SUSE 5538 Published by

Security updates have been released for various components on SUSE Linux, including Python and corepack packages. Additionally, several security updates are available for important components such as ovmf, libsoup, go1.25, kernel-firmware, and more. These updates address moderate to critical vulnerabilities and are categorized by severity: moderate, important, and critical.

openSUSE-SU-2026:10079-1: moderate: python311-weasyprint-68.0-1.1 on GA media
openSUSE-SU-2026:10075-1: moderate: corepack24-24.13.0-2.1 on GA media
openSUSE-SU-2026:10078-1: moderate: python311-pyasn1-0.6.2-1.1 on GA media
openSUSE-SU-2026:10074-1: moderate: corepack22-22.22.0-1.1 on GA media
openSUSE-SU-2026:10073-1: moderate: alloy-1.12.2-2.1 on GA media
SUSE-SU-2026:0212-1: important: Security update for ovmf
SUSE-SU-2026:0211-1: important: Security update for libsoup
SUSE-SU-2026:0218-1: important: Security update for go1.25
SUSE-SU-2026:0213-1: important: Security update for ovmf
SUSE-SU-2026:0217-1: critical: Security update for keylime
SUSE-SU-2026:0220-1: moderate: Security update for python-filelock
SUSE-SU-2026:0216-1: important: Security update for kernel-firmware
SUSE-SU-2026:0219-1: important: Security update for go1.24
SUSE-SU-2026:0226-1: moderate: Security update for python-marshmallow
SUSE-SU-2026:0224-1: moderate: Security update for libtasn1
SUSE-SU-2026:0223-1: moderate: Security update for libsodium
SUSE-SU-2026:0227-1: important: Security update for net-snmp
SUSE-SU-2026:0232-1: important: Security update for pgadmin4
SUSE-SU-2026:0229-1: important: Security update for ffmpeg-4
SUSE-SU-2026:0233-1: moderate: Security update for python-virtualenv
SUSE-SU-2026:0234-1: moderate: Security update for libpng16
SUSE-SU-2026:0228-1: important: Security update for net-snmp
SUSE-SU-2026:0231-1: low: Security update for exiv2-0_26
SUSE-SU-2026:0243-1: moderate: Security update for librsvg
SUSE-SU-2026:0245-1: moderate: Security update for php7
SUSE-SU-2026:0236-1: important: Security update for busybox
SUSE-SU-2026:0237-1: moderate: Security update for wireshark
SUSE-SU-2026:0246-1: important: Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5)




openSUSE-SU-2026:10079-1: moderate: python311-weasyprint-68.0-1.1 on GA media


# python311-weasyprint-68.0-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10079-1
Rating: moderate

Cross-References:

* CVE-2025-68616

CVSS scores:

* CVE-2025-68616 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python311-weasyprint-68.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311-weasyprint 68.0-1.1
* python312-weasyprint 68.0-1.1
* python313-weasyprint 68.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-68616.html



openSUSE-SU-2026:10075-1: moderate: corepack24-24.13.0-2.1 on GA media


# corepack24-24.13.0-2.1 on GA media

Announcement ID: openSUSE-SU-2026:10075-1
Rating: moderate

Cross-References:

* CVE-2026-22036

CVSS scores:

* CVE-2026-22036 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22036 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the corepack24-24.13.0-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* corepack24 24.13.0-2.1
* nodejs24 24.13.0-2.1
* nodejs24-devel 24.13.0-2.1
* nodejs24-docs 24.13.0-2.1
* npm24 24.13.0-2.1

## References:

* https://www.suse.com/security/cve/CVE-2026-22036.html



openSUSE-SU-2026:10078-1: moderate: python311-pyasn1-0.6.2-1.1 on GA media


# python311-pyasn1-0.6.2-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10078-1
Rating: moderate

Cross-References:

* CVE-2026-2141
* CVE-2026-23490

CVSS scores:

* CVE-2026-23490 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the python311-pyasn1-0.6.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311-pyasn1 0.6.2-1.1
* python312-pyasn1 0.6.2-1.1
* python313-pyasn1 0.6.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-2141.html
* https://www.suse.com/security/cve/CVE-2026-23490.html



openSUSE-SU-2026:10074-1: moderate: corepack22-22.22.0-1.1 on GA media


# corepack22-22.22.0-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10074-1
Rating: moderate

Cross-References:

* CVE-2025-55130
* CVE-2025-55131
* CVE-2025-55132
* CVE-2025-59465
* CVE-2025-59466
* CVE-2026-21637
* CVE-2026-22036

CVSS scores:

* CVE-2025-55130 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55130 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55131 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55131 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55132 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-55132 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-59465 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59465 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-59466 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59466 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21637 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-21637 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-22036 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22036 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 7 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the corepack22-22.22.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* corepack22 22.22.0-1.1
* nodejs22 22.22.0-1.1
* nodejs22-devel 22.22.0-1.1
* nodejs22-docs 22.22.0-1.1
* npm22 22.22.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-55130.html
* https://www.suse.com/security/cve/CVE-2025-55131.html
* https://www.suse.com/security/cve/CVE-2025-55132.html
* https://www.suse.com/security/cve/CVE-2025-59465.html
* https://www.suse.com/security/cve/CVE-2025-59466.html
* https://www.suse.com/security/cve/CVE-2026-21637.html
* https://www.suse.com/security/cve/CVE-2026-22036.html



openSUSE-SU-2026:10073-1: moderate: alloy-1.12.2-2.1 on GA media


# alloy-1.12.2-2.1 on GA media

Announcement ID: openSUSE-SU-2026:10073-1
Rating: moderate

Cross-References:

* CVE-2025-31133
* CVE-2025-68156

CVSS scores:

* CVE-2025-31133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-31133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-68156 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68156 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the alloy-1.12.2-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* alloy 1.12.2-2.1

## References:

* https://www.suse.com/security/cve/CVE-2025-31133.html
* https://www.suse.com/security/cve/CVE-2025-68156.html



SUSE-SU-2026:0212-1: important: Security update for ovmf


# Security update for ovmf

Announcement ID: SUSE-SU-2026:0212-1
Release Date: 2026-01-22T12:08:35Z
Rating: important
References:

* bsc#1218680

Cross-References:

* CVE-2022-36765

CVSS scores:

* CVE-2022-36765 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
* CVE-2022-36765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-36765 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that solves one vulnerability can now be installed.

