12.1
* nvidia-modprobe-debuginfo-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-modprobe-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150400.107.1
* nvidia-modprobe-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* openSUSE Leap 15.4 (noarch)
* nvidia-open-driver-G06-signed-cuda-check-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-check-580.126.09-150400.107.1
* openSUSE Leap 15.4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150400.107.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* nvidia-persistenced-debuginfo-580.126.09-150400.9.12.1
* nvidia-modprobe-debuginfo-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150400.107.1
* nvidia-modprobe-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nvidia-modprobe-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150400.107.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* nvidia-persistenced-debuginfo-580.126.09-150400.9.12.1
* nvidia-modprobe-debuginfo-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150400.107.1
* nvidia-modprobe-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nvidia-modprobe-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150400.107.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64)
* nvidia-persistenced-debuginfo-580.126.09-150400.9.12.1
* nvidia-modprobe-debuginfo-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150400.107.1
* nv-prefer-signed-open-driver-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150400.107.1
* nvidia-modprobe-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nvidia-modprobe-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150400.107.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* nvidia-modprobe-debuginfo-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150400.24.187-150400.107.1
* nvidia-persistenced-580.126.09-150400.9.12.1
* nvidia-persistenced-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150400.107.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150400.107.1
* nvidia-modprobe-580.126.09-150400.9.12.1
* nvidia-persistenced-debuginfo-580.126.09-150400.9.12.1
* nvidia-modprobe-debugsource-580.126.09-150400.9.12.1
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1

## References:

* https://bugzilla.suse.com/show_bug.cgi?id=1254801
* https://bugzilla.suse.com/show_bug.cgi?id=1255858



SUSE-SU-2026:0457-1: important: Security update for nodejs20


# Security update for nodejs20

Announcement ID: SUSE-SU-2026:0457-1
Release Date: 2026-02-11T22:21:24Z
Rating: important
References:

* bsc#1256569
* bsc#1256570
* bsc#1256571
* bsc#1256573
* bsc#1256574
* bsc#1256576
* bsc#1256848

Cross-References:

* CVE-2025-55130
* CVE-2025-55131
* CVE-2025-55132
* CVE-2025-59465
* CVE-2025-59466
* CVE-2026-21637
* CVE-2026-22036

CVSS scores:

* CVE-2025-55130 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55130 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55130 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-55130 ( NVD ): 7.1 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-55131 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55131 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55131 ( NVD ): 7.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
* CVE-2025-55132 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-55132 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-55132 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-55132 ( NVD ): 2.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
* CVE-2025-59465 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-59465 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59465 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59466 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-59466 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59466 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59466 ( NVD ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-21637 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-21637 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-21637 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-21637 ( NVD ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22036 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-22036 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22036 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22036 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves seven vulnerabilities can now be installed.

## Description:

This update for nodejs20 fixes the following issues:

* Update to 20.20.0:
* CVE-2026-22036: Updated undici to 6.23.0 (bsc#1256848)
* CVE-2025-59465: Add TLSSocket default error handler (bsc#1256573)
* CVE-2025-55132: Disable futimes when permission model is enabled
(bsc#1256571)
* CVE-2025-55130: Require full read and write to symlink APIs (bsc#1256569)
* CVE-2025-59466: Rethrow stack overflow exceptions in async_hooks
(bsc#1256574)
* CVE-2025-55131: Refactor unsafe buffer creation to remove zero-fill toggle
(bsc#1256570)
* CVE-2026-21637: Route callback exceptions through error handlers
(bsc#1256576)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-457=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-457=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-457=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-457=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-457=1

## Package List:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* nodejs20-debugsource-20.20.0-150500.11.24.1
* nodejs20-20.20.0-150500.11.24.1
* nodejs20-devel-20.20.0-150500.11.24.1
* nodejs20-debuginfo-20.20.0-150500.11.24.1
* npm20-20.20.0-150500.11.24.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* nodejs20-docs-20.20.0-150500.11.24.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* nodejs20-debugsource-20.20.0-150500.11.24.1
* nodejs20-20.20.0-150500.11.24.1
* nodejs20-devel-20.20.0-150500.11.24.1
* nodejs20-debuginfo-20.20.0-150500.11.24.1
* npm20-20.20.0-150500.11.24.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* nodejs20-docs-20.20.0-150500.11.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* nodejs20-debugsource-20.20.0-150500.11.24.1
* nodejs20-20.20.0-150500.11.24.1
* nodejs20-devel-20.20.0-150500.11.24.1
* nodejs20-debuginfo-20.20.0-150500.11.24.1
* npm20-20.20.0-150500.11.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* nodejs20-docs-20.20.0-150500.11.24.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* corepack20-20.20.0-150500.11.24.1
* nodejs20-debugsource-20.20.0-150500.11.24.1
* nodejs20-20.20.0-150500.11.24.1
* nodejs20-devel-20.20.0-150500.11.24.1
* nodejs20-debuginfo-20.20.0-150500.11.24.1
* npm20-20.20.0-150500.11.24.1
* openSUSE Leap 15.5 (noarch)
* nodejs20-docs-20.20.0-150500.11.24.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* nodejs20-debugsource-20.20.0-150500.11.24.1
* nodejs20-20.20.0-150500.11.24.1
* nodejs20-devel-20.20.0-150500.11.24.1
* nodejs20-debuginfo-20.20.0-150500.11.24.1
* npm20-20.20.0-150500.11.24.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* nodejs20-docs-20.20.0-150500.11.24.1

## References:

* https://www.suse.com/security/cve/CVE-2025-55130.html
* https://www.suse.com/security/cve/CVE-2025-55131.html
* https://www.suse.com/security/cve/CVE-2025-55132.html
* https://www.suse.com/security/cve/CVE-2025-59465.html
* https://www.suse.com/security/cve/CVE-2025-59466.html
* https://www.suse.com/security/cve/CVE-2026-21637.html
* https://www.suse.com/security/cve/CVE-2026-22036.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256569
* https://bugzilla.suse.com/show_bug.cgi?id=1256570
* https://bugzilla.suse.com/show_bug.cgi?id=1256571
* https://bugzilla.suse.com/show_bug.cgi?id=1256573
* https://bugzilla.suse.com/show_bug.cgi?id=1256574
* https://bugzilla.suse.com/show_bug.cgi?id=1256576
* https://bugzilla.suse.com/show_bug.cgi?id=1256848



SUSE-SU-2026:0456-1: important: Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda


# Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed,
nvidia-persistenced.cuda

Announcement ID: SUSE-SU-2026:0456-1
Release Date: 2026-02-11T22:21:03Z
Rating: important
References:

* bsc#1254801
* bsc#1255858

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that has two security fixes can now be installed.

## Description:

This update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-
persistenced.cuda fixes the following issues:

Changes in nvidia-open-driver-G06-signed:

* updated CUDA variant to version 580.126.09
* update non-CUDA variant to version 580.126.09 (bsc#1255858)
* update non-CUDA variant to version 580.119.02 (bsc#1254801)

Changes in nvidia-persistenced.cuda:

* update to version 580.126.09

Changes in nvidia-modprobe.cuda:

* update to version 580.126.09

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-456=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-456=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-456=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-456=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-456=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-456=1

## Package List:

* openSUSE Leap 15.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-debuginfo-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-modprobe-debugsource-580.126.09-150500.12.6.1
* nvidia-persistenced-debuginfo-580.126.09-150500.12.6.1
* nvidia-persistenced-debugsource-580.126.09-150500.12.6.1
* nvidia-persistenced-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-580.126.09-150500.12.6.1
* nv-prefer-signed-open-driver-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* openSUSE Leap 15.5 (noarch)
* nvidia-open-driver-G06-signed-cuda-check-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-check-580.126.09-150500.3.85.1
* openSUSE Leap 15.5 (aarch64)
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150500.3.85.1
* nv-prefer-signed-open-driver-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-debuginfo-580.126.09-150500.12.6.1
* nvidia-persistenced-debuginfo-580.126.09-150500.12.6.1
* nvidia-modprobe-debugsource-580.126.09-150500.12.6.1
* nvidia-persistenced-debugsource-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-persistenced-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-580.126.09-150500.12.6.1
* nv-prefer-signed-open-driver-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64)
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-debuginfo-580.126.09-150500.12.6.1
* nvidia-persistenced-debuginfo-580.126.09-150500.12.6.1
* nvidia-modprobe-debugsource-580.126.09-150500.12.6.1
* nvidia-persistenced-debugsource-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-persistenced-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-580.126.09-150500.12.6.1
* nv-prefer-signed-open-driver-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64)
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-debuginfo-580.126.09-150500.12.6.1
* nvidia-persistenced-debuginfo-580.126.09-150500.12.6.1
* nvidia-modprobe-debugsource-580.126.09-150500.12.6.1
* nvidia-persistenced-debugsource-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-persistenced-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-580.126.09-150500.12.6.1
* nv-prefer-signed-open-driver-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64)
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-debugsource-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-debuginfo-580.126.09-150500.12.6.1
* nvidia-persistenced-debuginfo-580.126.09-150500.12.6.1
* nvidia-modprobe-debugsource-580.126.09-150500.12.6.1
* nvidia-persistenced-debugsource-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1
* nvidia-persistenced-580.126.09-150500.12.6.1
* nvidia-open-driver-G06-signed-default-devel-580.126.09-150500.3.85.1
* nvidia-modprobe-580.126.09-150500.12.6.1
* nv-prefer-signed-open-driver-580.126.09-150500.3.85.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.126.09_k5.14.21_150500.55.133-150500.3.85.1

## References:

* https://bugzilla.suse.com/show_bug.cgi?id=1254801
* https://bugzilla.suse.com/show_bug.cgi?id=1255858



SUSE-SU-2026:0458-1: important: Security update for glib2


# Security update for glib2

Announcement ID: SUSE-SU-2026:0458-1
Release Date: 2026-02-11T23:29:09Z
Rating: important
References:

* bsc#1257049

Cross-References:

* CVE-2026-0988

CVSS scores:

* CVE-2026-0988 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0988 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-0988 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for glib2 fixes the following issues:

* CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to
integer wraparound in content type parsing (bsc#1257354).
* CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to
miscalculated buffer boundaries in the Base64 encoding routine
(bsc#1257355).
* CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds
access due to integer overflow in Unicode case conversion (bsc#1257353).
* CVE-2026-0988: Fixed a potential integer overflow in
g_buffered_input_stream_peek (bsc#1257049).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-458=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-458=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-458=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-458=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-458=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-458=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-458=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-458=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-458=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-458=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-458=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-458=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-458=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-458=1

## Package List:

* openSUSE Leap 15.4 (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* gio-branding-upstream-2.70.5-150400.3.34.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tests-devel-debuginfo-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* glib2-tests-devel-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* glib2-doc-2.70.5-150400.3.34.1
* glib2-devel-static-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* openSUSE Leap 15.4 (x86_64)
* glib2-devel-32bit-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* glib2-devel-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-32bit-2.70.5-150400.3.34.1
* glib2-tools-32bit-2.70.5-150400.3.34.1
* glib2-tools-32bit-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libgio-2_0-0-64bit-2.70.5-150400.3.34.1
* libgmodule-2_0-0-64bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-64bit-2.70.5-150400.3.34.1
* libglib-2_0-0-64bit-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-64bit-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-64bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-64bit-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-64bit-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-64bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-64bit-2.70.5-150400.3.34.1
* glib2-tools-64bit-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-64bit-2.70.5-150400.3.34.1
* glib2-tools-64bit-2.70.5-150400.3.34.1
* libgmodule-2_0-0-64bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64)
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64)
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libglib-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-debuginfo-2.70.5-150400.3.34.1
* glib2-devel-2.70.5-150400.3.34.1
* glib2-debugsource-2.70.5-150400.3.34.1
* libgobject-2_0-0-2.70.5-150400.3.34.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-2.70.5-150400.3.34.1
* glib2-devel-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.34.1
* libgio-2_0-0-2.70.5-150400.3.34.1
* libgmodule-2_0-0-2.70.5-150400.3.34.1
* glib2-tools-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* glib2-lang-2.70.5-150400.3.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* libgio-2_0-0-32bit-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.34.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1
* libglib-2_0-0-32bit-2.70.5-150400.3.34.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.34.1

## References:

* https://www.suse.com/security/cve/CVE-2026-0988.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257049



SUSE-SU-2026:0460-1: important: Security update for python-wheel


# Security update for python-wheel

Announcement ID: SUSE-SU-2026:0460-1
Release Date: 2026-02-11T23:30:24Z
Rating: important
References:

* bsc#1257100

Cross-References:

* CVE-2026-24049

CVSS scores:

* CVE-2026-24049 ( SUSE ): 7.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2026-24049 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-24049 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for python-wheel fixes the following issues:

* CVE-2026-24049: Fixed absent path sanitization can cause arbitrary file
permission modification (bsc#1257100).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-460=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-460=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-460=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-460=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-460=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-460=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-460=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-460=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-460=1

* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-460=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-460=1

## Package List:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* openSUSE Leap 15.4 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* openSUSE Leap 15.6 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* Public Cloud Module 15-SP4 (noarch)
* python311-wheel-0.40.0-150400.13.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python311-wheel-0.40.0-150400.13.10.1

## References:

* https://www.suse.com/security/cve/CVE-2026-24049.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257100



openSUSE-SU-2026:0044-1: important: Security update for tcpreplay


openSUSE Security Update: Security update for tcpreplay
_______________________________

Announcement ID: openSUSE-SU-2026:0044-1
Rating: important
References: #1218249 #1221324 #1222131 #1243845 #1247919
#1248322 #1248595 #1248596 #1248597 #1248964
#1250356
Cross-References: CVE-2023-4256 CVE-2023-43279 CVE-2024-22654
CVE-2024-3024 CVE-2025-51006 CVE-2025-8746
CVE-2025-9157 CVE-2025-9384 CVE-2025-9385
CVE-2025-9386 CVE-2025-9649
CVSS scores:
CVE-2024-22654 (SUSE): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CVE-2025-8746 (SUSE): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________

An update that fixes 11 vulnerabilities is now available.

Description:

This update for tcpreplay fixes the following issues:

- update to 4.5.2:
* features added since 4.4.4
- fix/recalculate header checksum for ipv6-frag
- IPv6 frag checksum support
- AF_XDP socket support
- tcpreplay -w (write into a pcap file)
- tcpreaplay --fixhdrlen
- --include and --exclude options
- SLL2 support
- Haiku support
* security fixes reported for 4.4.4 fixed in 4.5.2
- CVE-2023-4256 / boo#1218249
- CVE-2023-43279 / boo#1221324
- CVE-2024-3024 / boo#1222131 (likely)
- CVE-2024-22654 / boo#1243845
- CVE-2025-9157 / boo#1248322
- CVE-2025-9384 / boo#1248595
- CVE-2025-9385 / boo#1248596
- CVE-2025-9386 / boo#1248597
- CVE-2025-9649 / boo#1248964
- CVE-2025-51006 / boo#1250356
- see https://github.com/appneta/tcpreplay/compare/v4.4.4...v4.5.2 for
full changelog
- security fix for CVE-2025-8746 / boo#1247919

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP7:

zypper in -t patch openSUSE-2026-44=1

Package List:

- openSUSE Backports SLE-15-SP7 (aarch64 i586 ppc64le s390x x86_64):

tcpreplay-4.5.2-bp157.2.3.1

References:

https://www.suse.com/security/cve/CVE-2023-4256.html
https://www.suse.com/security/cve/CVE-2023-43279.html
https://www.suse.com/security/cve/CVE-2024-22654.html
https://www.suse.com/security/cve/CVE-2024-3024.html
https://www.suse.com/security/cve/CVE-2025-51006.html
https://www.suse.com/security/cve/CVE-2025-8746.html
https://www.suse.com/security/cve/CVE-2025-9157.html
https://www.suse.com/security/cve/CVE-2025-9384.html
https://www.suse.com/security/cve/CVE-2025-9385.html
https://www.suse.com/security/cve/CVE-2025-9386.html
https://www.suse.com/security/cve/CVE-2025-9649.html
https://bugzilla.suse.com/1218249
https://bugzilla.suse.com/1221324
https://bugzilla.suse.com/1222131
https://bugzilla.suse.com/1243845
https://bugzilla.suse.com/1247919
https://bugzilla.suse.com/1248322
https://bugzilla.suse.com/1248595
https://bugzilla.suse.com/1248596
https://bugzilla.suse.com/1248597
https://bugzilla.suse.com/1248964
https://bugzilla.suse.com/1250356



openSUSE-SU-2026:20199-1: low: Security update for micropython


openSUSE security update: security update for micropython
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20199-1
Rating: low
References:

* bsc#1257803

Cross-References:

* CVE-2026-1998

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for micropython fixes the following issues:

Changes in micropython:

- CVE-2026-1998: Fixed segmentation fault in `mp_map_lookup` via `mp_import_all` (bsc#1257803).

- Version 1.26.1
* esp32: update esp_tinyusb component to v1.7.6
* tools: add an environment variable MICROPY_MAINTAINER_BUILD
* esp32: add IDF Component Lockfiles to git repo
* shared/tinyusb: fix hang from new tx_overwritabe_if_not_connected flag
* shared/tinyusb/mp_usbd_cdc: rewrite USB CDC TX loop
* tools/mpremote: don't apply Espressif DTR/RTS quirk to TinyUSB CDC dev

- Fix building on single core systems
* Skip tests/thread/stress_schedule.py when single core system detected

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-packagehub-122=1

Package List:

- openSUSE Leap 16.0:

micropython-1.26.1-bp160.1.1
mpremote-1.26.1-bp160.1.1
mpy-tools-1.26.1-bp160.1.1

References:

* https://www.suse.com/security/cve/CVE-2026-1998.html



openSUSE-SU-2026:20198-1: important: Security update for xorg-x11-server


openSUSE security update: security update for xorg-x11-server
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20198-1
Rating: important
References:

* bsc#1251958
* bsc#1251959
* bsc#1251960

Cross-References:

* CVE-2025-62229
* CVE-2025-62230
* CVE-2025-62231

CVSS scores:

* CVE-2025-62229 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-62229 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-62230 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-62230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-62231 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-62231 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 3 vulnerabilities and has 3 bug fixes can now be installed.

Description:

This update for xorg-x11-server fixes the following issues:

- CVE-2025-62229: Fixed use-after-free in XPresentNotify structures creation (bsc#1251958).
- CVE-2025-62230: Fixed use-after-free in Xkb client resource removal (bsc#1251959).
- CVE-2025-62231: Fixed value overflow in Xkb extension XkbSetCompatMap() (bsc#1251960).

