SUSE-SU-2026:0563-1: moderate: Security update for protobuf
SUSE-SU-2026:0565-1: important: Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0566-1: important: Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4)
openSUSE-SU-2026:20236-1: important: Security update for nodejs22
openSUSE-SU-2026:10210-1: moderate: python311-pip-26.0.1-1.1 on GA media
openSUSE-SU-2026:10207-1: moderate: frr-10.2.1-4.1 on GA media
openSUSE-SU-2026:10209-1: moderate: libsoup-2_4-1-2.74.3-16.1 on GA media
SUSE-SU-2026:0568-1: moderate: Security update for libxml2
SUSE-SU-2026:0569-1: moderate: Security update for openCryptoki
SUSE-SU-2026:0563-1: moderate: Security update for protobuf
# Security update for protobuf
Announcement ID: SUSE-SU-2026:0563-1
Release Date: 2026-02-16T16:19:29Z
Rating: moderate
References:
* bsc#1257173
Cross-References:
* CVE-2026-0994
CVSS scores:
* CVE-2026-0994 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0994 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0994 ( NVD ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* openSUSE Leap 15.4
* Public Cloud Module 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for protobuf fixes the following issues:
* CVE-2026-0994: Fixed google.protobuf.Any recursion depth bypass in Python
json_format.ParseDict (bsc#1257173).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-563=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-563=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-563=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-563=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-563=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-563=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libprotobuf-lite25_1_0-25.1-150400.9.19.1
* protobuf-devel-debuginfo-25.1-150400.9.19.1
* libprotobuf25_1_0-debuginfo-25.1-150400.9.19.1
* protobuf-debugsource-25.1-150400.9.19.1
* libprotobuf25_1_0-25.1-150400.9.19.1
* python311-protobuf-4.25.1-150400.9.19.1
* libprotoc25_1_0-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.19.1
* libprotoc25_1_0-debuginfo-25.1-150400.9.19.1
* protobuf-devel-25.1-150400.9.19.1
* openSUSE Leap 15.4 (x86_64)
* libprotoc25_1_0-32bit-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-32bit-debuginfo-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-32bit-25.1-150400.9.19.1
* libprotobuf25_1_0-32bit-25.1-150400.9.19.1
* libprotoc25_1_0-32bit-debuginfo-25.1-150400.9.19.1
* libprotobuf25_1_0-32bit-debuginfo-25.1-150400.9.19.1
* openSUSE Leap 15.4 (noarch)
* protobuf-java-25.1-150400.9.19.1
* protobuf-java-bom-25.1-150400.9.19.1
* protobuf-java-parent-25.1-150400.9.19.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libprotobuf-lite25_1_0-64bit-debuginfo-25.1-150400.9.19.1
* libprotoc25_1_0-64bit-25.1-150400.9.19.1
* libprotoc25_1_0-64bit-debuginfo-25.1-150400.9.19.1
* libprotobuf25_1_0-64bit-debuginfo-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-64bit-25.1-150400.9.19.1
* libprotobuf25_1_0-64bit-25.1-150400.9.19.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.19.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.19.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.19.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.19.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.19.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* python311-protobuf-4.25.1-150400.9.19.1
* protobuf-debugsource-25.1-150400.9.19.1
## References:
* https://www.suse.com/security/cve/CVE-2026-0994.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257173
SUSE-SU-2026:0565-1: important: Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4)
# Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise
15 SP4)
Announcement ID: SUSE-SU-2026:0565-1
Release Date: 2026-02-16T18:04:25Z
Rating: important
References:
* bsc#1249205
* bsc#1249455
* bsc#1249480
* bsc#1250314
Cross-References:
* CVE-2023-53321
* CVE-2025-38111
* CVE-2025-38352
* CVE-2025-39742
CVSS scores:
* CVE-2023-53321 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53321 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53321 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-53321 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38111 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38111 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38111 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38352 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38352 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38352 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39742 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39742 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.173 fixes
various security issues
The following security issues were fixed:
* CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250314).
* CVE-2025-38111: net/mdiobus: Fix potential out-of-bounds read/write access
(bsc#1249455).
* CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers()
and posix_cpu_timer_del() (bsc#1249205).
* CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in
find_hw_thread_mask() (bsc#1249480).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-565=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2026-562=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-562=1 SUSE-2026-565=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_150-default-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_36-debugsource-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_43-debugsource-8-150400.2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_150-default-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_36-debugsource-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_43-debugsource-8-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-53321.html
* https://www.suse.com/security/cve/CVE-2025-38111.html
* https://www.suse.com/security/cve/CVE-2025-38352.html
* https://www.suse.com/security/cve/CVE-2025-39742.html
* https://bugzilla.suse.com/show_bug.cgi?id=1249205
* https://bugzilla.suse.com/show_bug.cgi?id=1249455
* https://bugzilla.suse.com/show_bug.cgi?id=1249480
* https://bugzilla.suse.com/show_bug.cgi?id=1250314
SUSE-SU-2026:0566-1: important: Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4)
# Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise
15 SP4)
Announcement ID: SUSE-SU-2026:0566-1
Release Date: 2026-02-17T06:33:41Z
Rating: important
References:
* bsc#1249455
* bsc#1249480
* bsc#1250314
Cross-References:
* CVE-2023-53321
* CVE-2025-38111
* CVE-2025-39742
CVSS scores:
* CVE-2023-53321 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53321 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53321 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-53321 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38111 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38111 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38111 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-39742 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39742 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.176 fixes
various security issues
The following security issues were fixed:
* CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250314).
* CVE-2025-38111: net/mdiobus: Fix potential out-of-bounds read/write access
(bsc#1249455).
* CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in
find_hw_thread_mask() (bsc#1249480).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-566=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-566=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_44-debugsource-7-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-7-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-7-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_44-debugsource-7-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-7-150400.2.1
* kernel-livepatch-5_14_21-150400_24_176-default-7-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-53321.html
* https://www.suse.com/security/cve/CVE-2025-38111.html
* https://www.suse.com/security/cve/CVE-2025-39742.html
* https://bugzilla.suse.com/show_bug.cgi?id=1249455
* https://bugzilla.suse.com/show_bug.cgi?id=1249480
* https://bugzilla.suse.com/show_bug.cgi?id=1250314
openSUSE-SU-2026:20236-1: important: Security update for nodejs22
openSUSE security update: security update for nodejs22
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20236-1
Rating: important
References:
* bsc#1256569
* bsc#1256570
* bsc#1256571
* bsc#1256573
* bsc#1256574
* bsc#1256576
* bsc#1256848
Cross-References:
* CVE-2025-55130
* CVE-2025-55131
* CVE-2025-55132
* CVE-2025-59465
* CVE-2025-59466
* CVE-2026-21637
* CVE-2026-22036
CVSS scores:
* CVE-2025-55130 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55130 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55131 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55131 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55132 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-55132 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-59465 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59465 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-59466 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59466 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21637 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-21637 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-22036 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22036 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 7 vulnerabilities and has 7 bug fixes can now be installed.
Description:
This update for nodejs22 fixes the following issues:
Update to 22.22.0:
- CVE-2025-55130: file system permissions bypass via crafted symlinks (bsc#1256569).
- CVE-2025-55131: timeout-based race conditions allow for allocations that contain leftover data from previous operations and lead to exposure of in-process secrets (bsc#1256570).
- CVE-2025-55132: a file's access and modification timestamps can be changed via `futimes()` even when the process has only read permissions (bsc#1256571).
- CVE-2025-59465: malformed HTTP/2 HEADERS frame with invalid HPACK data can cause a crash due to an unhandled error (bsc#1256573).
- CVE-2025-59466: uncatchable "Maximum call stack size exceeded" error when `async_hooks.createHook()` is enabled can lead to crash (bsc#1256574).
- CVE-2026-21637: synchronous exceptions thrown during certain callbacks bypass the standard TLS error handling paths and can cause a denial of service (bsc#1256576).
- CVE-2026-22036: undici: unbounded decompression chain in HTTP responses via Content-Encoding may lead to resource exhaustion (bsc#1256848).