## Description:

This update for ovmf fixes the following issues:

* CVE-2022-36765: Fixed integer overflow to buffer overflow via local network
vulnerability (bsc#1218680).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-212=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-212=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-212=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-212=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-212=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-212=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-212=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-212=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-212=1

## Package List:

* openSUSE Leap 15.4 (aarch64 x86_64)
* ovmf-202202-150400.5.21.1
* ovmf-tools-202202-150400.5.21.1
* openSUSE Leap 15.4 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch32-202202-150400.5.21.1
* qemu-ovmf-ia32-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* openSUSE Leap 15.4 (x86_64)
* qemu-ovmf-x86_64-debug-202202-150400.5.21.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* ovmf-202202-150400.5.21.1
* ovmf-tools-202202-150400.5.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* ovmf-202202-150400.5.21.1
* ovmf-tools-202202-150400.5.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64)
* ovmf-202202-150400.5.21.1
* ovmf-tools-202202-150400.5.21.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* ovmf-202202-150400.5.21.1
* ovmf-tools-202202-150400.5.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1

## References:

* https://www.suse.com/security/cve/CVE-2022-36765.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218680



SUSE-SU-2026:0211-1: important: Security update for libsoup


# Security update for libsoup

Announcement ID: SUSE-SU-2026:0211-1
Release Date: 2026-01-22T12:08:12Z
Rating: important
References:

* bsc#1254876
* bsc#1256399
* bsc#1256418

Cross-References:

* CVE-2025-14523
* CVE-2026-0716
* CVE-2026-0719

CVSS scores:

* CVE-2025-14523 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-14523 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2025-14523 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2026-0716 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0716 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L
* CVE-2026-0716 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-0719 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0719 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-0719 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves three vulnerabilities can now be installed.

## Description:

This update for libsoup fixes the following issues:

* CVE-2025-14523: Reject duplicated Host in headers and followed upstream
update (bsc#1254876).
* CVE-2026-0716: Fixed out-of-bounds read for websocket (bsc#1256418)
* CVE-2026-0719: Fixed overflow for password md4sum (bsc#1256399)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-211=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-211=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-211=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-211=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-211=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-211=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-211=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-211=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-211=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* openSUSE Leap 15.4 (x86_64)
* libsoup-3_0-0-32bit-debuginfo-3.0.4-150400.3.28.1
* libsoup-3_0-0-32bit-3.0.4-150400.3.28.1
* libsoup-devel-32bit-3.0.4-150400.3.28.1
* openSUSE Leap 15.4 (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libsoup-devel-64bit-3.0.4-150400.3.28.1
* libsoup-3_0-0-64bit-debuginfo-3.0.4-150400.3.28.1
* libsoup-3_0-0-64bit-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.28.1

## References:

* https://www.suse.com/security/cve/CVE-2025-14523.html
* https://www.suse.com/security/cve/CVE-2026-0716.html
* https://www.suse.com/security/cve/CVE-2026-0719.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254876
* https://bugzilla.suse.com/show_bug.cgi?id=1256399
* https://bugzilla.suse.com/show_bug.cgi?id=1256418



SUSE-SU-2026:0218-1: important: Security update for go1.25


# Security update for go1.25

Announcement ID: SUSE-SU-2026:0218-1
Release Date: 2026-01-22T12:13:12Z
Rating: important
References:

* bsc#1244485
* bsc#1256816
* bsc#1256817
* bsc#1256818
* bsc#1256819
* bsc#1256820
* bsc#1256821

Cross-References:

* CVE-2025-61726
* CVE-2025-61728
* CVE-2025-61730
* CVE-2025-61731
* CVE-2025-68119
* CVE-2025-68121

CVSS scores:

* CVE-2025-61726 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61726 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61728 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61730 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-61730 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-61731 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61731 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68119 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68119 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68121 ( SUSE ): 7.6
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Affected Products:

* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves six vulnerabilities and has one security fix can now be
installed.

## Description:

This update for go1.25 fixes the following issues:

Update to go1.25.6 (released 2026-01-15) (bsc#1244485)

Security fixes:

* CVE-2025-61730: crypto/tls: handshake messages may be processed at the
incorrect encryption level (bsc#1256821).
* CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain
(bsc#1256820).
* CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary
code execution (bsc#1256819).
* CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm
(bsc#1256817).
* CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP
archives (bsc#1256816).
* CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated
session ticket keys, session resumption does not account for the expiration
of full certificate chain (bsc#1256818).

Other fixes:

* go#76392 os: package initialization hangs is Stdin is blocked
* go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH
enabled
* go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes
* go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4
windows 386
* go#76776 runtime: race detector crash on ppc64le
* go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while
compiling <function>: runtime error: index out of range
* go#76973 errors: errors.Join behavior changed in 1.25

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-218=1

* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-218=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-218=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-218=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-218=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-218=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-218=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-218=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-218=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-218=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-218=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-218=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1

## References:

* https://www.suse.com/security/cve/CVE-2025-61726.html
* https://www.suse.com/security/cve/CVE-2025-61728.html
* https://www.suse.com/security/cve/CVE-2025-61730.html
* https://www.suse.com/security/cve/CVE-2025-61731.html
* https://www.suse.com/security/cve/CVE-2025-68119.html
* https://www.suse.com/security/cve/CVE-2025-68121.html
* https://bugzilla.suse.com/show_bug.cgi?id=1244485
* https://bugzilla.suse.com/show_bug.cgi?id=1256816
* https://bugzilla.suse.com/show_bug.cgi?id=1256817
* https://bugzilla.suse.com/show_bug.cgi?id=1256818
* https://bugzilla.suse.com/show_bug.cgi?id=1256819
* https://bugzilla.suse.com/show_bug.cgi?id=1256820
* https://bugzilla.suse.com/show_bug.cgi?id=1256821



SUSE-SU-2026:0213-1: important: Security update for ovmf


# Security update for ovmf

Announcement ID: SUSE-SU-2026:0213-1
Release Date: 2026-01-22T12:08:49Z
Rating: important
References:

* bsc#1218680

Cross-References:

* CVE-2022-36765

CVSS scores:

* CVE-2022-36765 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
* CVE-2022-36765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-36765 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for ovmf fixes the following issues:

* CVE-2022-36765: Fixed integer overflow to buffer overflow via local network
vulnerability (bsc#1218680).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-213=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-213=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-213=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-213=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-213=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-213=1

## Package List:

* openSUSE Leap 15.5 (aarch64 x86_64)
* ovmf-202208-150500.6.12.1
* ovmf-tools-202208-150500.6.12.1
* openSUSE Leap 15.5 (noarch)
* qemu-uefi-aarch64-202208-150500.6.12.1
* qemu-ovmf-x86_64-202208-150500.6.12.1
* qemu-uefi-aarch32-202208-150500.6.12.1
* qemu-ovmf-ia32-202208-150500.6.12.1
* openSUSE Leap 15.5 (x86_64)
* qemu-ovmf-x86_64-debug-202208-150500.6.12.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* qemu-ovmf-x86_64-202208-150500.6.12.1
* qemu-uefi-aarch64-202208-150500.6.12.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* ovmf-202208-150500.6.12.1
* ovmf-tools-202208-150500.6.12.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* qemu-ovmf-x86_64-202208-150500.6.12.1
* qemu-uefi-aarch64-202208-150500.6.12.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* ovmf-202208-150500.6.12.1
* ovmf-tools-202208-150500.6.12.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* qemu-ovmf-x86_64-202208-150500.6.12.1
* qemu-uefi-aarch64-202208-150500.6.12.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 x86_64)
* ovmf-202208-150500.6.12.1
* ovmf-tools-202208-150500.6.12.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* qemu-ovmf-x86_64-202208-150500.6.12.1
* qemu-uefi-aarch64-202208-150500.6.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* ovmf-202208-150500.6.12.1
* ovmf-tools-202208-150500.6.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* qemu-ovmf-x86_64-202208-150500.6.12.1