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-254=1

Package List:

- openSUSE Leap 16.0:

xorg-x11-server-21.1.15-160000.3.1
xorg-x11-server-Xvfb-21.1.15-160000.3.1
xorg-x11-server-extra-21.1.15-160000.3.1
xorg-x11-server-sdk-21.1.15-160000.3.1
xorg-x11-server-source-21.1.15-160000.3.1
xorg-x11-server-wrapper-21.1.15-160000.3.1

References:

* https://www.suse.com/security/cve/CVE-2025-62229.html
* https://www.suse.com/security/cve/CVE-2025-62230.html
* https://www.suse.com/security/cve/CVE-2025-62231.html



openSUSE-SU-2026:10182-1: moderate: snpguest-0.10.0-2.1 on GA media


# snpguest-0.10.0-2.1 on GA media

Announcement ID: openSUSE-SU-2026:10182-1
Rating: moderate

Cross-References:

* CVE-2026-25727

CVSS scores:

* CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the snpguest-0.10.0-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* snpguest 0.10.0-2.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25727.html



openSUSE-SU-2026:10177-1: moderate: gnutls-3.8.12-1.1 on GA media


# gnutls-3.8.12-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10177-1
Rating: moderate

Cross-References:

* CVE-2025-14831
* CVE-2026-1584

CVSS scores:

* CVE-2025-14831 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-14831 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-1584 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the gnutls-3.8.12-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* gnutls 3.8.12-1.1
* libgnutls-dane-devel 3.8.12-1.1
* libgnutls-dane0 3.8.12-1.1
* libgnutls-devel 3.8.12-1.1
* libgnutls-devel-32bit 3.8.12-1.1
* libgnutls-devel-doc 3.8.12-1.1
* libgnutls30 3.8.12-1.1
* libgnutls30-32bit 3.8.12-1.1
* libgnutlsxx-devel 3.8.12-1.1
* libgnutlsxx30 3.8.12-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-14831.html
* https://www.suse.com/security/cve/CVE-2026-1584.html



openSUSE-SU-2026:10180-1: moderate: rustup-1.28.2~0-3.1 on GA media


# rustup-1.28.2~0-3.1 on GA media

Announcement ID: openSUSE-SU-2026:10180-1
Rating: moderate

Cross-References:

* CVE-2026-25727

CVSS scores:

* CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the rustup-1.28.2~0-3.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* rustup 1.28.2~0-3.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25727.html



openSUSE-SU-2026:10181-1: moderate: sccache-0.13.0~1-2.1 on GA media


# sccache-0.13.0~1-2.1 on GA media

Announcement ID: openSUSE-SU-2026:10181-1
Rating: moderate

Cross-References:

* CVE-2026-25727

CVSS scores:

* CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the sccache-0.13.0~1-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* sccache 0.13.0~1-2.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25727.html



openSUSE-SU-2026:10178-1: moderate: libmunge2-0.5.18-1.1 on GA media


# libmunge2-0.5.18-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10178-1
Rating: moderate

Cross-References:

* CVE-2026-25506

CVSS scores:

* CVE-2026-25506 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the libmunge2-0.5.18-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libmunge2 0.5.18-1.1
* munge 0.5.18-1.1
* munge-devel 0.5.18-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25506.html



SUSE-SU-2026:0471-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2026:0471-1
Release Date: 2026-02-12T11:25:55Z
Rating: important
References:

* bsc#1228490
* bsc#1233563
* bsc#1234842
* bsc#1241437
* bsc#1242909
* bsc#1246184
* bsc#1246447
* bsc#1247030
* bsc#1247712
* bsc#1248211
* bsc#1249307
* bsc#1250032
* bsc#1250082
* bsc#1250705
* bsc#1250748
* bsc#1252511
* bsc#1252712
* bsc#1252900
* bsc#1253087
* bsc#1253451
* bsc#1254378
* bsc#1254447
* bsc#1254465
* bsc#1254510
* bsc#1254767
* bsc#1254842
* bsc#1254845
* bsc#1255377
* bsc#1255401
* bsc#1256528
* bsc#1256609
* bsc#1256610
* bsc#1256612
* bsc#1256616
* bsc#1256617
* bsc#1256623
* bsc#1256641
* bsc#1256664
* bsc#1256665
* bsc#1256682
* bsc#1256726
* bsc#1256728
* bsc#1256759
* bsc#1256779
* bsc#1256792
* bsc#1257154
* bsc#1257158
* bsc#1257232
* bsc#1257236
* bsc#1257296
* bsc#1257332
* bsc#1257473
* bsc#1257603
* jsc#PED-3527
* jsc#PED-5065
* jsc#PED-5475
* jsc#PED-5477
* jsc#PED-5511
* jsc#PED-6041
* jsc#PED-6068
* jsc#PED-6069
* jsc#PED-6070
* jsc#PED-6071
* jsc#PED-6116
* jsc#PED-6120

Cross-References:

* CVE-2023-53714
* CVE-2024-42103
* CVE-2024-53070
* CVE-2024-53149
* CVE-2025-22047
* CVE-2025-37813
* CVE-2025-38243
* CVE-2025-38322
* CVE-2025-38379
* CVE-2025-38539
* CVE-2025-39689
* CVE-2025-39813
* CVE-2025-39829
* CVE-2025-39913
* CVE-2025-40097
* CVE-2025-40202
* CVE-2025-40257
* CVE-2025-40259
* CVE-2025-68284
* CVE-2025-68285
* CVE-2025-68775
* CVE-2025-68804
* CVE-2025-68808
* CVE-2025-68813
* CVE-2025-68819
* CVE-2025-71078
* CVE-2025-71081
* CVE-2025-71083
* CVE-2025-71085
* CVE-2025-71089
* CVE-2025-71111
* CVE-2025-71112
* CVE-2025-71120
* CVE-2025-71136
* CVE-2025-71147
* CVE-2026-22999
* CVE-2026-23001
* CVE-2026-23010

CVSS scores:

* CVE-2023-53714 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53149 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-53149 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53149 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22047 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22047 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37813 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37813 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38243 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38243 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38322 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-38322 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-38322 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38379 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38379 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38539 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38539 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39689 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39813 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40097 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40202 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68284 ( SUSE ): 7.0
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68284 ( SUSE ): 7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-68285 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68285 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68775 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68775 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68804 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68804 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68813 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68813 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71081 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71081 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71083 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71085 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71085 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71089 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71089 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71111 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71112 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71112 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71120 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71147 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71147 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22999 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23001 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23001 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23010 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves 38 vulnerabilities, contains 12 features and has 15
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 kernel was updated to fix various security
issues

The following security issues were fixed:

* CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).
* CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845).
* CVE-2025-68284: libceph: prevent potential out-of-bounds writes in
handle_auth_session_key() (bsc#1255377).
* CVE-2025-68285: libceph: fix potential use-after-free in
have_mon_and_osd_map() (bsc#1255401).
* CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket
(bsc#1256665).
* CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path
(bsc#1256641).
* CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of
calipso_skbuff_setattr() (bsc#1256623).
* CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
* CVE-2025-71112: net: hns3: add VLAN id validation before using
(bsc#1256726).
* CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
gss_token in gss_read_proxy_verf (bsc#1256779).
* CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
qfq_change_class() (bsc#1257236).
* CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source()
(bsc#1257232).
* CVE-2026-23010: ipv6: Fix use-after-free in inet6_addr_del() (bsc#1257332).

The following non security issues were fixed:

* bpf/selftests: test_select_reuseport_kern: Remove unused header
(bsc#1257603).
* btrfs: do not strictly require dirty metadata threshold for metadata
writepages (stable-fixes).
* cifs: Fix copy offload to flush destination region (bsc#1252511).
* cifs: Fix flushing, invalidation and file size with copy_file_range()
(bsc#1252511).
* cifs: add new field to track the last access time of cfid (git-fixes).
* ext4: use optimized mballoc scanning regardless of inode format
(bsc#1254378).
* ice: use netif_get_num_default_rss_queues() (bsc#1247712).
* mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations
(bsc#1253087).
* net: hv_netvsc: reject RSS hash key programming without RX indirection table
(bsc#1257473).
* net: tcp: allow zero-window ACK update the window (bsc#1254767).
* sched: Increase sched_tick_remote timeout (bsc#1254510).
* scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).
* smb: change return type of cached_dir_lease_break() to bool (git-fixes).
* smb: client: ensure open_cached_dir_by_dentry() only returns valid cfid
(git-fixes).
* smb: client: remove unused fid_lock (git-fixes).
* smb: client: short-circuit in open_cached_dir_by_dentry() if !dentry (git-
fixes).
* smb: client: split cached_fid bitfields to avoid shared-byte RMW races
(bsc#1250748).
* smb: client: update cfid->last_access_time in open_cached_dir_by_dentry()
(git-fixes).
* smb: improve directory cache reuse for readdir operations (bsc#1252712).
* x86: make page fault handling disable interrupts properly (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-471=1 openSUSE-SLE-15.6-2026-471=1

* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2026-471=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-471=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-471=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-471=1