For full changelog, please see https://nodejs.org/en/blog
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-287=1
Package List:
- openSUSE Leap 16.0:
corepack22-22.22.0-160000.1.1
nodejs22-22.22.0-160000.1.1
nodejs22-devel-22.22.0-160000.1.1
nodejs22-docs-22.22.0-160000.1.1
npm22-22.22.0-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2025-55130.html
* https://www.suse.com/security/cve/CVE-2025-55131.html
* https://www.suse.com/security/cve/CVE-2025-55132.html
* https://www.suse.com/security/cve/CVE-2025-59465.html
* https://www.suse.com/security/cve/CVE-2025-59466.html
* https://www.suse.com/security/cve/CVE-2026-21637.html
* https://www.suse.com/security/cve/CVE-2026-22036.html
openSUSE-SU-2026:10210-1: moderate: python311-pip-26.0.1-1.1 on GA media
# python311-pip-26.0.1-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10210-1
Rating: moderate
Cross-References:
* CVE-2026-1703
CVSS scores:
* CVE-2026-1703 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2026-1703 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the python311-pip-26.0.1-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python311-pip 26.0.1-1.1
* python311-pip-wheel 26.0.1-1.1
* python312-pip 26.0.1-1.1
* python312-pip-wheel 26.0.1-1.1
* python313-pip 26.0.1-1.1
* python313-pip-wheel 26.0.1-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-1703.html
openSUSE-SU-2026:10207-1: moderate: frr-10.2.1-4.1 on GA media
# frr-10.2.1-4.1 on GA media
Announcement ID: openSUSE-SU-2026:10207-1
Rating: moderate
Cross-References:
* CVE-2025-61099
* CVE-2025-61100
* CVE-2025-61104
CVSS scores:
* CVE-2025-61099 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61099 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61100 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61100 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61104 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61104 ( SUSE ): 6 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 3 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the frr-10.2.1-4.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* frr 10.2.1-4.1
* frr-devel 10.2.1-4.1
* libfrr0 10.2.1-4.1
* libfrr_pb0 10.2.1-4.1
* libfrrcares0 10.2.1-4.1
* libfrrfpm_pb0 10.2.1-4.1
* libfrrospfapiclient0 10.2.1-4.1
* libfrrsnmp0 10.2.1-4.1
* libfrrzmq0 10.2.1-4.1
* libmgmt_be_nb0 10.2.1-4.1
## References:
* https://www.suse.com/security/cve/CVE-2025-61099.html
* https://www.suse.com/security/cve/CVE-2025-61100.html
* https://www.suse.com/security/cve/CVE-2025-61104.html
openSUSE-SU-2026:10209-1: moderate: libsoup-2_4-1-2.74.3-16.1 on GA media
# libsoup-2_4-1-2.74.3-16.1 on GA media
Announcement ID: openSUSE-SU-2026:10209-1
Rating: moderate
Cross-References:
* CVE-2025-32049
* CVE-2026-2369
* CVE-2026-2443
CVSS scores:
* CVE-2025-32049 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-32049 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-2369 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-2369 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-2443 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-2443 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 3 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the libsoup-2_4-1-2.74.3-16.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libsoup-2_4-1 2.74.3-16.1
* libsoup-2_4-1-32bit 2.74.3-16.1
* libsoup2-devel 2.74.3-16.1
* libsoup2-devel-32bit 2.74.3-16.1
* libsoup2-lang 2.74.3-16.1
* typelib-1_0-Soup-2_4 2.74.3-16.1
## References:
* https://www.suse.com/security/cve/CVE-2025-32049.html
* https://www.suse.com/security/cve/CVE-2026-2369.html
* https://www.suse.com/security/cve/CVE-2026-2443.html
SUSE-SU-2026:0568-1: moderate: Security update for libxml2
# Security update for libxml2
Announcement ID: SUSE-SU-2026:0568-1
Release Date: 2026-02-17T12:26:31Z
Rating: moderate
References:
* bsc#1250553
* bsc#1256807
* bsc#1256808
* bsc#1256809
* bsc#1256811
* bsc#1256812
* bsc#1257593
* bsc#1257594
* bsc#1257595
Cross-References:
* CVE-2025-10911
* CVE-2026-0990
* CVE-2026-0992
* CVE-2026-1757
CVSS scores:
* CVE-2025-10911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-10911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-10911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0990 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0990 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0990 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0992 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0992 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-0992 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-1757 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-1757 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-1757 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
An update that solves four vulnerabilities and has five security fixes can now
be installed.
## Description:
This update for libxml2 fixes the following issues:
* CVE-2026-0990: Fixed a call stack overflow leading to application crash due
to infinite recursion in `xmlCatalogXMLResolveURI`. (bsc#1256807,
bsc#1256811)
* CVE-2026-0992: Fixed an excessive resource consumption when processing XML
catalogs due to exponential behavior. (bsc#1256809, bsc#1256812)
* CVE-2026-1757: Fixed a memory leak in the `xmllint` interactive shell.