## References:

* https://www.suse.com/security/cve/CVE-2022-36765.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218680



SUSE-SU-2026:0217-1: critical: Security update for keylime


# Security update for keylime

Announcement ID: SUSE-SU-2026:0217-1
Release Date: 2026-01-22T12:12:11Z
Rating: critical
References:

* bsc#1254199

Cross-References:

* CVE-2025-13609

CVSS scores:

* CVE-2025-13609 ( SUSE ): 9.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
* CVE-2025-13609 ( SUSE ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-13609 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for keylime fixes the following issues:

* CVE-2025-13609: avoid re-registration of clients with same UUID but with
different TPM identity (bsc#1254199).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-217=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-217=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-217=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-217=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-217=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-217=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-217=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-217=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-217=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-217=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-217=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-217=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-217=1

## Package List:

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* openSUSE Leap 15.4 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* openSUSE Leap 15.6 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* Basesystem Module 15-SP7 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1

## References:

* https://www.suse.com/security/cve/CVE-2025-13609.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254199



SUSE-SU-2026:0220-1: moderate: Security update for python-filelock


# Security update for python-filelock

Announcement ID: SUSE-SU-2026:0220-1
Release Date: 2026-01-22T12:15:30Z
Rating: moderate
References:

* bsc#1255244
* bsc#1256457

Cross-References:

* CVE-2025-68146
* CVE-2026-22701

CVSS scores:

* CVE-2025-68146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-68146 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-22701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-22701 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves two vulnerabilities can now be installed.

## Description:

This update for python-filelock fixes the following issues:

* CVE-2025-68146: TOCTOU race condition may allow local attackers to corrupt
or truncate arbitrary user files (bsc#1255244).
* CVE-2026-22701: TOCTOU race condition in the SoftFileLock implementation
(bsc#1256457).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-220=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-220=1

* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-220=1

## Package List:

* openSUSE Leap 15.4 (noarch)
* python311-filelock-3.12.2-150400.10.8.1
* openSUSE Leap 15.6 (noarch)
* python311-filelock-3.12.2-150400.10.8.1
* Python 3 Module 15-SP7 (noarch)
* python311-filelock-3.12.2-150400.10.8.1

## References:

* https://www.suse.com/security/cve/CVE-2025-68146.html
* https://www.suse.com/security/cve/CVE-2026-22701.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255244
* https://bugzilla.suse.com/show_bug.cgi?id=1256457



SUSE-SU-2026:0216-1: important: Security update for kernel-firmware


# Security update for kernel-firmware

Announcement ID: SUSE-SU-2026:0216-1
Release Date: 2026-01-22T12:11:06Z
Rating: important
References:

* bsc#1256483

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that has one security fix can now be installed.

## Description:

This update for kernel-firmware fixes the following issues:

* Update AMD CPU ucode to 20251203 (bsc#1256483)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-216=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-216=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-216=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-216=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-216=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-216=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-216=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-216=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-216=1

## Package List:

* openSUSE Leap 15.4 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1

## References:

* https://bugzilla.suse.com/show_bug.cgi?id=1256483



SUSE-SU-2026:0219-1: important: Security update for go1.24


# Security update for go1.24

Announcement ID: SUSE-SU-2026:0219-1
Release Date: 2026-01-22T12:14:15Z
Rating: important
References:

* bsc#1236217
* bsc#1256816
* bsc#1256817
* bsc#1256818
* bsc#1256819
* bsc#1256820
* bsc#1256821

Cross-References:

* CVE-2025-61726
* CVE-2025-61728
* CVE-2025-61730
* CVE-2025-61731
* CVE-2025-68119
* CVE-2025-68121

CVSS scores:

* CVE-2025-61726 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61726 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61728 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61730 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-61730 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-61731 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61731 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68119 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68119 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68121 ( SUSE ): 7.6
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Affected Products:

* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves six vulnerabilities and has one security fix can now be
installed.

## Description:

This update for go1.24 fixes the following issues:

Update to go1.24.12 (released 2026-01-15) (bsc#1236217)

Security fixes:

* CVE-2025-61730: crypto/tls: handshake messages may be processed at the
incorrect encryption level (bsc#1256821).
* CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain
(bsc#1256820).
* CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary
code execution (bsc#1256819).
* CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm
(bsc#1256817).
* CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP
archives (bsc#1256816).
* CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated
session ticket keys, session resumption does not account for the expiration
of full certificate chain (bsc#1256818).

Other fixes:

* go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH
enabled
* go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes
* go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4
windows 386
* go#76796 runtime: race detector crash on ppc64le
* go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while
compiling <function>: runtime error: index out of range

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-219=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-219=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-219=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-219=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-219=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-219=1

* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-219=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-219=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-219=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-219=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-219=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-219=1

## Package List:

* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1

## References:

* https://www.suse.com/security/cve/CVE-2025-61726.html
* https://www.suse.com/security/cve/CVE-2025-61728.html
* https://www.suse.com/security/cve/CVE-2025-61730.html
* https://www.suse.com/security/cve/CVE-2025-61731.html
* https://www.suse.com/security/cve/CVE-2025-68119.html
* https://www.suse.com/security/cve/CVE-2025-68121.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236217
* https://bugzilla.suse.com/show_bug.cgi?id=1256816
* https://bugzilla.suse.com/show_bug.cgi?id=1256817
* https://bugzilla.suse.com/show_bug.cgi?id=1256818
* https://bugzilla.suse.com/show_bug.cgi?id=1256819
* https://bugzilla.suse.com/show_bug.cgi?id=1256820
* https://bugzilla.suse.com/show_bug.cgi?id=1256821



SUSE-SU-2026:0226-1: moderate: Security update for python-marshmallow


# Security update for python-marshmallow

Announcement ID: SUSE-SU-2026:0226-1
Release Date: 2026-01-22T12:20:28Z
Rating: moderate
References:

* bsc#1255473

Cross-References:

* CVE-2025-68480

CVSS scores:

* CVE-2025-68480 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-68480 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-68480 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Public Cloud Module 15-SP6
* Public Cloud Module 15-SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for python-marshmallow fixes the following issues:

* CVE-2025-68480: Fixed possible DoS when using Schema.load(data, many=True)
(bsc#1255473).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-226=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-226=1

* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-226=1

* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2026-226=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2026-226=1

* Public Cloud Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2026-226=1

## Package List:

* openSUSE Leap 15.4 (noarch)
* python311-marshmallow-3.20.2-150400.9.10.1
* openSUSE Leap 15.6 (noarch)
* python311-marshmallow-3.20.2-150400.9.10.1
* Public Cloud Module 15-SP4 (noarch)
* python311-marshmallow-3.20.2-150400.9.10.1
* Public Cloud Module 15-SP5 (noarch)
* python311-marshmallow-3.20.2-150400.9.10.1
* Public Cloud Module 15-SP6 (noarch)
* python311-marshmallow-3.20.2-150400.9.10.1
* Public Cloud Module 15-SP7 (noarch)
* python311-marshmallow-3.20.2-150400.9.10.1

## References:

* https://www.suse.com/security/cve/CVE-2025-68480.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255473