## Package List:

* openSUSE Leap 15.6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (noarch)
* kernel-source-6.4.0-150600.23.87.1
* kernel-source-vanilla-6.4.0-150600.23.87.1
* kernel-macros-6.4.0-150600.23.87.1
* kernel-docs-html-6.4.0-150600.23.87.1
* kernel-devel-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (nosrc ppc64le x86_64)
* kernel-debug-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (ppc64le x86_64)
* kernel-debug-debuginfo-6.4.0-150600.23.87.1
* kernel-debug-devel-debuginfo-6.4.0-150600.23.87.1
* kernel-debug-devel-6.4.0-150600.23.87.1
* kernel-debug-debugsource-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (x86_64)
* kernel-default-vdso-debuginfo-6.4.0-150600.23.87.1
* kernel-default-vdso-6.4.0-150600.23.87.1
* kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.87.1
* kernel-kvmsmall-vdso-6.4.0-150600.23.87.1
* kernel-debug-vdso-debuginfo-6.4.0-150600.23.87.1
* kernel-debug-vdso-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-6.4.0-150600.23.87.1
* kernel-default-base-6.4.0-150600.23.87.1.150600.12.40.1
* kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.87.1
* kernel-default-base-rebuild-6.4.0-150600.23.87.1.150600.12.40.1
* kernel-kvmsmall-debuginfo-6.4.0-150600.23.87.1
* kernel-kvmsmall-debugsource-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kernel-default-extra-6.4.0-150600.23.87.1
* ocfs2-kmp-default-6.4.0-150600.23.87.1
* reiserfs-kmp-default-6.4.0-150600.23.87.1
* dlm-kmp-default-6.4.0-150600.23.87.1
* kernel-default-debuginfo-6.4.0-150600.23.87.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-livepatch-6.4.0-150600.23.87.1
* kernel-obs-build-6.4.0-150600.23.87.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.87.1
* kernel-obs-build-debugsource-6.4.0-150600.23.87.1
* gfs2-kmp-default-6.4.0-150600.23.87.1
* kernel-default-extra-debuginfo-6.4.0-150600.23.87.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.87.1
* dlm-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-debugsource-6.4.0-150600.23.87.1
* kernel-default-optional-6.4.0-150600.23.87.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-syms-6.4.0-150600.23.87.1
* kselftests-kmp-default-6.4.0-150600.23.87.1
* kselftests-kmp-default-debuginfo-6.4.0-150600.23.87.1
* cluster-md-kmp-default-6.4.0-150600.23.87.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-devel-6.4.0-150600.23.87.1
* kernel-obs-qa-6.4.0-150600.23.87.1
* kernel-default-optional-debuginfo-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_20-debugsource-1-150600.13.3.1
* kernel-default-livepatch-devel-6.4.0-150600.23.87.1
* kernel-livepatch-6_4_0-150600_23_87-default-debuginfo-1-150600.13.3.1
* kernel-livepatch-6_4_0-150600_23_87-default-1-150600.13.3.1
* openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.87.1
* kernel-zfcpdump-debugsource-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (nosrc)
* dtb-aarch64-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (aarch64)
* dtb-amlogic-6.4.0-150600.23.87.1
* kernel-64kb-devel-6.4.0-150600.23.87.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.87.1
* kernel-64kb-debugsource-6.4.0-150600.23.87.1
* kernel-64kb-debuginfo-6.4.0-150600.23.87.1
* dtb-marvell-6.4.0-150600.23.87.1
* dtb-mediatek-6.4.0-150600.23.87.1
* dtb-broadcom-6.4.0-150600.23.87.1
* dtb-nvidia-6.4.0-150600.23.87.1
* gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.87.1
* cluster-md-kmp-64kb-6.4.0-150600.23.87.1
* kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.87.1
* gfs2-kmp-64kb-6.4.0-150600.23.87.1
* dtb-qcom-6.4.0-150600.23.87.1
* dtb-freescale-6.4.0-150600.23.87.1
* dtb-amazon-6.4.0-150600.23.87.1
* dtb-hisilicon-6.4.0-150600.23.87.1
* kernel-64kb-optional-debuginfo-6.4.0-150600.23.87.1
* dlm-kmp-64kb-6.4.0-150600.23.87.1
* dtb-lg-6.4.0-150600.23.87.1
* dtb-renesas-6.4.0-150600.23.87.1
* cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.87.1
* dtb-apm-6.4.0-150600.23.87.1
* dtb-altera-6.4.0-150600.23.87.1
* dtb-amd-6.4.0-150600.23.87.1
* reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.87.1
* dtb-sprd-6.4.0-150600.23.87.1
* kernel-64kb-extra-debuginfo-6.4.0-150600.23.87.1
* dtb-allwinner-6.4.0-150600.23.87.1
* dtb-socionext-6.4.0-150600.23.87.1
* ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.87.1
* dtb-cavium-6.4.0-150600.23.87.1
* kernel-64kb-extra-6.4.0-150600.23.87.1
* kernel-64kb-optional-6.4.0-150600.23.87.1
* dtb-apple-6.4.0-150600.23.87.1
* ocfs2-kmp-64kb-6.4.0-150600.23.87.1
* dtb-exynos-6.4.0-150600.23.87.1
* dtb-xilinx-6.4.0-150600.23.87.1
* dlm-kmp-64kb-debuginfo-6.4.0-150600.23.87.1
* kselftests-kmp-64kb-6.4.0-150600.23.87.1
* reiserfs-kmp-64kb-6.4.0-150600.23.87.1
* dtb-rockchip-6.4.0-150600.23.87.1
* dtb-arm-6.4.0-150600.23.87.1
* openSUSE Leap 15.6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.87.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.87.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* kernel-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-debugsource-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* dlm-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.87.1
* kernel-default-debugsource-6.4.0-150600.23.87.1
* cluster-md-kmp-default-6.4.0-150600.23.87.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-devel-6.4.0-150600.23.87.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-obs-build-debugsource-6.4.0-150600.23.87.1
* gfs2-kmp-default-6.4.0-150600.23.87.1
* ocfs2-kmp-default-6.4.0-150600.23.87.1
* reiserfs-kmp-default-6.4.0-150600.23.87.1
* dlm-kmp-default-6.4.0-150600.23.87.1
* kernel-default-debuginfo-6.4.0-150600.23.87.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-syms-6.4.0-150600.23.87.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-obs-build-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64)
* kernel-64kb-devel-6.4.0-150600.23.87.1
* kernel-64kb-debuginfo-6.4.0-150600.23.87.1
* kernel-64kb-debugsource-6.4.0-150600.23.87.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-6.4.0-150600.23.87.1.150600.12.40.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* kernel-devel-6.4.0-150600.23.87.1
* kernel-macros-6.4.0-150600.23.87.1
* kernel-source-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch nosrc)
* kernel-docs-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.87.1
* kernel-zfcpdump-debugsource-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* dlm-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-base-6.4.0-150600.23.87.1.150600.12.40.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.87.1
* kernel-default-debugsource-6.4.0-150600.23.87.1
* cluster-md-kmp-default-6.4.0-150600.23.87.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-default-devel-6.4.0-150600.23.87.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-obs-build-debugsource-6.4.0-150600.23.87.1
* gfs2-kmp-default-6.4.0-150600.23.87.1
* ocfs2-kmp-default-6.4.0-150600.23.87.1
* reiserfs-kmp-default-6.4.0-150600.23.87.1
* dlm-kmp-default-6.4.0-150600.23.87.1
* kernel-default-debuginfo-6.4.0-150600.23.87.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-syms-6.4.0-150600.23.87.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.87.1
* kernel-obs-build-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (nosrc ppc64le
x86_64)
* kernel-default-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* kernel-devel-6.4.0-150600.23.87.1
* kernel-macros-6.4.0-150600.23.87.1
* kernel-source-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.87.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-6.4.0-150600.23.87.1
* kernel-default-debugsource-6.4.0-150600.23.87.1
* kernel-default-debuginfo-6.4.0-150600.23.87.1
* kernel-livepatch-6_4_0-150600_23_87-default-debuginfo-1-150600.13.3.1
* kernel-livepatch-SLE15-SP6_Update_20-debugsource-1-150600.13.3.1
* kernel-livepatch-6_4_0-150600_23_87-default-1-150600.13.3.1
* kernel-default-livepatch-6.4.0-150600.23.87.1

## References:

* https://www.suse.com/security/cve/CVE-2023-53714.html
* https://www.suse.com/security/cve/CVE-2024-42103.html
* https://www.suse.com/security/cve/CVE-2024-53070.html
* https://www.suse.com/security/cve/CVE-2024-53149.html
* https://www.suse.com/security/cve/CVE-2025-22047.html
* https://www.suse.com/security/cve/CVE-2025-37813.html
* https://www.suse.com/security/cve/CVE-2025-38243.html
* https://www.suse.com/security/cve/CVE-2025-38322.html
* https://www.suse.com/security/cve/CVE-2025-38379.html
* https://www.suse.com/security/cve/CVE-2025-38539.html
* https://www.suse.com/security/cve/CVE-2025-39689.html
* https://www.suse.com/security/cve/CVE-2025-39813.html
* https://www.suse.com/security/cve/CVE-2025-39829.html
* https://www.suse.com/security/cve/CVE-2025-39913.html
* https://www.suse.com/security/cve/CVE-2025-40097.html
* https://www.suse.com/security/cve/CVE-2025-40202.html
* https://www.suse.com/security/cve/CVE-2025-40257.html
* https://www.suse.com/security/cve/CVE-2025-40259.html
* https://www.suse.com/security/cve/CVE-2025-68284.html
* https://www.suse.com/security/cve/CVE-2025-68285.html
* https://www.suse.com/security/cve/CVE-2025-68775.html
* https://www.suse.com/security/cve/CVE-2025-68804.html
* https://www.suse.com/security/cve/CVE-2025-68808.html
* https://www.suse.com/security/cve/CVE-2025-68813.html
* https://www.suse.com/security/cve/CVE-2025-68819.html
* https://www.suse.com/security/cve/CVE-2025-71078.html
* https://www.suse.com/security/cve/CVE-2025-71081.html
* https://www.suse.com/security/cve/CVE-2025-71083.html
* https://www.suse.com/security/cve/CVE-2025-71085.html
* https://www.suse.com/security/cve/CVE-2025-71089.html
* https://www.suse.com/security/cve/CVE-2025-71111.html
* https://www.suse.com/security/cve/CVE-2025-71112.html
* https://www.suse.com/security/cve/CVE-2025-71120.html
* https://www.suse.com/security/cve/CVE-2025-71136.html
* https://www.suse.com/security/cve/CVE-2025-71147.html
* https://www.suse.com/security/cve/CVE-2026-22999.html
* https://www.suse.com/security/cve/CVE-2026-23001.html
* https://www.suse.com/security/cve/CVE-2026-23010.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228490
* https://bugzilla.suse.com/show_bug.cgi?id=1233563
* https://bugzilla.suse.com/show_bug.cgi?id=1234842
* https://bugzilla.suse.com/show_bug.cgi?id=1241437
* https://bugzilla.suse.com/show_bug.cgi?id=1242909
* https://bugzilla.suse.com/show_bug.cgi?id=1246184
* https://bugzilla.suse.com/show_bug.cgi?id=1246447
* https://bugzilla.suse.com/show_bug.cgi?id=1247030
* https://bugzilla.suse.com/show_bug.cgi?id=1247712
* https://bugzilla.suse.com/show_bug.cgi?id=1248211
* https://bugzilla.suse.com/show_bug.cgi?id=1249307
* https://bugzilla.suse.com/show_bug.cgi?id=1250032
* https://bugzilla.suse.com/show_bug.cgi?id=1250082
* https://bugzilla.suse.com/show_bug.cgi?id=1250705
* https://bugzilla.suse.com/show_bug.cgi?id=1250748
* https://bugzilla.suse.com/show_bug.cgi?id=1252511
* https://bugzilla.suse.com/show_bug.cgi?id=1252712
* https://bugzilla.suse.com/show_bug.cgi?id=1252900
* https://bugzilla.suse.com/show_bug.cgi?id=1253087
* https://bugzilla.suse.com/show_bug.cgi?id=1253451
* https://bugzilla.suse.com/show_bug.cgi?id=1254378
* https://bugzilla.suse.com/show_bug.cgi?id=1254447
* https://bugzilla.suse.com/show_bug.cgi?id=1254465
* https://bugzilla.suse.com/show_bug.cgi?id=1254510
* https://bugzilla.suse.com/show_bug.cgi?id=1254767
* https://bugzilla.suse.com/show_bug.cgi?id=1254842
* https://bugzilla.suse.com/show_bug.cgi?id=1254845
* https://bugzilla.suse.com/show_bug.cgi?id=1255377
* https://bugzilla.suse.com/show_bug.cgi?id=1255401
* https://bugzilla.suse.com/show_bug.cgi?id=1256528
* https://bugzilla.suse.com/show_bug.cgi?id=1256609
* https://bugzilla.suse.com/show_bug.cgi?id=1256610
* https://bugzilla.suse.com/show_bug.cgi?id=1256612
* https://bugzilla.suse.com/show_bug.cgi?id=1256616
* https://bugzilla.suse.com/show_bug.cgi?id=1256617
* https://bugzilla.suse.com/show_bug.cgi?id=1256623
* https://bugzilla.suse.com/show_bug.cgi?id=1256641
* https://bugzilla.suse.com/show_bug.cgi?id=1256664
* https://bugzilla.suse.com/show_bug.cgi?id=1256665
* https://bugzilla.suse.com/show_bug.cgi?id=1256682
* https://bugzilla.suse.com/show_bug.cgi?id=1256726
* https://bugzilla.suse.com/show_bug.cgi?id=1256728
* https://bugzilla.suse.com/show_bug.cgi?id=1256759
* https://bugzilla.suse.com/show_bug.cgi?id=1256779
* https://bugzilla.suse.com/show_bug.cgi?id=1256792
* https://bugzilla.suse.com/show_bug.cgi?id=1257154
* https://bugzilla.suse.com/show_bug.cgi?id=1257158
* https://bugzilla.suse.com/show_bug.cgi?id=1257232
* https://bugzilla.suse.com/show_bug.cgi?id=1257236
* https://bugzilla.suse.com/show_bug.cgi?id=1257296
* https://bugzilla.suse.com/show_bug.cgi?id=1257332
* https://bugzilla.suse.com/show_bug.cgi?id=1257473
* https://bugzilla.suse.com/show_bug.cgi?id=1257603
* https://jira.suse.com/browse/PED-3527
* https://jira.suse.com/browse/PED-5065
* https://jira.suse.com/browse/PED-5475
* https://jira.suse.com/browse/PED-5477
* https://jira.suse.com/browse/PED-5511
* https://jira.suse.com/browse/PED-6041
* https://jira.suse.com/browse/PED-6068
* https://jira.suse.com/browse/PED-6069
* https://jira.suse.com/browse/PED-6070
* https://jira.suse.com/browse/PED-6071
* https://jira.suse.com/browse/PED-6116
* https://jira.suse.com/browse/PED-6120



