SUSE 5564 Published by

Several security updates have been released for SUSE Linux, including fixes for the Linux Kernel and various other packages. The list of updates includes patches for Live Patch 43 and Live Patch 44 for SUSE Linux Enterprise 15 SP4, as well as fixes for nodejs22 and python311-pip. Additionally, security vulnerabilities in frr, libsoup-2_4-1, protobuf, libxml2, and openCryptoki have been addressed through updates.

SUSE-SU-2026:0563-1: moderate: Security update for protobuf
SUSE-SU-2026:0565-1: important: Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0566-1: important: Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4)
openSUSE-SU-2026:20236-1: important: Security update for nodejs22
openSUSE-SU-2026:10210-1: moderate: python311-pip-26.0.1-1.1 on GA media
openSUSE-SU-2026:10207-1: moderate: frr-10.2.1-4.1 on GA media
openSUSE-SU-2026:10209-1: moderate: libsoup-2_4-1-2.74.3-16.1 on GA media
SUSE-SU-2026:0568-1: moderate: Security update for libxml2
SUSE-SU-2026:0569-1: moderate: Security update for openCryptoki




SUSE-SU-2026:0563-1: moderate: Security update for protobuf


# Security update for protobuf

Announcement ID: SUSE-SU-2026:0563-1
Release Date: 2026-02-16T16:19:29Z
Rating: moderate
References:

* bsc#1257173

Cross-References:

* CVE-2026-0994

CVSS scores:

* CVE-2026-0994 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0994 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0994 ( NVD ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Leap 15.4
* Public Cloud Module 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for protobuf fixes the following issues:

* CVE-2026-0994: Fixed google.protobuf.Any recursion depth bypass in Python
json_format.ParseDict (bsc#1257173).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-563=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-563=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-563=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-563=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-563=1

* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-563=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libprotobuf-lite25_1_0-25.1-150400.9.19.1
* protobuf-devel-debuginfo-25.1-150400.9.19.1
* libprotobuf25_1_0-debuginfo-25.1-150400.9.19.1
* protobuf-debugsource-25.1-150400.9.19.1
* libprotobuf25_1_0-25.1-150400.9.19.1
* python311-protobuf-4.25.1-150400.9.19.1
* libprotoc25_1_0-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.19.1
* libprotoc25_1_0-debuginfo-25.1-150400.9.19.1
* protobuf-devel-25.1-150400.9.19.1
* openSUSE Leap 15.4 (x86_64)
* libprotoc25_1_0-32bit-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-32bit-debuginfo-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-32bit-25.1-150400.9.19.1
* libprotobuf25_1_0-32bit-25.1-150400.9.19.1
* libprotoc25_1_0-32bit-debuginfo-25.1-150400.9.19.1
* libprotobuf25_1_0-32bit-debuginfo-25.1-150400.9.19.1
* openSUSE Leap 15.4 (noarch)
* protobuf-java-25.1-150400.9.19.1
* protobuf-java-bom-25.1-150400.9.19.1
* protobuf-java-parent-25.1-150400.9.19.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libprotobuf-lite25_1_0-64bit-debuginfo-25.1-150400.9.19.1
* libprotoc25_1_0-64bit-25.1-150400.9.19.1
* libprotoc25_1_0-64bit-debuginfo-25.1-150400.9.19.1
* libprotobuf25_1_0-64bit-debuginfo-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-64bit-25.1-150400.9.19.1
* libprotobuf25_1_0-64bit-25.1-150400.9.19.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.19.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.19.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.19.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.19.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* python311-protobuf-4.25.1-150400.9.19.1
* protobuf-debugsource-25.1-150400.9.19.1

## References:

* https://www.suse.com/security/cve/CVE-2026-0994.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257173



SUSE-SU-2026:0565-1: important: Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4)


# Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise
15 SP4)

Announcement ID: SUSE-SU-2026:0565-1
Release Date: 2026-02-16T18:04:25Z
Rating: important
References:

* bsc#1249205
* bsc#1249455
* bsc#1249480
* bsc#1250314

Cross-References:

* CVE-2023-53321
* CVE-2025-38111
* CVE-2025-38352
* CVE-2025-39742

CVSS scores:

* CVE-2023-53321 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53321 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53321 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-53321 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38111 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38111 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38111 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38352 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38352 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38352 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39742 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39742 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that solves four vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.173 fixes
various security issues

The following security issues were fixed:

* CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250314).
* CVE-2025-38111: net/mdiobus: Fix potential out-of-bounds read/write access
(bsc#1249455).
* CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers()
and posix_cpu_timer_del() (bsc#1249205).
* CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in
find_hw_thread_mask() (bsc#1249480).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-565=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2026-562=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-562=1 SUSE-2026-565=1

## Package List:

* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_150-default-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_36-debugsource-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_43-debugsource-8-150400.2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_150-default-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_36-debugsource-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_43-debugsource-8-150400.2.1

## References:

* https://www.suse.com/security/cve/CVE-2023-53321.html
* https://www.suse.com/security/cve/CVE-2025-38111.html
* https://www.suse.com/security/cve/CVE-2025-38352.html
* https://www.suse.com/security/cve/CVE-2025-39742.html
* https://bugzilla.suse.com/show_bug.cgi?id=1249205
* https://bugzilla.suse.com/show_bug.cgi?id=1249455
* https://bugzilla.suse.com/show_bug.cgi?id=1249480
* https://bugzilla.suse.com/show_bug.cgi?id=1250314



SUSE-SU-2026:0566-1: important: Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4)


# Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise
15 SP4)

Announcement ID: SUSE-SU-2026:0566-1
Release Date: 2026-02-17T06:33:41Z
Rating: important
References:

* bsc#1249455
* bsc#1249480
* bsc#1250314

Cross-References:

* CVE-2023-53321
* CVE-2025-38111
* CVE-2025-39742

CVSS scores:

* CVE-2023-53321 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53321 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53321 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-53321 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38111 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38111 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38111 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-39742 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39742 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that solves three vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.176 fixes
various security issues

The following security issues were fixed:

* CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250314).
* CVE-2025-38111: net/mdiobus: Fix potential out-of-bounds read/write access
(bsc#1249455).
* CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in
find_hw_thread_mask() (bsc#1249480).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-566=1

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-566=1

## Package List:

* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_44-debugsource-7-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-7-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-7-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_44-debugsource-7-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-7-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-7-150400.2.1

## References:

* https://www.suse.com/security/cve/CVE-2023-53321.html
* https://www.suse.com/security/cve/CVE-2025-38111.html
* https://www.suse.com/security/cve/CVE-2025-39742.html
* https://bugzilla.suse.com/show_bug.cgi?id=1249455
* https://bugzilla.suse.com/show_bug.cgi?id=1249480
* https://bugzilla.suse.com/show_bug.cgi?id=1250314



openSUSE-SU-2026:20236-1: important: Security update for nodejs22


openSUSE security update: security update for nodejs22
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20236-1
Rating: important
References:

* bsc#1256569
* bsc#1256570
* bsc#1256571
* bsc#1256573
* bsc#1256574
* bsc#1256576
* bsc#1256848

Cross-References:

* CVE-2025-55130
* CVE-2025-55131
* CVE-2025-55132
* CVE-2025-59465
* CVE-2025-59466
* CVE-2026-21637
* CVE-2026-22036

CVSS scores:

* CVE-2025-55130 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55130 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55131 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55131 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55132 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-55132 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-59465 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59465 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-59466 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59466 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21637 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-21637 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-22036 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22036 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 7 vulnerabilities and has 7 bug fixes can now be installed.

Description:

This update for nodejs22 fixes the following issues:

Update to 22.22.0:

- CVE-2025-55130: file system permissions bypass via crafted symlinks (bsc#1256569).
- CVE-2025-55131: timeout-based race conditions allow for allocations that contain leftover data from previous operations and lead to exposure of in-process secrets (bsc#1256570).
- CVE-2025-55132: a file's access and modification timestamps can be changed via `futimes()` even when the process has only read permissions (bsc#1256571).
- CVE-2025-59465: malformed HTTP/2 HEADERS frame with invalid HPACK data can cause a crash due to an unhandled error (bsc#1256573).
- CVE-2025-59466: uncatchable "Maximum call stack size exceeded" error when `async_hooks.createHook()` is enabled can lead to crash (bsc#1256574).
- CVE-2026-21637: synchronous exceptions thrown during certain callbacks bypass the standard TLS error handling paths and can cause a denial of service (bsc#1256576).
- CVE-2026-22036: undici: unbounded decompression chain in HTTP responses via Content-Encoding may lead to resource exhaustion (bsc#1256848).