SUSE-SU-2026:0224-1: moderate: Security update for libtasn1


# Security update for libtasn1

Announcement ID: SUSE-SU-2026:0224-1
Release Date: 2026-01-22T12:18:39Z
Rating: moderate
References:

* bsc#1256341

Cross-References:

* CVE-2025-13151

CVSS scores:

* CVE-2025-13151 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-13151 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
* CVE-2025-13151 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for libtasn1 fixes the following issues:

* CVE-2025-13151: stack-based buffer overflow in `asn1_expend_octet_string`
(bsc#1256341).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-224=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-224=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-224=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-224=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-224=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-224=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-224=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-224=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-224=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-devel-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* openSUSE Leap 15.6 (x86_64)
* libtasn1-devel-32bit-4.13-150000.4.14.1
* libtasn1-6-32bit-4.13-150000.4.14.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.14.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-devel-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* Basesystem Module 15-SP7 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.14.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.14.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1

## References:

* https://www.suse.com/security/cve/CVE-2025-13151.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256341



SUSE-SU-2026:0223-1: moderate: Security update for libsodium


# Security update for libsodium

Announcement ID: SUSE-SU-2026:0223-1
Release Date: 2026-01-22T12:18:06Z
Rating: moderate
References:

* bsc#1256070

Cross-References:

* CVE-2025-15444

CVSS scores:

* CVE-2025-15444 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-15444 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for libsodium fixes the following issues:

* CVE-2025-15444: fixed cryptographic bypass via improper elliptic curve point
validation (bsc#1256070).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-223=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-223=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-223=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-223=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-223=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-223=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-223=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-223=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-223=1

## Package List:

* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium-devel-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* openSUSE Leap 15.6 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.11.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.11.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium-devel-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* Basesystem Module 15-SP7 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.11.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.11.1

## References:

* https://www.suse.com/security/cve/CVE-2025-15444.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256070



SUSE-SU-2026:0227-1: important: Security update for net-snmp


# Security update for net-snmp

Announcement ID: SUSE-SU-2026:0227-1
Release Date: 2026-01-22T12:21:40Z
Rating: important
References:

* bsc#1255491

Cross-References:

* CVE-2025-68615

CVSS scores:

* CVE-2025-68615 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68615 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68615 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for net-snmp fixes the following issues:

* CVE-2025-68615: Fixed snmptrapd buffer overflow (bsc#1255491)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-227=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-227=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-227=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-227=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-227=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-227=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-227=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-227=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-227=1

* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-227=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-227=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-227=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-227=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-227=1

## Package List:

* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* net-snmp-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* openSUSE Leap 15.3 (x86_64)
* net-snmp-devel-32bit-5.9.4-150300.15.21.1
* libsnmp40-32bit-5.9.4-150300.15.21.1
* libsnmp40-32bit-debuginfo-5.9.4-150300.15.21.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python3-net-snmp-5.9.4-150300.15.21.1
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* python2-net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* python2-net-snmp-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* python3-net-snmp-debuginfo-5.9.4-150300.15.21.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* net-snmp-devel-64bit-5.9.4-150300.15.21.1
* libsnmp40-64bit-debuginfo-5.9.4-150300.15.21.1
* libsnmp40-64bit-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1

## References:

* https://www.suse.com/security/cve/CVE-2025-68615.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255491



SUSE-SU-2026:0232-1: important: Security update for pgadmin4


# Security update for pgadmin4

Announcement ID: SUSE-SU-2026:0232-1
Release Date: 2026-01-22T12:24:17Z
Rating: important
References:

* bsc#1249151

Cross-References:

* CVE-2025-9636

CVSS scores:

* CVE-2025-9636 ( SUSE ): 7.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2025-9636 ( SUSE ): 7.9 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
* CVE-2025-9636 ( NVD ): 7.9 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L

Affected Products:

* openSUSE Leap 15.3
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for pgadmin4 fixes the following issues:

* CVE-2025-9636: Fixed Cross-Origin Opener Policy (COOP) vulnerability
(bsc#1249151).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-232=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-232=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-232=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-232=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-232=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-232=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-232=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-232=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-232=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-232=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-232=1

* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-232=1

## Package List:

* Python 3 Module 15-SP7 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* Python 3 Module 15-SP7 (s390x)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (s390x)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* pgadmin4-web-4.30-150300.3.24.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* openSUSE Leap 15.3 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* pgadmin4-web-uwsgi-4.30-150300.3.24.1

## References:

* https://www.suse.com/security/cve/CVE-2025-9636.html
* https://bugzilla.suse.com/show_bug.cgi?id=1249151



SUSE-SU-2026:0229-1: important: Security update for ffmpeg-4


# Security update for ffmpeg-4

Announcement ID: SUSE-SU-2026:0229-1
Release Date: 2026-01-22T12:22:23Z
Rating: important
References:

* bsc#1220545
* bsc#1255392

Cross-References:

* CVE-2023-6601
* CVE-2025-63757

CVSS scores:

* CVE-2023-6601 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2023-6601 ( NVD ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
* CVE-2023-6601 ( NVD ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
* CVE-2025-63757 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-63757 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-63757 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that solves two vulnerabilities can now be installed.

## Description:

This update for ffmpeg-4 fixes the following issues:

* CVE-2023-6601: Fixed HLS Unsafe File Extension Bypass (bsc#1220545).
* CVE-2025-63757: Fixed integer overflow in yuv2ya16_X_c_template()
(bsc#1255392).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-229=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-229=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-229=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-229=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-229=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libavformat58_76-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-4.4.6-150400.3.60.1
* libavresample4_0-debuginfo-4.4.6-150400.3.60.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-debugsource-4.4.6-150400.3.60.1
* ffmpeg-4-libswresample-devel-4.4.6-150400.3.60.1
* libavutil56_70-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-libavresample-devel-4.4.6-150400.3.60.1
* libavcodec58_134-4.4.6-150400.3.60.1
* libavfilter7_110-4.4.6-150400.3.60.1
* libavformat58_76-4.4.6-150400.3.60.1
* libavutil56_70-4.4.6-150400.3.60.1
* libswresample3_9-4.4.6-150400.3.60.1
* ffmpeg-4-private-devel-4.4.6-150400.3.60.1
* libswresample3_9-debuginfo-4.4.6-150400.3.60.1
* libavresample4_0-4.4.6-150400.3.60.1
* libavfilter7_110-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-libavformat-devel-4.4.6-150400.3.60.1
* ffmpeg-4-libavutil-devel-4.4.6-150400.3.60.1
* libpostproc55_9-4.4.6-150400.3.60.1
* libswscale5_9-4.4.6-150400.3.60.1
* libswscale5_9-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-libavcodec-devel-4.4.6-150400.3.60.1
* libavdevice58_13-4.4.6-150400.3.60.1
* ffmpeg-4-libavdevice-devel-4.4.6-150400.3.60.1
* libavdevice58_13-debuginfo-4.4.6-150400.3.60.1
* libpostproc55_9-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-libavfilter-devel-4.4.6-150400.3.60.1
* ffmpeg-4-libswscale-devel-4.4.6-150400.3.60.1
* ffmpeg-4-libpostproc-devel-4.4.6-150400.3.60.1
* openSUSE Leap 15.4 (x86_64)
* libavutil56_70-32bit-debuginfo-4.4.6-150400.3.60.1
* libswscale5_9-32bit-debuginfo-4.4.6-150400.3.60.1
* libavfilter7_110-32bit-debuginfo-4.4.6-150400.3.60.1
* libavfilter7_110-32bit-4.4.6-150400.3.60.1
* libpostproc55_9-32bit-4.4.6-150400.3.60.1
* libpostproc55_9-32bit-debuginfo-4.4.6-150400.3.60.1
* libavcodec58_134-32bit-4.4.6-150400.3.60.1
* libswresample3_9-32bit-debuginfo-4.4.6-150400.3.60.1
* libavdevice58_13-32bit-debuginfo-4.4.6-150400.3.60.1
* libavresample4_0-32bit-debuginfo-4.4.6-150400.3.60.1
* libavutil56_70-32bit-4.4.6-150400.3.60.1
* libavformat58_76-32bit-debuginfo-4.4.6-150400.3.60.1
* libswresample3_9-32bit-4.4.6-150400.3.60.1
* libavcodec58_134-32bit-debuginfo-4.4.6-150400.3.60.1
* libavformat58_76-32bit-4.4.6-150400.3.60.1
* libswscale5_9-32bit-4.4.6-150400.3.60.1
* libavdevice58_13-32bit-4.4.6-150400.3.60.1
* libavresample4_0-32bit-4.4.6-150400.3.60.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libavresample4_0-64bit-debuginfo-4.4.6-150400.3.60.1
* libavdevice58_13-64bit-debuginfo-4.4.6-150400.3.60.1
* libavformat58_76-64bit-4.4.6-150400.3.60.1
* libavcodec58_134-64bit-debuginfo-4.4.6-150400.3.60.1
* libavutil56_70-64bit-debuginfo-4.4.6-150400.3.60.1
* libavformat58_76-64bit-debuginfo-4.4.6-150400.3.60.1
* libswresample3_9-64bit-4.4.6-150400.3.60.1
* libavdevice58_13-64bit-4.4.6-150400.3.60.1
* libswscale5_9-64bit-4.4.6-150400.3.60.1
* libavresample4_0-64bit-4.4.6-150400.3.60.1
* libavutil56_70-64bit-4.4.6-150400.3.60.1
* libavfilter7_110-64bit-debuginfo-4.4.6-150400.3.60.1
* libavfilter7_110-64bit-4.4.6-150400.3.60.1
* libpostproc55_9-64bit-4.4.6-150400.3.60.1
* libpostproc55_9-64bit-debuginfo-4.4.6-150400.3.60.1
* libswscale5_9-64bit-debuginfo-4.4.6-150400.3.60.1
* libavcodec58_134-64bit-4.4.6-150400.3.60.1
* libswresample3_9-64bit-debuginfo-4.4.6-150400.3.60.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libpostproc55_9-4.4.6-150400.3.60.1
* libavformat58_76-4.4.6-150400.3.60.1
* libavutil56_70-4.4.6-150400.3.60.1
* libswresample3_9-4.4.6-150400.3.60.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.60.1
* libswresample3_9-debuginfo-4.4.6-150400.3.60.1
* libswscale5_9-4.4.6-150400.3.60.1
* libavformat58_76-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-debugsource-4.4.6-150400.3.60.1
* libavutil56_70-debuginfo-4.4.6-150400.3.60.1
* libpostproc55_9-debuginfo-4.4.6-150400.3.60.1
* libavcodec58_134-4.4.6-150400.3.60.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.60.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libpostproc55_9-4.4.6-150400.3.60.1
* libavformat58_76-4.4.6-150400.3.60.1
* libavutil56_70-4.4.6-150400.3.60.1
* libswresample3_9-4.4.6-150400.3.60.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.60.1
* libswresample3_9-debuginfo-4.4.6-150400.3.60.1
* libswscale5_9-4.4.6-150400.3.60.1
* libavformat58_76-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-debugsource-4.4.6-150400.3.60.1
* libavutil56_70-debuginfo-4.4.6-150400.3.60.1
* libpostproc55_9-debuginfo-4.4.6-150400.3.60.1
* libavcodec58_134-4.4.6-150400.3.60.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.60.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libpostproc55_9-4.4.6-150400.3.60.1
* libavformat58_76-4.4.6-150400.3.60.1
* libavutil56_70-4.4.6-150400.3.60.1
* libswresample3_9-4.4.6-150400.3.60.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.60.1
* libswresample3_9-debuginfo-4.4.6-150400.3.60.1
* libswscale5_9-4.4.6-150400.3.60.1
* libavformat58_76-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-debugsource-4.4.6-150400.3.60.1
* libavutil56_70-debuginfo-4.4.6-150400.3.60.1
* libpostproc55_9-debuginfo-4.4.6-150400.3.60.1
* libavcodec58_134-4.4.6-150400.3.60.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.60.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libpostproc55_9-4.4.6-150400.3.60.1
* libavformat58_76-4.4.6-150400.3.60.1
* libavutil56_70-4.4.6-150400.3.60.1
* libswresample3_9-4.4.6-150400.3.60.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.60.1
* libswresample3_9-debuginfo-4.4.6-150400.3.60.1
* libswscale5_9-4.4.6-150400.3.60.1
* libavformat58_76-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-debugsource-4.4.6-150400.3.60.1
* libavutil56_70-debuginfo-4.4.6-150400.3.60.1
* libpostproc55_9-debuginfo-4.4.6-150400.3.60.1
* libavcodec58_134-4.4.6-150400.3.60.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.60.1

## References:

* https://www.suse.com/security/cve/CVE-2023-6601.html
* https://www.suse.com/security/cve/CVE-2025-63757.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220545
* https://bugzilla.suse.com/show_bug.cgi?id=1255392



SUSE-SU-2026:0233-1: moderate: Security update for python-virtualenv


# Security update for python-virtualenv

Announcement ID: SUSE-SU-2026:0233-1
Release Date: 2026-01-22T12:24:36Z
Rating: moderate
References:

* bsc#1256458

Cross-References:

* CVE-2026-22702

CVSS scores:

* CVE-2026-22702 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-22702 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-22702 ( NVD ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for python-virtualenv fixes the following issues:

* CVE-2026-22702: Fixed local attacker can redirect file operations via TOCTOU
race condition (bsc#1256458).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-233=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-233=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-233=1

## Package List:

* Python 3 Module 15-SP7 (noarch)
* python311-virtualenv-20.22.0-150400.9.9.1
* openSUSE Leap 15.4 (noarch)
* python311-virtualenv-20.22.0-150400.9.9.1
* openSUSE Leap 15.6 (noarch)
* python311-virtualenv-20.22.0-150400.9.9.1

## References:

* https://www.suse.com/security/cve/CVE-2026-22702.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256458



SUSE-SU-2026:0234-1: moderate: Security update for libpng16


# Security update for libpng16

Announcement ID: SUSE-SU-2026:0234-1
Release Date: 2026-01-22T12:24:52Z
Rating: moderate
References:

* bsc#1256525
* bsc#1256526

Cross-References:

* CVE-2026-22695
* CVE-2026-22801

CVSS scores:

* CVE-2026-22695 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22695 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
* CVE-2026-22695 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
* CVE-2026-22695 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
* CVE-2026-22801 ( SUSE ): 7.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22801 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-22801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-22801 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves two vulnerabilities can now be installed.