SUSE-SU-2026:0474-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2026:0474-1
Release Date: 2026-02-12T11:28:52Z
Rating: important
References:

* bsc#1220137
* bsc#1220144
* bsc#1222323
* bsc#1223007
* bsc#1225049
* bsc#1233038
* bsc#1235905
* bsc#1236104
* bsc#1236208
* bsc#1237885
* bsc#1237906
* bsc#1238414
* bsc#1238754
* bsc#1238763
* bsc#1244758
* bsc#1244904
* bsc#1245110
* bsc#1245210
* bsc#1245723
* bsc#1245751
* bsc#1247177
* bsc#1247483
* bsc#1248306
* bsc#1248377
* bsc#1249156
* bsc#1249158
* bsc#1249827
* bsc#1252785
* bsc#1253028
* bsc#1253087
* bsc#1253409
* bsc#1253702
* bsc#1254447
* bsc#1254462
* bsc#1254463
* bsc#1254464
* bsc#1254465
* bsc#1254767
* bsc#1254842
* bsc#1255171
* bsc#1255251
* bsc#1255377
* bsc#1255401
* bsc#1255594
* bsc#1255908
* bsc#1256095
* bsc#1256582
* bsc#1256612
* bsc#1256623
* bsc#1256641
* bsc#1256726
* bsc#1256744
* bsc#1256779
* bsc#1256792
* bsc#1257232
* bsc#1257236
* bsc#1257296
* bsc#1257473

Cross-References:

* CVE-2022-49604
* CVE-2022-49943
* CVE-2022-49980
* CVE-2022-50232
* CVE-2022-50697
* CVE-2023-52433
* CVE-2023-52874
* CVE-2023-52923
* CVE-2023-53178
* CVE-2023-53407
* CVE-2023-53412
* CVE-2023-53417
* CVE-2023-53418
* CVE-2023-53714
* CVE-2023-54142
* CVE-2023-54243
* CVE-2024-26581
* CVE-2024-26661
* CVE-2024-26832
* CVE-2024-50143
* CVE-2024-54031
* CVE-2025-21658
* CVE-2025-21760
* CVE-2025-21764
* CVE-2025-21765
* CVE-2025-21766
* CVE-2025-38068
* CVE-2025-38129
* CVE-2025-38159
* CVE-2025-38375
* CVE-2025-38563
* CVE-2025-38565
* CVE-2025-38684
* CVE-2025-40044
* CVE-2025-40139
* CVE-2025-40257
* CVE-2025-40300
* CVE-2025-68183
* CVE-2025-68284
* CVE-2025-68285
* CVE-2025-68312
* CVE-2025-68771
* CVE-2025-68813
* CVE-2025-71085
* CVE-2025-71089
* CVE-2025-71112
* CVE-2025-71116
* CVE-2025-71120
* CVE-2026-22999
* CVE-2026-23001

CVSS scores:

* CVE-2022-49604 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49604 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49604 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49943 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49943 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-49943 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49980 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49980 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50697 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50697 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52433 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52433 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52874 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
* CVE-2023-52874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52923 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53178 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53407 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53407 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53407 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53412 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53417 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53417 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53417 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53418 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53418 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53714 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54243 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54243 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-26581 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26832 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50143 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50143 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-54031 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21658 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21766 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38068 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38068 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38159 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38159 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38375 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38375 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38375 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38563 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-38563 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38565 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38565 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38565 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40044 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40044 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-40139 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40300 ( SUSE ): 8.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2025-40300 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2025-40300 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68183 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68183 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68284 ( SUSE ): 7.0
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68284 ( SUSE ): 7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-68285 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68285 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68312 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68771 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68813 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68813 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71085 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71085 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71089 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71089 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71112 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71112 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71116 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71116 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-71120 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22999 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23001 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23001 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves 50 vulnerabilities and has eight security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP5 kernel was updated to fix various security
issues

The following security issues were fixed:

* CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant
uninit (bsc#1255594).
* CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
(bsc#1256095).
* CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free
(bsc#1255908).
* CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210).
* CVE-2025-38129: page_pool: fix inconsistency for page_pool_ring_lock()
(bsc#1245723).
* CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out
of bounds (bsc#1245751).
* CVE-2025-38375: virtio-net: ensure the received length does not exceed
allocated size (bsc#1247177).
* CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).
* CVE-2025-40300: Documentation/hw-vuln: Add VMSCAPE documentation
(bsc#1247483).
* CVE-2025-68183: ima: don't clear IMA_DIGSIG flag when setting or removing
non-IMA xattr (bsc#1255251).
* CVE-2025-68284: libceph: prevent potential out-of-bounds writes in
handle_auth_session_key() (bsc#1255377).
* CVE-2025-68285: libceph: fix potential use-after-free in
have_mon_and_osd_map() (bsc#1255401).
* CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171).
* CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain
(bsc#1256582).
* CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path
(bsc#1256641).
* CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of
calipso_skbuff_setattr() (bsc#1256623).
* CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
* CVE-2025-71112: net: hns3: add VLAN id validation before using
(bsc#1256726).
* CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted
osdmaps (bsc#1256744).
* CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
gss_token in gss_read_proxy_verf (bsc#1256779).
* CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
qfq_change_class() (bsc#1257236).
* CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source()
(bsc#1257232).

The following non security issues were fixed:

* mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations
(bsc#1253087).
* net: hv_netvsc: reject RSS hash key programming without RX indirection table
(bsc#1257473).
* net: tcp: allow zero-window ACK update the window (bsc#1254767).
* net: tcp: send zero-window ACK when no memory (bsc#1254767).
* scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).
* tcp: correct handling of extreme memory squeeze (bsc#1254767).
* x86: make page fault handling disable interrupts properly (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-474=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-474=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-474=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-474=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-474=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-474=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-474=1