For full changelog, please see https://nodejs.org/en/blog

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-287=1

Package List:

- openSUSE Leap 16.0:

corepack22-22.22.0-160000.1.1
nodejs22-22.22.0-160000.1.1
nodejs22-devel-22.22.0-160000.1.1
nodejs22-docs-22.22.0-160000.1.1
npm22-22.22.0-160000.1.1

References:

* https://www.suse.com/security/cve/CVE-2025-55130.html
* https://www.suse.com/security/cve/CVE-2025-55131.html
* https://www.suse.com/security/cve/CVE-2025-55132.html
* https://www.suse.com/security/cve/CVE-2025-59465.html
* https://www.suse.com/security/cve/CVE-2025-59466.html
* https://www.suse.com/security/cve/CVE-2026-21637.html
* https://www.suse.com/security/cve/CVE-2026-22036.html



openSUSE-SU-2026:10210-1: moderate: python311-pip-26.0.1-1.1 on GA media


# python311-pip-26.0.1-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10210-1
Rating: moderate

Cross-References:

* CVE-2026-1703

CVSS scores:

* CVE-2026-1703 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2026-1703 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python311-pip-26.0.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311-pip 26.0.1-1.1
* python311-pip-wheel 26.0.1-1.1
* python312-pip 26.0.1-1.1
* python312-pip-wheel 26.0.1-1.1
* python313-pip 26.0.1-1.1
* python313-pip-wheel 26.0.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-1703.html



openSUSE-SU-2026:10207-1: moderate: frr-10.2.1-4.1 on GA media


# frr-10.2.1-4.1 on GA media

Announcement ID: openSUSE-SU-2026:10207-1
Rating: moderate

Cross-References:

* CVE-2025-61099
* CVE-2025-61100
* CVE-2025-61104

CVSS scores:

* CVE-2025-61099 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61099 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61100 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61100 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61104 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61104 ( SUSE ): 6 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 3 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the frr-10.2.1-4.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* frr 10.2.1-4.1
* frr-devel 10.2.1-4.1
* libfrr0 10.2.1-4.1
* libfrr_pb0 10.2.1-4.1
* libfrrcares0 10.2.1-4.1
* libfrrfpm_pb0 10.2.1-4.1
* libfrrospfapiclient0 10.2.1-4.1
* libfrrsnmp0 10.2.1-4.1
* libfrrzmq0 10.2.1-4.1
* libmgmt_be_nb0 10.2.1-4.1

## References:

* https://www.suse.com/security/cve/CVE-2025-61099.html
* https://www.suse.com/security/cve/CVE-2025-61100.html
* https://www.suse.com/security/cve/CVE-2025-61104.html



openSUSE-SU-2026:10209-1: moderate: libsoup-2_4-1-2.74.3-16.1 on GA media


# libsoup-2_4-1-2.74.3-16.1 on GA media

Announcement ID: openSUSE-SU-2026:10209-1
Rating: moderate

Cross-References:

* CVE-2025-32049
* CVE-2026-2369
* CVE-2026-2443

CVSS scores:

* CVE-2025-32049 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-32049 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-2369 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-2369 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-2443 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-2443 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 3 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the libsoup-2_4-1-2.74.3-16.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libsoup-2_4-1 2.74.3-16.1
* libsoup-2_4-1-32bit 2.74.3-16.1
* libsoup2-devel 2.74.3-16.1
* libsoup2-devel-32bit 2.74.3-16.1
* libsoup2-lang 2.74.3-16.1
* typelib-1_0-Soup-2_4 2.74.3-16.1

## References:

* https://www.suse.com/security/cve/CVE-2025-32049.html
* https://www.suse.com/security/cve/CVE-2026-2369.html
* https://www.suse.com/security/cve/CVE-2026-2443.html



SUSE-SU-2026:0568-1: moderate: Security update for libxml2


# Security update for libxml2

Announcement ID: SUSE-SU-2026:0568-1
Release Date: 2026-02-17T12:26:31Z
Rating: moderate
References:

* bsc#1250553
* bsc#1256807
* bsc#1256808
* bsc#1256809
* bsc#1256811
* bsc#1256812
* bsc#1257593
* bsc#1257594
* bsc#1257595

Cross-References:

* CVE-2025-10911
* CVE-2026-0990
* CVE-2026-0992
* CVE-2026-1757

CVSS scores:

* CVE-2025-10911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-10911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-10911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0990 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0990 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0990 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0992 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0992 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-0992 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-1757 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-1757 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-1757 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2

An update that solves four vulnerabilities and has five security fixes can now
be installed.