## Description:

This update for libpng16 fixes the following issues:

* CVE-2026-22695: Fixed heap buffer over-read in png_image_finish_read
(bsc#1256525)
* CVE-2026-22801: Fixed integer truncation causing heap buffer over-read in
png_image_write_* (bsc#1256526).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-234=1 openSUSE-SLE-15.6-2026-234=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-234=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libpng16-16-debuginfo-1.6.40-150600.3.6.1
* libpng16-devel-1.6.40-150600.3.6.1
* libpng16-tools-1.6.40-150600.3.6.1
* libpng16-16-1.6.40-150600.3.6.1
* libpng16-compat-devel-1.6.40-150600.3.6.1
* libpng16-tools-debuginfo-1.6.40-150600.3.6.1
* libpng16-debugsource-1.6.40-150600.3.6.1
* openSUSE Leap 15.6 (x86_64)
* libpng16-16-32bit-debuginfo-1.6.40-150600.3.6.1
* libpng16-compat-devel-32bit-1.6.40-150600.3.6.1
* libpng16-devel-32bit-1.6.40-150600.3.6.1
* libpng16-16-32bit-1.6.40-150600.3.6.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libpng16-devel-64bit-1.6.40-150600.3.6.1
* libpng16-16-64bit-1.6.40-150600.3.6.1
* libpng16-16-64bit-debuginfo-1.6.40-150600.3.6.1
* libpng16-compat-devel-64bit-1.6.40-150600.3.6.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libpng16-16-debuginfo-1.6.40-150600.3.6.1
* libpng16-devel-1.6.40-150600.3.6.1
* libpng16-16-1.6.40-150600.3.6.1
* libpng16-compat-devel-1.6.40-150600.3.6.1
* libpng16-debugsource-1.6.40-150600.3.6.1
* Basesystem Module 15-SP7 (x86_64)
* libpng16-16-32bit-debuginfo-1.6.40-150600.3.6.1
* libpng16-16-32bit-1.6.40-150600.3.6.1

## References:

* https://www.suse.com/security/cve/CVE-2026-22695.html
* https://www.suse.com/security/cve/CVE-2026-22801.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256525
* https://bugzilla.suse.com/show_bug.cgi?id=1256526



SUSE-SU-2026:0228-1: important: Security update for net-snmp


# Security update for net-snmp

Announcement ID: SUSE-SU-2026:0228-1
Release Date: 2026-01-22T12:22:04Z
Rating: important
References:

* bsc#1255491

Cross-References:

* CVE-2025-68615

CVSS scores:

* CVE-2025-68615 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68615 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68615 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for net-snmp fixes the following issues:

* CVE-2025-68615: Fixed snmptrapd buffer overflow (bsc#1255491)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-228=1 openSUSE-SLE-15.6-2026-228=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-228=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-228=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-228=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-228=1

## Package List:

* openSUSE Leap 15.6 (x86_64)
* libsnmp40-32bit-debuginfo-5.9.4-150600.24.10.1
* net-snmp-devel-32bit-5.9.4-150600.24.10.1
* libsnmp40-32bit-5.9.4-150600.24.10.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* net-snmp-debuginfo-5.9.4-150600.24.10.1
* snmp-mibs-5.9.4-150600.24.10.1
* libsnmp40-debuginfo-5.9.4-150600.24.10.1
* net-snmp-debugsource-5.9.4-150600.24.10.1
* python3-net-snmp-5.9.4-150600.24.10.1
* python3-net-snmp-debuginfo-5.9.4-150600.24.10.1
* net-snmp-5.9.4-150600.24.10.1
* libsnmp40-5.9.4-150600.24.10.1
* net-snmp-devel-5.9.4-150600.24.10.1
* perl-SNMP-5.9.4-150600.24.10.1
* perl-SNMP-debuginfo-5.9.4-150600.24.10.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* net-snmp-devel-64bit-5.9.4-150600.24.10.1
* libsnmp40-64bit-5.9.4-150600.24.10.1
* libsnmp40-64bit-debuginfo-5.9.4-150600.24.10.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* net-snmp-debuginfo-5.9.4-150600.24.10.1
* snmp-mibs-5.9.4-150600.24.10.1
* libsnmp40-debuginfo-5.9.4-150600.24.10.1
* net-snmp-debugsource-5.9.4-150600.24.10.1
* net-snmp-5.9.4-150600.24.10.1
* libsnmp40-5.9.4-150600.24.10.1
* net-snmp-devel-5.9.4-150600.24.10.1
* perl-SNMP-5.9.4-150600.24.10.1
* perl-SNMP-debuginfo-5.9.4-150600.24.10.1
* SUSE Package Hub 15 15-SP7 (x86_64)
* libsnmp40-32bit-debuginfo-5.9.4-150600.24.10.1
* libsnmp40-32bit-5.9.4-150600.24.10.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* net-snmp-debuginfo-5.9.4-150600.24.10.1
* snmp-mibs-5.9.4-150600.24.10.1
* libsnmp40-debuginfo-5.9.4-150600.24.10.1
* net-snmp-debugsource-5.9.4-150600.24.10.1
* net-snmp-5.9.4-150600.24.10.1
* libsnmp40-5.9.4-150600.24.10.1
* net-snmp-devel-5.9.4-150600.24.10.1
* perl-SNMP-5.9.4-150600.24.10.1
* perl-SNMP-debuginfo-5.9.4-150600.24.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* net-snmp-debuginfo-5.9.4-150600.24.10.1
* snmp-mibs-5.9.4-150600.24.10.1
* libsnmp40-debuginfo-5.9.4-150600.24.10.1
* net-snmp-debugsource-5.9.4-150600.24.10.1
* net-snmp-5.9.4-150600.24.10.1
* libsnmp40-5.9.4-150600.24.10.1
* net-snmp-devel-5.9.4-150600.24.10.1
* perl-SNMP-5.9.4-150600.24.10.1
* perl-SNMP-debuginfo-5.9.4-150600.24.10.1

## References:

* https://www.suse.com/security/cve/CVE-2025-68615.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255491



SUSE-SU-2026:0231-1: low: Security update for exiv2-0_26


# Security update for exiv2-0_26

Announcement ID: SUSE-SU-2026:0231-1
Release Date: 2026-01-22T12:23:05Z
Rating: low
References:

* bsc#1248963

Cross-References:

* CVE-2025-55304

CVSS scores:

* CVE-2025-55304 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-55304 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-55304 ( NVD ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that solves one vulnerability can now be installed.