## Package List:

* openSUSE Leap 15.5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (noarch)
* kernel-source-vanilla-5.14.21-150500.55.136.1
* kernel-macros-5.14.21-150500.55.136.1
* kernel-source-5.14.21-150500.55.136.1
* kernel-docs-html-5.14.21-150500.55.136.1
* kernel-devel-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.136.1
* kernel-kvmsmall-debuginfo-5.14.21-150500.55.136.1
* kernel-kvmsmall-debugsource-5.14.21-150500.55.136.1
* kernel-default-base-rebuild-5.14.21-150500.55.136.1.150500.6.67.1
* kernel-default-base-5.14.21-150500.55.136.1.150500.6.67.1
* kernel-kvmsmall-devel-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kselftests-kmp-default-5.14.21-150500.55.136.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.136.1
* kernel-default-devel-5.14.21-150500.55.136.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.136.1
* dlm-kmp-default-5.14.21-150500.55.136.1
* kernel-default-debuginfo-5.14.21-150500.55.136.1
* kernel-obs-build-5.14.21-150500.55.136.1
* kernel-default-extra-debuginfo-5.14.21-150500.55.136.1
* gfs2-kmp-default-5.14.21-150500.55.136.1
* kernel-default-optional-debuginfo-5.14.21-150500.55.136.1
* ocfs2-kmp-default-5.14.21-150500.55.136.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-5.14.21-150500.55.136.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* kernel-syms-5.14.21-150500.55.136.1
* kernel-default-optional-5.14.21-150500.55.136.1
* kernel-default-livepatch-5.14.21-150500.55.136.1
* reiserfs-kmp-default-5.14.21-150500.55.136.1
* kernel-obs-build-debugsource-5.14.21-150500.55.136.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.136.1
* kernel-default-extra-5.14.21-150500.55.136.1
* kernel-obs-qa-5.14.21-150500.55.136.1
* kselftests-kmp-default-debuginfo-5.14.21-150500.55.136.1
* kernel-default-debugsource-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-5.14.21-150500.55.136.1
* kernel-livepatch-SLE15-SP5_Update_35-debugsource-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_136-default-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_136-default-debuginfo-1-150500.11.3.1
* openSUSE Leap 15.5 (x86_64)
* kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.136.1
* kernel-default-vdso-debuginfo-5.14.21-150500.55.136.1
* kernel-default-vdso-5.14.21-150500.55.136.1
* kernel-kvmsmall-vdso-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150500.55.136.1
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (nosrc)
* dtb-aarch64-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (aarch64)
* dtb-lg-5.14.21-150500.55.136.1
* dtb-apm-5.14.21-150500.55.136.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.136.1
* dtb-freescale-5.14.21-150500.55.136.1
* dtb-cavium-5.14.21-150500.55.136.1
* kernel-64kb-devel-5.14.21-150500.55.136.1
* dtb-qcom-5.14.21-150500.55.136.1
* kernel-64kb-optional-5.14.21-150500.55.136.1
* dtb-rockchip-5.14.21-150500.55.136.1
* gfs2-kmp-64kb-5.14.21-150500.55.136.1
* kernel-64kb-debugsource-5.14.21-150500.55.136.1
* dtb-hisilicon-5.14.21-150500.55.136.1
* dtb-marvell-5.14.21-150500.55.136.1
* dtb-renesas-5.14.21-150500.55.136.1
* dlm-kmp-64kb-5.14.21-150500.55.136.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.136.1
* dtb-amlogic-5.14.21-150500.55.136.1
* reiserfs-kmp-64kb-5.14.21-150500.55.136.1
* dtb-sprd-5.14.21-150500.55.136.1
* dtb-broadcom-5.14.21-150500.55.136.1
* dlm-kmp-64kb-debuginfo-5.14.21-150500.55.136.1
* kselftests-kmp-64kb-5.14.21-150500.55.136.1
* dtb-allwinner-5.14.21-150500.55.136.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.136.1
* dtb-xilinx-5.14.21-150500.55.136.1
* kernel-64kb-optional-debuginfo-5.14.21-150500.55.136.1
* dtb-socionext-5.14.21-150500.55.136.1
* dtb-exynos-5.14.21-150500.55.136.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-64kb-5.14.21-150500.55.136.1
* kernel-64kb-extra-5.14.21-150500.55.136.1
* dtb-amazon-5.14.21-150500.55.136.1
* dtb-amd-5.14.21-150500.55.136.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.136.1
* ocfs2-kmp-64kb-5.14.21-150500.55.136.1
* kernel-64kb-debuginfo-5.14.21-150500.55.136.1
* dtb-arm-5.14.21-150500.55.136.1
* dtb-nvidia-5.14.21-150500.55.136.1
* dtb-altera-5.14.21-150500.55.136.1
* dtb-apple-5.14.21-150500.55.136.1
* dtb-mediatek-5.14.21-150500.55.136.1
* kernel-64kb-extra-debuginfo-5.14.21-150500.55.136.1
* openSUSE Leap 15.5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.136.1.150500.6.67.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.136.1
* kernel-default-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-macros-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* dlm-kmp-default-5.14.21-150500.55.136.1
* kernel-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-5.14.21-150500.55.136.1
* kernel-default-devel-5.14.21-150500.55.136.1
* kernel-obs-build-5.14.21-150500.55.136.1
* kernel-syms-5.14.21-150500.55.136.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* gfs2-kmp-default-5.14.21-150500.55.136.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.136.1
* ocfs2-kmp-default-5.14.21-150500.55.136.1
* kernel-default-base-5.14.21-150500.55.136.1.150500.6.67.1
* kernel-obs-build-debugsource-5.14.21-150500.55.136.1
* kernel-default-debugsource-5.14.21-150500.55.136.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
nosrc)
* kernel-64kb-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150500.55.136.1
* kernel-64kb-devel-5.14.21-150500.55.136.1
* kernel-64kb-debugsource-5.14.21-150500.55.136.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* kernel-source-5.14.21-150500.55.136.1
* kernel-devel-5.14.21-150500.55.136.1
* kernel-macros-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* dlm-kmp-default-5.14.21-150500.55.136.1
* kernel-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-5.14.21-150500.55.136.1
* kernel-default-devel-5.14.21-150500.55.136.1
* kernel-obs-build-5.14.21-150500.55.136.1
* kernel-syms-5.14.21-150500.55.136.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* gfs2-kmp-default-5.14.21-150500.55.136.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.136.1
* ocfs2-kmp-default-5.14.21-150500.55.136.1
* kernel-default-base-5.14.21-150500.55.136.1.150500.6.67.1
* kernel-obs-build-debugsource-5.14.21-150500.55.136.1
* kernel-default-debugsource-5.14.21-150500.55.136.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150500.55.136.1
* kernel-64kb-devel-5.14.21-150500.55.136.1
* kernel-64kb-debugsource-5.14.21-150500.55.136.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* kernel-source-5.14.21-150500.55.136.1
* kernel-devel-5.14.21-150500.55.136.1
* kernel-macros-5.14.21-150500.55.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* dlm-kmp-default-5.14.21-150500.55.136.1
* kernel-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-5.14.21-150500.55.136.1
* kernel-default-devel-5.14.21-150500.55.136.1
* kernel-obs-build-5.14.21-150500.55.136.1
* kernel-syms-5.14.21-150500.55.136.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* reiserfs-kmp-default-5.14.21-150500.55.136.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* gfs2-kmp-default-5.14.21-150500.55.136.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.136.1
* ocfs2-kmp-default-5.14.21-150500.55.136.1
* kernel-obs-build-debugsource-5.14.21-150500.55.136.1
* kernel-default-debugsource-5.14.21-150500.55.136.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.136.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64)
* kernel-64kb-debuginfo-5.14.21-150500.55.136.1
* kernel-64kb-devel-5.14.21-150500.55.136.1
* kernel-64kb-debugsource-5.14.21-150500.55.136.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150500.55.136.1.150500.6.67.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* kernel-source-5.14.21-150500.55.136.1
* kernel-devel-5.14.21-150500.55.136.1
* kernel-macros-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150500.55.136.1
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* dlm-kmp-default-5.14.21-150500.55.136.1
* kernel-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.136.1
* cluster-md-kmp-default-5.14.21-150500.55.136.1
* kernel-default-devel-5.14.21-150500.55.136.1
* kernel-obs-build-5.14.21-150500.55.136.1
* kernel-syms-5.14.21-150500.55.136.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* reiserfs-kmp-default-5.14.21-150500.55.136.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.136.1
* gfs2-kmp-default-5.14.21-150500.55.136.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.136.1
* ocfs2-kmp-default-5.14.21-150500.55.136.1
* kernel-default-base-5.14.21-150500.55.136.1.150500.6.67.1
* kernel-obs-build-debugsource-5.14.21-150500.55.136.1
* kernel-default-debugsource-5.14.21-150500.55.136.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.136.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* kernel-source-5.14.21-150500.55.136.1
* kernel-devel-5.14.21-150500.55.136.1
* kernel-macros-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.136.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-default-debuginfo-5.14.21-150500.55.136.1
* kernel-default-livepatch-devel-5.14.21-150500.55.136.1
* kernel-livepatch-5_14_21-150500_55_136-default-debuginfo-1-150500.11.3.1
* kernel-default-livepatch-5.14.21-150500.55.136.1
* kernel-livepatch-5_14_21-150500_55_136-default-1-150500.11.3.1
* kernel-default-debugsource-5.14.21-150500.55.136.1
* kernel-livepatch-SLE15-SP5_Update_35-debugsource-1-150500.11.3.1