## Description:

This update for libxml2 fixes the following issues:

* CVE-2026-0990: Fixed a call stack overflow leading to application crash due
to infinite recursion in `xmlCatalogXMLResolveURI`. (bsc#1256807,
bsc#1256811)
* CVE-2026-0992: Fixed an excessive resource consumption when processing XML
catalogs due to exponential behavior. (bsc#1256809, bsc#1256812)
* CVE-2026-1757: Fixed a memory leak in the `xmllint` interactive shell.
(bsc#1257594, bsc#1257595)
* CVE-2025-10911: Fixed a use-after-free with key data stored cross-RVT.
(bsc#1250553)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-568=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-568=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-568=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python3-libxml2-python-debuginfo-2.9.7-150000.3.94.1
* python3-libxml2-python-2.9.7-150000.3.94.1
* python-libxml2-python-debugsource-2.9.7-150000.3.94.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* python3-libxml2-python-debuginfo-2.9.7-150000.3.94.1
* libxml2-2-2.9.7-150000.3.94.1
* libxml2-2-debuginfo-2.9.7-150000.3.94.1
* libxml2-debugsource-2.9.7-150000.3.94.1
* python-libxml2-python-debugsource-2.9.7-150000.3.94.1
* libxml2-tools-debuginfo-2.9.7-150000.3.94.1
* libxml2-tools-2.9.7-150000.3.94.1
* python3-libxml2-python-2.9.7-150000.3.94.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* python3-libxml2-python-debuginfo-2.9.7-150000.3.94.1
* libxml2-2-2.9.7-150000.3.94.1
* libxml2-2-debuginfo-2.9.7-150000.3.94.1
* libxml2-debugsource-2.9.7-150000.3.94.1
* python-libxml2-python-debugsource-2.9.7-150000.3.94.1
* libxml2-tools-debuginfo-2.9.7-150000.3.94.1
* libxml2-tools-2.9.7-150000.3.94.1
* python3-libxml2-python-2.9.7-150000.3.94.1

## References:

* https://www.suse.com/security/cve/CVE-2025-10911.html
* https://www.suse.com/security/cve/CVE-2026-0990.html
* https://www.suse.com/security/cve/CVE-2026-0992.html
* https://www.suse.com/security/cve/CVE-2026-1757.html
* https://bugzilla.suse.com/show_bug.cgi?id=1250553
* https://bugzilla.suse.com/show_bug.cgi?id=1256807
* https://bugzilla.suse.com/show_bug.cgi?id=1256808
* https://bugzilla.suse.com/show_bug.cgi?id=1256809
* https://bugzilla.suse.com/show_bug.cgi?id=1256811
* https://bugzilla.suse.com/show_bug.cgi?id=1256812
* https://bugzilla.suse.com/show_bug.cgi?id=1257593
* https://bugzilla.suse.com/show_bug.cgi?id=1257594
* https://bugzilla.suse.com/show_bug.cgi?id=1257595



SUSE-SU-2026:0569-1: moderate: Security update for openCryptoki


# Security update for openCryptoki

Announcement ID: SUSE-SU-2026:0569-1
Release Date: 2026-02-17T12:45:40Z
Rating: moderate
References:

* bsc#1248002
* bsc#1257116

Cross-References:

* CVE-2026-23893

CVSS scores:

* CVE-2026-23893 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
* CVE-2026-23893 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise Micro 5.5

An update that solves one vulnerability and has one security fix can now be
installed.

## Description:

This update for openCryptoki fixes the following issues:

Security fixes:

* CVE-2026-23893: Fixed privilege escalation or data exposure via symlink
following (bsc#1257116)

Other fixes:

* Fixed FIPS mode (bsc#1248002)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-569=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-569=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* openCryptoki-3.23.0-150500.3.12.1
* openCryptoki-devel-debuginfo-3.23.0-150500.3.12.1
* openCryptoki-debuginfo-3.23.0-150500.3.12.1
* openCryptoki-devel-3.23.0-150500.3.12.1
* openCryptoki-debugsource-3.23.0-150500.3.12.1
* openSUSE Leap 15.5 (i586)
* openCryptoki-32bit-3.23.0-150500.3.12.1
* openCryptoki-32bit-debuginfo-3.23.0-150500.3.12.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* openCryptoki-64bit-3.23.0-150500.3.12.1
* openCryptoki-64bit-debuginfo-3.23.0-150500.3.12.1
* SUSE Linux Enterprise Micro 5.5 (s390x)
* openCryptoki-3.23.0-150500.3.12.1
* openCryptoki-debuginfo-3.23.0-150500.3.12.1
* openCryptoki-debugsource-3.23.0-150500.3.12.1

## References:

* https://www.suse.com/security/cve/CVE-2026-23893.html
* https://bugzilla.suse.com/show_bug.cgi?id=1248002
* https://bugzilla.suse.com/show_bug.cgi?id=1257116