## Description:

This update for exiv2-0_26 fixes the following issues:

Add reference for previously fixed issue:

* CVE-2025-55304: Fixed quadratic performance algorithm in the ICC profile
parsing code of `JpegBase::readMetadata` (bsc#1248963).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-231=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-231=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-231=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-231=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-231=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-231=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* exiv2-0_26-debugsource-0.26-150400.9.27.1
* libexiv2-26-0.26-150400.9.27.1
* libexiv2-26-debuginfo-0.26-150400.9.27.1
* openSUSE Leap 15.4 (x86_64)
* libexiv2-26-32bit-0.26-150400.9.27.1
* libexiv2-26-32bit-debuginfo-0.26-150400.9.27.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libexiv2-26-64bit-debuginfo-0.26-150400.9.27.1
* libexiv2-26-64bit-0.26-150400.9.27.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* exiv2-0_26-debugsource-0.26-150400.9.27.1
* libexiv2-26-0.26-150400.9.27.1
* libexiv2-26-debuginfo-0.26-150400.9.27.1
* openSUSE Leap 15.6 (x86_64)
* libexiv2-26-32bit-0.26-150400.9.27.1
* libexiv2-26-32bit-debuginfo-0.26-150400.9.27.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libexiv2-26-0.26-150400.9.27.1
* libexiv2-26-debuginfo-0.26-150400.9.27.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libexiv2-26-0.26-150400.9.27.1
* libexiv2-26-debuginfo-0.26-150400.9.27.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libexiv2-26-0.26-150400.9.27.1
* libexiv2-26-debuginfo-0.26-150400.9.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libexiv2-26-0.26-150400.9.27.1
* libexiv2-26-debuginfo-0.26-150400.9.27.1

## References:

* https://www.suse.com/security/cve/CVE-2025-55304.html
* https://bugzilla.suse.com/show_bug.cgi?id=1248963



SUSE-SU-2026:0243-1: moderate: Security update for librsvg


# Security update for librsvg

Announcement ID: SUSE-SU-2026:0243-1
Release Date: 2026-01-22T13:57:48Z
Rating: moderate
References:

* bsc#1243867

Cross-References:

* CVE-2024-12224

CVSS scores:

* CVE-2024-12224 ( SUSE ): 2.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-12224 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2024-12224 ( NVD ): 5.1
CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* Basesystem Module 15-SP7
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for librsvg fixes the following issues:

Update to version 2.57.4 - bsc#1243867:

* CVE-2024-12224: RUSTSEC-2024-0421 - idna accepts Punycode labels that do not
produce any non-ASCII when decoded.
* RUSTSEC-2024-0404 - Unsoundness in anstream.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-243=1

* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-243=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-243=1 openSUSE-SLE-15.6-2026-243=1

## Package List:

* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.57.4-150600.3.3.1
* librsvg-debugsource-2.57.4-150600.3.3.1
* librsvg-2-2-2.57.4-150600.3.3.1
* librsvg-2-2-debuginfo-2.57.4-150600.3.3.1
* gdk-pixbuf-loader-rsvg-2.57.4-150600.3.3.1
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* librsvg-debugsource-2.57.4-150600.3.3.1
* librsvg-devel-2.57.4-150600.3.3.1
* typelib-1_0-Rsvg-2_0-2.57.4-150600.3.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* typelib-1_0-Rsvg-2_0-2.57.4-150600.3.3.1
* gdk-pixbuf-loader-rsvg-debuginfo-2.57.4-150600.3.3.1
* rsvg-convert-2.57.4-150600.3.3.1
* librsvg-debugsource-2.57.4-150600.3.3.1
* librsvg-devel-2.57.4-150600.3.3.1
* librsvg-2-2-2.57.4-150600.3.3.1
* librsvg-2-2-debuginfo-2.57.4-150600.3.3.1
* gdk-pixbuf-loader-rsvg-2.57.4-150600.3.3.1
* rsvg-convert-debuginfo-2.57.4-150600.3.3.1
* openSUSE Leap 15.6 (x86_64)
* librsvg-2-2-32bit-2.57.4-150600.3.3.1
* librsvg-2-2-32bit-debuginfo-2.57.4-150600.3.3.1
* gdk-pixbuf-loader-rsvg-32bit-debuginfo-2.57.4-150600.3.3.1
* gdk-pixbuf-loader-rsvg-32bit-2.57.4-150600.3.3.1
* openSUSE Leap 15.6 (noarch)
* rsvg-thumbnailer-2.57.4-150600.3.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* gdk-pixbuf-loader-rsvg-64bit-2.57.4-150600.3.3.1
* gdk-pixbuf-loader-rsvg-64bit-debuginfo-2.57.4-150600.3.3.1
* librsvg-2-2-64bit-debuginfo-2.57.4-150600.3.3.1
* librsvg-2-2-64bit-2.57.4-150600.3.3.1

## References:

* https://www.suse.com/security/cve/CVE-2024-12224.html
* https://bugzilla.suse.com/show_bug.cgi?id=1243867



SUSE-SU-2026:0245-1: moderate: Security update for php7


# Security update for php7

Announcement ID: SUSE-SU-2026:0245-1
Release Date: 2026-01-22T15:18:47Z
Rating: moderate
References:

* bsc#1255711
* jsc#PED-13850

Cross-References:

* CVE-2025-14178

CVSS scores:

* CVE-2025-14178 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14178 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-14178 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-14178 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

Affected Products:

* Legacy Module 15-SP7
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves one vulnerability and contains one feature can now be
installed.

## Description:

This update for php7 fixes the following issues:

Security fixes:

* CVE-2025-14178: heap buffer overflow occurs in array_merge() when the total
element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE
(bsc#1255711).

Other fixes:

* Add all php7 packages to PackageHUB (unsupported), no source changes.
(bsc#1251932)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-245=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-245=1

* Legacy Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2026-245=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-245=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-245=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-245=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-245=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-245=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-245=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-245=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-245=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-245=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* php7-embed-debuginfo-7.4.33-150400.4.55.1
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-test-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-embed-debugsource-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-embed-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* php7-embed-debuginfo-7.4.33-150400.4.55.1
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-test-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-embed-debugsource-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-embed-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
* php7-embed-debuginfo-7.4.33-150400.4.55.1
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-test-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-embed-debugsource-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-embed-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1

## References:

* https://www.suse.com/security/cve/CVE-2025-14178.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255711
* https://jira.suse.com/browse/PED-13850



SUSE-SU-2026:0236-1: important: Security update for busybox


# Security update for busybox

Announcement ID: SUSE-SU-2026:0236-1
Release Date: 2026-01-22T12:25:56Z
Rating: important
References:

* bsc#1236670
* bsc#1241661
* bsc#1247779
* bsc#1249237
* bsc#1253245

Cross-References:

* CVE-2025-46394
* CVE-2025-60876

CVSS scores:

* CVE-2025-46394 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N
* CVE-2025-46394 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
* CVE-2025-46394 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-46394 ( NVD ): 3.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2025-60876 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:H/SI:H/SA:N
* CVE-2025-60876 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
* CVE-2025-60876 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Affected Products:

* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves two vulnerabilities and has three security fixes can now
be installed.