## References:

* https://www.suse.com/security/cve/CVE-2022-49604.html
* https://www.suse.com/security/cve/CVE-2022-49943.html
* https://www.suse.com/security/cve/CVE-2022-49980.html
* https://www.suse.com/security/cve/CVE-2022-50232.html
* https://www.suse.com/security/cve/CVE-2022-50697.html
* https://www.suse.com/security/cve/CVE-2023-52433.html
* https://www.suse.com/security/cve/CVE-2023-52874.html
* https://www.suse.com/security/cve/CVE-2023-52923.html
* https://www.suse.com/security/cve/CVE-2023-53178.html
* https://www.suse.com/security/cve/CVE-2023-53407.html
* https://www.suse.com/security/cve/CVE-2023-53412.html
* https://www.suse.com/security/cve/CVE-2023-53417.html
* https://www.suse.com/security/cve/CVE-2023-53418.html
* https://www.suse.com/security/cve/CVE-2023-53714.html
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2023-54243.html
* https://www.suse.com/security/cve/CVE-2024-26581.html
* https://www.suse.com/security/cve/CVE-2024-26661.html
* https://www.suse.com/security/cve/CVE-2024-26832.html
* https://www.suse.com/security/cve/CVE-2024-50143.html
* https://www.suse.com/security/cve/CVE-2024-54031.html
* https://www.suse.com/security/cve/CVE-2025-21658.html
* https://www.suse.com/security/cve/CVE-2025-21760.html
* https://www.suse.com/security/cve/CVE-2025-21764.html
* https://www.suse.com/security/cve/CVE-2025-21765.html
* https://www.suse.com/security/cve/CVE-2025-21766.html
* https://www.suse.com/security/cve/CVE-2025-38068.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://www.suse.com/security/cve/CVE-2025-38159.html
* https://www.suse.com/security/cve/CVE-2025-38375.html
* https://www.suse.com/security/cve/CVE-2025-38563.html
* https://www.suse.com/security/cve/CVE-2025-38565.html
* https://www.suse.com/security/cve/CVE-2025-38684.html
* https://www.suse.com/security/cve/CVE-2025-40044.html
* https://www.suse.com/security/cve/CVE-2025-40139.html
* https://www.suse.com/security/cve/CVE-2025-40257.html
* https://www.suse.com/security/cve/CVE-2025-40300.html
* https://www.suse.com/security/cve/CVE-2025-68183.html
* https://www.suse.com/security/cve/CVE-2025-68284.html
* https://www.suse.com/security/cve/CVE-2025-68285.html
* https://www.suse.com/security/cve/CVE-2025-68312.html
* https://www.suse.com/security/cve/CVE-2025-68771.html
* https://www.suse.com/security/cve/CVE-2025-68813.html
* https://www.suse.com/security/cve/CVE-2025-71085.html
* https://www.suse.com/security/cve/CVE-2025-71089.html
* https://www.suse.com/security/cve/CVE-2025-71112.html
* https://www.suse.com/security/cve/CVE-2025-71116.html
* https://www.suse.com/security/cve/CVE-2025-71120.html
* https://www.suse.com/security/cve/CVE-2026-22999.html
* https://www.suse.com/security/cve/CVE-2026-23001.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220137
* https://bugzilla.suse.com/show_bug.cgi?id=1220144
* https://bugzilla.suse.com/show_bug.cgi?id=1222323
* https://bugzilla.suse.com/show_bug.cgi?id=1223007
* https://bugzilla.suse.com/show_bug.cgi?id=1225049
* https://bugzilla.suse.com/show_bug.cgi?id=1233038
* https://bugzilla.suse.com/show_bug.cgi?id=1235905
* https://bugzilla.suse.com/show_bug.cgi?id=1236104
* https://bugzilla.suse.com/show_bug.cgi?id=1236208
* https://bugzilla.suse.com/show_bug.cgi?id=1237885
* https://bugzilla.suse.com/show_bug.cgi?id=1237906
* https://bugzilla.suse.com/show_bug.cgi?id=1238414
* https://bugzilla.suse.com/show_bug.cgi?id=1238754
* https://bugzilla.suse.com/show_bug.cgi?id=1238763
* https://bugzilla.suse.com/show_bug.cgi?id=1244758
* https://bugzilla.suse.com/show_bug.cgi?id=1244904
* https://bugzilla.suse.com/show_bug.cgi?id=1245110
* https://bugzilla.suse.com/show_bug.cgi?id=1245210
* https://bugzilla.suse.com/show_bug.cgi?id=1245723
* https://bugzilla.suse.com/show_bug.cgi?id=1245751
* https://bugzilla.suse.com/show_bug.cgi?id=1247177
* https://bugzilla.suse.com/show_bug.cgi?id=1247483
* https://bugzilla.suse.com/show_bug.cgi?id=1248306
* https://bugzilla.suse.com/show_bug.cgi?id=1248377
* https://bugzilla.suse.com/show_bug.cgi?id=1249156
* https://bugzilla.suse.com/show_bug.cgi?id=1249158
* https://bugzilla.suse.com/show_bug.cgi?id=1249827
* https://bugzilla.suse.com/show_bug.cgi?id=1252785
* https://bugzilla.suse.com/show_bug.cgi?id=1253028
* https://bugzilla.suse.com/show_bug.cgi?id=1253087
* https://bugzilla.suse.com/show_bug.cgi?id=1253409
* https://bugzilla.suse.com/show_bug.cgi?id=1253702
* https://bugzilla.suse.com/show_bug.cgi?id=1254447
* https://bugzilla.suse.com/show_bug.cgi?id=1254462
* https://bugzilla.suse.com/show_bug.cgi?id=1254463
* https://bugzilla.suse.com/show_bug.cgi?id=1254464
* https://bugzilla.suse.com/show_bug.cgi?id=1254465
* https://bugzilla.suse.com/show_bug.cgi?id=1254767
* https://bugzilla.suse.com/show_bug.cgi?id=1254842
* https://bugzilla.suse.com/show_bug.cgi?id=1255171
* https://bugzilla.suse.com/show_bug.cgi?id=1255251
* https://bugzilla.suse.com/show_bug.cgi?id=1255377
* https://bugzilla.suse.com/show_bug.cgi?id=1255401
* https://bugzilla.suse.com/show_bug.cgi?id=1255594
* https://bugzilla.suse.com/show_bug.cgi?id=1255908
* https://bugzilla.suse.com/show_bug.cgi?id=1256095
* https://bugzilla.suse.com/show_bug.cgi?id=1256582
* https://bugzilla.suse.com/show_bug.cgi?id=1256612
* https://bugzilla.suse.com/show_bug.cgi?id=1256623
* https://bugzilla.suse.com/show_bug.cgi?id=1256641
* https://bugzilla.suse.com/show_bug.cgi?id=1256726
* https://bugzilla.suse.com/show_bug.cgi?id=1256744
* https://bugzilla.suse.com/show_bug.cgi?id=1256779
* https://bugzilla.suse.com/show_bug.cgi?id=1256792
* https://bugzilla.suse.com/show_bug.cgi?id=1257232
* https://bugzilla.suse.com/show_bug.cgi?id=1257236
* https://bugzilla.suse.com/show_bug.cgi?id=1257296
* https://bugzilla.suse.com/show_bug.cgi?id=1257473



SUSE-SU-2026:0475-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2026:0475-1
Release Date: 2026-02-12T11:32:57Z
Rating: important
References:

* bsc#1223007
* bsc#1235905
* bsc#1236104
* bsc#1237885
* bsc#1237906
* bsc#1238414
* bsc#1238754
* bsc#1238763
* bsc#1240284
* bsc#1244904
* bsc#1245110
* bsc#1245723
* bsc#1248306
* bsc#1248377
* bsc#1249699
* bsc#1249827
* bsc#1251201
* bsc#1253409
* bsc#1255171
* bsc#1255594
* bsc#1256612
* bsc#1256623
* bsc#1256726
* bsc#1256792
* bsc#1257232
* bsc#1257236

Cross-References:

* CVE-2022-49604
* CVE-2022-49943
* CVE-2022-49980
* CVE-2022-50329
* CVE-2022-50488
* CVE-2022-50697
* CVE-2023-52923
* CVE-2023-52983
* CVE-2023-53178
* CVE-2024-26832
* CVE-2024-54031
* CVE-2025-21760
* CVE-2025-21764
* CVE-2025-21765
* CVE-2025-21766
* CVE-2025-38129
* CVE-2025-38563
* CVE-2025-38565
* CVE-2025-40139
* CVE-2025-68312
* CVE-2025-71085
* CVE-2025-71089
* CVE-2025-71112
* CVE-2026-22999
* CVE-2026-23001

CVSS scores:

* CVE-2022-49604 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49604 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49604 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49943 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49943 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-49943 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49980 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49980 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50329 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50329 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50488 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50488 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50488 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50697 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50697 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52923 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53178 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26832 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54031 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21766 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38129 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38563 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-38563 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38565 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38565 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38565 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40139 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68312 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71085 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71085 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71089 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71089 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71112 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71112 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-22999 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23001 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23001 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.3
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2

An update that solves 25 vulnerabilities and has one security fix can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP3 kernel was updated to fix various security
issues

The following security issues were fixed:

* CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant
uninit (bsc#1255594).
* CVE-2025-38129: page_pool: fix inconsistency for page_pool_ring_lock()
(bsc#1245723).
* CVE-2025-40139: net: ipv4: Consolidate ipv4_mtu and ip_dst_mtu_maybe_forward
(bsc#1253409).
* CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171).
* CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of
calipso_skbuff_setattr() (bsc#1256623).
* CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
* CVE-2025-71112: net: hns3: add VLAN id validation before using
(bsc#1256726).
* CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
qfq_change_class() (bsc#1257236).
* CVE-2026-23001: macvlan: Use 'hash' iterators to simplify code
(bsc#1257232).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-475=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-475=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-475=1