(bsc#1257594, bsc#1257595)
* CVE-2025-10911: Fixed a use-after-free with key data stored cross-RVT.
(bsc#1250553)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-568=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-568=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-568=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python3-libxml2-python-debuginfo-2.9.7-150000.3.94.1
* python3-libxml2-python-2.9.7-150000.3.94.1
* python-libxml2-python-debugsource-2.9.7-150000.3.94.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* python3-libxml2-python-debuginfo-2.9.7-150000.3.94.1
* libxml2-2-2.9.7-150000.3.94.1
* libxml2-2-debuginfo-2.9.7-150000.3.94.1
* libxml2-debugsource-2.9.7-150000.3.94.1
* python-libxml2-python-debugsource-2.9.7-150000.3.94.1
* libxml2-tools-debuginfo-2.9.7-150000.3.94.1
* libxml2-tools-2.9.7-150000.3.94.1
* python3-libxml2-python-2.9.7-150000.3.94.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* python3-libxml2-python-debuginfo-2.9.7-150000.3.94.1
* libxml2-2-2.9.7-150000.3.94.1
* libxml2-2-debuginfo-2.9.7-150000.3.94.1
* libxml2-debugsource-2.9.7-150000.3.94.1
* python-libxml2-python-debugsource-2.9.7-150000.3.94.1
* libxml2-tools-debuginfo-2.9.7-150000.3.94.1
* libxml2-tools-2.9.7-150000.3.94.1
* python3-libxml2-python-2.9.7-150000.3.94.1
## References:
* https://www.suse.com/security/cve/CVE-2025-10911.html
* https://www.suse.com/security/cve/CVE-2026-0990.html
* https://www.suse.com/security/cve/CVE-2026-0992.html
* https://www.suse.com/security/cve/CVE-2026-1757.html
* https://bugzilla.suse.com/show_bug.cgi?id=1250553
* https://bugzilla.suse.com/show_bug.cgi?id=1256807
* https://bugzilla.suse.com/show_bug.cgi?id=1256808
* https://bugzilla.suse.com/show_bug.cgi?id=1256809
* https://bugzilla.suse.com/show_bug.cgi?id=1256811
* https://bugzilla.suse.com/show_bug.cgi?id=1256812
* https://bugzilla.suse.com/show_bug.cgi?id=1257593
* https://bugzilla.suse.com/show_bug.cgi?id=1257594
* https://bugzilla.suse.com/show_bug.cgi?id=1257595
SUSE-SU-2026:0569-1: moderate: Security update for openCryptoki
# Security update for openCryptoki
Announcement ID: SUSE-SU-2026:0569-1
Release Date: 2026-02-17T12:45:40Z
Rating: moderate
References:
* bsc#1248002
* bsc#1257116
Cross-References:
* CVE-2026-23893
CVSS scores:
* CVE-2026-23893 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
* CVE-2026-23893 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Micro 5.5
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for openCryptoki fixes the following issues:
Security fixes:
* CVE-2026-23893: Fixed privilege escalation or data exposure via symlink
following (bsc#1257116)
Other fixes:
* Fixed FIPS mode (bsc#1248002)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-569=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-569=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* openCryptoki-3.23.0-150500.3.12.1
* openCryptoki-devel-debuginfo-3.23.0-150500.3.12.1
* openCryptoki-debuginfo-3.23.0-150500.3.12.1
* openCryptoki-devel-3.23.0-150500.3.12.1
* openCryptoki-debugsource-3.23.0-150500.3.12.1
* openSUSE Leap 15.5 (i586)
* openCryptoki-32bit-3.23.0-150500.3.12.1
* openCryptoki-32bit-debuginfo-3.23.0-150500.3.12.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* openCryptoki-64bit-3.23.0-150500.3.12.1
* openCryptoki-64bit-debuginfo-3.23.0-150500.3.12.1
* SUSE Linux Enterprise Micro 5.5 (s390x)
* openCryptoki-3.23.0-150500.3.12.1
* openCryptoki-debuginfo-3.23.0-150500.3.12.1
* openCryptoki-debugsource-3.23.0-150500.3.12.1
## References:
* https://www.suse.com/security/cve/CVE-2026-23893.html
* https://bugzilla.suse.com/show_bug.cgi?id=1248002
* https://bugzilla.suse.com/show_bug.cgi?id=1257116