## Package List:

* openSUSE Leap 15.3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (noarch)
* kernel-devel-5.3.18-150300.59.235.1
* kernel-source-5.3.18-150300.59.235.1
* kernel-source-vanilla-5.3.18-150300.59.235.1
* kernel-macros-5.3.18-150300.59.235.1
* kernel-docs-html-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* kselftests-kmp-default-debuginfo-5.3.18-150300.59.235.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.235.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.235.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.235.1
* kernel-syms-5.3.18-150300.59.235.1
* kernel-default-extra-debuginfo-5.3.18-150300.59.235.1
* ocfs2-kmp-default-5.3.18-150300.59.235.1
* kernel-obs-build-5.3.18-150300.59.235.1
* kernel-default-debuginfo-5.3.18-150300.59.235.1
* kernel-default-optional-5.3.18-150300.59.235.1
* kernel-default-livepatch-5.3.18-150300.59.235.1
* kernel-default-devel-5.3.18-150300.59.235.1
* kernel-default-optional-debuginfo-5.3.18-150300.59.235.1
* kernel-default-debugsource-5.3.18-150300.59.235.1
* kernel-default-base-rebuild-5.3.18-150300.59.235.1.150300.18.140.1
* gfs2-kmp-default-5.3.18-150300.59.235.1
* reiserfs-kmp-default-5.3.18-150300.59.235.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.235.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.235.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.235.1
* cluster-md-kmp-default-5.3.18-150300.59.235.1
* kernel-default-base-5.3.18-150300.59.235.1.150300.18.140.1
* kernel-default-extra-5.3.18-150300.59.235.1
* kernel-obs-build-debugsource-5.3.18-150300.59.235.1
* kselftests-kmp-default-5.3.18-150300.59.235.1
* kernel-obs-qa-5.3.18-150300.59.235.1
* dlm-kmp-default-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (nosrc ppc64le x86_64)
* kernel-kvmsmall-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.235.1
* kernel-kvmsmall-devel-5.3.18-150300.59.235.1
* kernel-kvmsmall-debuginfo-5.3.18-150300.59.235.1
* kernel-kvmsmall-debugsource-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* dlm-kmp-preempt-debuginfo-5.3.18-150300.59.235.1
* ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.235.1
* ocfs2-kmp-preempt-5.3.18-150300.59.235.1
* gfs2-kmp-preempt-5.3.18-150300.59.235.1
* kernel-preempt-debugsource-5.3.18-150300.59.235.1
* reiserfs-kmp-preempt-5.3.18-150300.59.235.1
* reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.235.1
* kernel-preempt-extra-debuginfo-5.3.18-150300.59.235.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.235.1
* cluster-md-kmp-preempt-5.3.18-150300.59.235.1
* kernel-preempt-extra-5.3.18-150300.59.235.1
* cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.235.1
* kernel-preempt-devel-5.3.18-150300.59.235.1
* gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.235.1
* kernel-preempt-optional-debuginfo-5.3.18-150300.59.235.1
* kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.235.1
* dlm-kmp-preempt-5.3.18-150300.59.235.1
* kernel-preempt-debuginfo-5.3.18-150300.59.235.1
* kselftests-kmp-preempt-5.3.18-150300.59.235.1
* kernel-preempt-optional-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.235.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (nosrc)
* dtb-aarch64-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (aarch64)
* dtb-nvidia-5.3.18-150300.59.235.1
* dtb-amlogic-5.3.18-150300.59.235.1
* cluster-md-kmp-64kb-5.3.18-150300.59.235.1
* kernel-64kb-extra-5.3.18-150300.59.235.1
* dtb-marvell-5.3.18-150300.59.235.1
* dtb-altera-5.3.18-150300.59.235.1
* dtb-apm-5.3.18-150300.59.235.1
* reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.235.1
* dtb-rockchip-5.3.18-150300.59.235.1
* cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.235.1
* kernel-64kb-optional-debuginfo-5.3.18-150300.59.235.1
* kselftests-kmp-64kb-5.3.18-150300.59.235.1
* dtb-broadcom-5.3.18-150300.59.235.1
* kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.235.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.235.1
* dtb-lg-5.3.18-150300.59.235.1
* dtb-zte-5.3.18-150300.59.235.1
* kernel-64kb-debuginfo-5.3.18-150300.59.235.1
* dtb-al-5.3.18-150300.59.235.1
* gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.235.1
* dtb-renesas-5.3.18-150300.59.235.1
* dtb-amd-5.3.18-150300.59.235.1
* ocfs2-kmp-64kb-5.3.18-150300.59.235.1
* ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.235.1
* reiserfs-kmp-64kb-5.3.18-150300.59.235.1
* dtb-exynos-5.3.18-150300.59.235.1
* dtb-cavium-5.3.18-150300.59.235.1
* dlm-kmp-64kb-debuginfo-5.3.18-150300.59.235.1
* dtb-sprd-5.3.18-150300.59.235.1
* dtb-allwinner-5.3.18-150300.59.235.1
* dtb-freescale-5.3.18-150300.59.235.1
* dtb-socionext-5.3.18-150300.59.235.1
* dlm-kmp-64kb-5.3.18-150300.59.235.1
* dtb-mediatek-5.3.18-150300.59.235.1
* kernel-64kb-devel-5.3.18-150300.59.235.1
* dtb-arm-5.3.18-150300.59.235.1
* dtb-xilinx-5.3.18-150300.59.235.1
* dtb-qcom-5.3.18-150300.59.235.1
* kernel-64kb-extra-debuginfo-5.3.18-150300.59.235.1
* gfs2-kmp-64kb-5.3.18-150300.59.235.1
* kernel-64kb-debugsource-5.3.18-150300.59.235.1
* kernel-64kb-optional-5.3.18-150300.59.235.1
* dtb-hisilicon-5.3.18-150300.59.235.1
* openSUSE Leap 15.3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.235.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.235.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.235.1.150300.18.140.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.235.1
* kernel-default-debuginfo-5.3.18-150300.59.235.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.235.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.235.1.150300.18.140.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.235.1
* kernel-default-debuginfo-5.3.18-150300.59.235.1

## References:

* https://www.suse.com/security/cve/CVE-2022-49604.html
* https://www.suse.com/security/cve/CVE-2022-49943.html
* https://www.suse.com/security/cve/CVE-2022-49980.html
* https://www.suse.com/security/cve/CVE-2022-50329.html
* https://www.suse.com/security/cve/CVE-2022-50488.html
* https://www.suse.com/security/cve/CVE-2022-50697.html
* https://www.suse.com/security/cve/CVE-2023-52923.html
* https://www.suse.com/security/cve/CVE-2023-52983.html
* https://www.suse.com/security/cve/CVE-2023-53178.html
* https://www.suse.com/security/cve/CVE-2024-26832.html
* https://www.suse.com/security/cve/CVE-2024-54031.html
* https://www.suse.com/security/cve/CVE-2025-21760.html
* https://www.suse.com/security/cve/CVE-2025-21764.html
* https://www.suse.com/security/cve/CVE-2025-21765.html
* https://www.suse.com/security/cve/CVE-2025-21766.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://www.suse.com/security/cve/CVE-2025-38563.html
* https://www.suse.com/security/cve/CVE-2025-38565.html
* https://www.suse.com/security/cve/CVE-2025-40139.html
* https://www.suse.com/security/cve/CVE-2025-68312.html
* https://www.suse.com/security/cve/CVE-2025-71085.html
* https://www.suse.com/security/cve/CVE-2025-71089.html
* https://www.suse.com/security/cve/CVE-2025-71112.html
* https://www.suse.com/security/cve/CVE-2026-22999.html
* https://www.suse.com/security/cve/CVE-2026-23001.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223007
* https://bugzilla.suse.com/show_bug.cgi?id=1235905
* https://bugzilla.suse.com/show_bug.cgi?id=1236104
* https://bugzilla.suse.com/show_bug.cgi?id=1237885
* https://bugzilla.suse.com/show_bug.cgi?id=1237906
* https://bugzilla.suse.com/show_bug.cgi?id=1238414
* https://bugzilla.suse.com/show_bug.cgi?id=1238754
* https://bugzilla.suse.com/show_bug.cgi?id=1238763
* https://bugzilla.suse.com/show_bug.cgi?id=1240284
* https://bugzilla.suse.com/show_bug.cgi?id=1244904
* https://bugzilla.suse.com/show_bug.cgi?id=1245110
* https://bugzilla.suse.com/show_bug.cgi?id=1245723
* https://bugzilla.suse.com/show_bug.cgi?id=1248306
* https://bugzilla.suse.com/show_bug.cgi?id=1248377
* https://bugzilla.suse.com/show_bug.cgi?id=1249699
* https://bugzilla.suse.com/show_bug.cgi?id=1249827
* https://bugzilla.suse.com/show_bug.cgi?id=1251201
* https://bugzilla.suse.com/show_bug.cgi?id=1253409
* https://bugzilla.suse.com/show_bug.cgi?id=1255171
* https://bugzilla.suse.com/show_bug.cgi?id=1255594
* https://bugzilla.suse.com/show_bug.cgi?id=1256612
* https://bugzilla.suse.com/show_bug.cgi?id=1256623
* https://bugzilla.suse.com/show_bug.cgi?id=1256726
* https://bugzilla.suse.com/show_bug.cgi?id=1256792
* https://bugzilla.suse.com/show_bug.cgi?id=1257232
* https://bugzilla.suse.com/show_bug.cgi?id=1257236



SUSE-SU-2026:0476-1: important: Security update for python-azure-core


# Security update for python-azure-core

Announcement ID: SUSE-SU-2026:0476-1
Release Date: 2026-02-12T11:44:31Z
Rating: important
References:

* bsc#1257703

Cross-References:

* CVE-2026-21226

CVSS scores:

* CVE-2026-21226 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21226 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-21226 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Public Cloud Module 15-SP6
* Public Cloud Module 15-SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for python-azure-core fixes the following issues:

* CVE-2026-21226: Fixed deserialization of untrusted data which may allow an
authorized attacker to execute code over a network. (bsc#1257703)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2026-476=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2026-476=1

* Public Cloud Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2026-476=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-476=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-476=1

* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-476=1

## Package List:

* Public Cloud Module 15-SP5 (noarch)
* python311-azure-core-1.30.0-150400.11.6.1
* Public Cloud Module 15-SP6 (noarch)
* python311-azure-core-1.30.0-150400.11.6.1
* Public Cloud Module 15-SP7 (noarch)
* python311-azure-core-1.30.0-150400.11.6.1
* openSUSE Leap 15.4 (noarch)
* python311-azure-core-1.30.0-150400.11.6.1
* openSUSE Leap 15.6 (noarch)
* python311-azure-core-1.30.0-150400.11.6.1
* Public Cloud Module 15-SP4 (noarch)
* python311-azure-core-1.30.0-150400.11.6.1

## References:

* https://www.suse.com/security/cve/CVE-2026-21226.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257703



SUSE-SU-2026:0480-1: important: Security update for helm


# Security update for helm

Announcement ID: SUSE-SU-2026:0480-1
Release Date: 2026-02-12T15:35:52Z
Rating: important
References:

Affected Products:

* Containers Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7

An update that can now be installed.

## Description:

This update for helm rebuilds it against the current GO security release.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-480=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-480=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-480=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-480=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-480=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-480=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-480=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-480=1

* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-480=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-480=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-480=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-480=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-480=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-480=1

## Package List:

* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* openSUSE Leap 15.6 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-fish-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* helm-bash-completion-3.19.1-150000.1.64.1
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* Containers Module 15-SP7 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Package Hub 15 15-SP7 (noarch)
* helm-fish-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* helm-3.19.1-150000.1.64.1
* helm-debuginfo-3.19.1-150000.1.64.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* helm-zsh-completion-3.19.1-150000.1.64.1
* helm-bash-completion-3.19.1-150000.1.64.1



openSUSE-SU-2026:0045-1: moderate: Security update for assimp


openSUSE Security Update: Security update for assimp
_______________________________

Announcement ID: openSUSE-SU-2026:0045-1
Rating: moderate
References: #1241367
Cross-References: CVE-2025-3548
CVSS scores:
CVE-2025-3548 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________

An update that fixes one vulnerability is now available.

Description:

This update for assimp fixes the following issues:

- CVE-2025-3548: Fixed denial of service when processing malformed files
which may lead to an out-of-bounds read (boo#1241367).

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2026-45=1

Package List:

- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le s390x x86_64):

assimp-devel-5.3.1-bp156.3.12.1
libassimp5-5.3.1-bp156.3.12.1

References:

https://www.suse.com/security/cve/CVE-2025-3548.html
https://bugzilla.suse.com/1241367