## Description:

This update for busybox fixes the following issues:

This update for busybox fixes the following issues:

Security issues:

* CVE-2025-46394: Fixed tar hidden files via escape sequence (CVE-2025-46394,
bsc#1241661)
* CVE-2025-60876: Fixed HTTP request header injection in wget (CVE-2025-60876,
bsc#1253245)

Other issues:

* Set CONFIG_FIRST_SYSTEM_ID to 201 to avoid confclict (bsc#1236670)
* Fixed unshare -mrpf sh core dump on ppc64le (bsc#1249237)
* Fixed adduser inside containers on an SELinux host (bsc#1247779)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-236=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-236=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-236=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-236=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-236=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-236=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-236=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-236=1

## Package List:

* openSUSE Leap 15.5 (noarch)
* busybox-policycoreutils-1.37.0-150500.7.9.1
* busybox-tar-1.37.0-150500.7.9.1
* busybox-udhcpc-1.37.0-150500.7.9.1
* busybox-selinux-tools-1.37.0-150500.7.9.1
* busybox-findutils-1.37.0-150500.7.9.1
* busybox-time-1.37.0-150500.7.9.1
* busybox-netcat-1.37.0-150500.7.9.1
* busybox-ncurses-utils-1.37.0-150500.7.9.1
* busybox-ed-1.37.0-150500.7.9.1
* busybox-adduser-1.37.0-150500.7.9.1
* busybox-links-1.37.0-150500.7.9.1
* busybox-traceroute-1.37.0-150500.7.9.1
* busybox-misc-1.37.0-150500.7.9.1
* busybox-net-tools-1.37.0-150500.7.9.1
* busybox-unzip-1.37.0-150500.7.9.1
* busybox-util-linux-1.37.0-150500.7.9.1
* busybox-iproute2-1.37.0-150500.7.9.1
* busybox-sharutils-1.37.0-150500.7.9.1
* busybox-whois-1.37.0-150500.7.9.1
* busybox-tftp-1.37.0-150500.7.9.1
* busybox-kbd-1.37.0-150500.7.9.1
* busybox-cpio-1.37.0-150500.7.9.1
* busybox-grep-1.37.0-150500.7.9.1
* busybox-patch-1.37.0-150500.7.9.1
* busybox-bind-utils-1.37.0-150500.7.9.1
* busybox-vlan-1.37.0-150500.7.9.1
* busybox-iputils-1.37.0-150500.7.9.1
* busybox-sendmail-1.37.0-150500.7.9.1
* busybox-attr-1.37.0-150500.7.9.1
* busybox-xz-1.37.0-150500.7.9.1
* busybox-gzip-1.37.0-150500.7.9.1
* busybox-hostname-1.37.0-150500.7.9.1
* busybox-kmod-1.37.0-150500.7.9.1
* busybox-sed-1.37.0-150500.7.9.1
* busybox-psmisc-1.37.0-150500.7.9.1
* busybox-dos2unix-1.37.0-150500.7.9.1
* busybox-sha3sum-1.37.0-150500.7.9.1
* busybox-which-1.37.0-150500.7.9.1
* busybox-gawk-1.37.0-150500.7.9.1
* busybox-tunctl-1.37.0-150500.7.9.1
* busybox-diffutils-1.37.0-150500.7.9.1
* busybox-telnet-1.37.0-150500.7.9.1
* busybox-sysvinit-tools-1.37.0-150500.7.9.1
* busybox-hexedit-1.37.0-150500.7.9.1
* busybox-syslogd-1.37.0-150500.7.9.1
* busybox-procps-1.37.0-150500.7.9.1
* busybox-sh-1.37.0-150500.7.9.1
* busybox-coreutils-1.37.0-150500.7.9.1
* busybox-vi-1.37.0-150500.7.9.1
* busybox-bzip2-1.37.0-150500.7.9.1
* busybox-less-1.37.0-150500.7.9.1
* busybox-man-1.37.0-150500.7.9.1
* busybox-bc-1.37.0-150500.7.9.1
* busybox-wget-1.37.0-150500.7.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* busybox-static-1.37.0-150500.10.14.1
* busybox-testsuite-1.37.0-150500.10.14.1
* busybox-1.37.0-150500.10.14.1
* busybox-static-debuginfo-1.37.0-150500.10.14.1
* busybox-debuginfo-1.37.0-150500.10.14.1
* busybox-debugsource-1.37.0-150500.10.14.1
* openSUSE Leap 15.5 (aarch64 x86_64 i586)
* busybox-warewulf3-1.37.0-150500.10.14.1
* busybox-warewulf3-debuginfo-1.37.0-150500.10.14.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* busybox-1.37.0-150500.10.14.1
* busybox-static-1.37.0-150500.10.14.1
* busybox-testsuite-1.37.0-150500.10.14.1
* openSUSE Leap 15.6 (noarch)
* busybox-policycoreutils-1.37.0-150500.7.9.1
* busybox-tar-1.37.0-150500.7.9.1
* busybox-udhcpc-1.37.0-150500.7.9.1
* busybox-selinux-tools-1.37.0-150500.7.9.1
* busybox-findutils-1.37.0-150500.7.9.1
* busybox-time-1.37.0-150500.7.9.1
* busybox-netcat-1.37.0-150500.7.9.1
* busybox-ncurses-utils-1.37.0-150500.7.9.1
* busybox-ed-1.37.0-150500.7.9.1
* busybox-adduser-1.37.0-150500.7.9.1
* busybox-links-1.37.0-150500.7.9.1
* busybox-traceroute-1.37.0-150500.7.9.1
* busybox-misc-1.37.0-150500.7.9.1
* busybox-net-tools-1.37.0-150500.7.9.1
* busybox-unzip-1.37.0-150500.7.9.1
* busybox-util-linux-1.37.0-150500.7.9.1
* busybox-iproute2-1.37.0-150500.7.9.1
* busybox-sharutils-1.37.0-150500.7.9.1
* busybox-whois-1.37.0-150500.7.9.1
* busybox-tftp-1.37.0-150500.7.9.1
* busybox-kbd-1.37.0-150500.7.9.1
* busybox-cpio-1.37.0-150500.7.9.1
* busybox-grep-1.37.0-150500.7.9.1
* busybox-patch-1.37.0-150500.7.9.1
* busybox-bind-utils-1.37.0-150500.7.9.1
* busybox-vlan-1.37.0-150500.7.9.1
* busybox-iputils-1.37.0-150500.7.9.1
* busybox-sendmail-1.37.0-150500.7.9.1
* busybox-attr-1.37.0-150500.7.9.1
* busybox-xz-1.37.0-150500.7.9.1
* busybox-gzip-1.37.0-150500.7.9.1
* busybox-hostname-1.37.0-150500.7.9.1
* busybox-kmod-1.37.0-150500.7.9.1
* busybox-sed-1.37.0-150500.7.9.1
* busybox-psmisc-1.37.0-150500.7.9.1
* busybox-dos2unix-1.37.0-150500.7.9.1
* busybox-sha3sum-1.37.0-150500.7.9.1
* busybox-which-1.37.0-150500.7.9.1
* busybox-gawk-1.37.0-150500.7.9.1
* busybox-tunctl-1.37.0-150500.7.9.1
* busybox-diffutils-1.37.0-150500.7.9.1
* busybox-telnet-1.37.0-150500.7.9.1
* busybox-sysvinit-tools-1.37.0-150500.7.9.1
* busybox-hexedit-1.37.0-150500.7.9.1
* busybox-syslogd-1.37.0-150500.7.9.1
* busybox-procps-1.37.0-150500.7.9.1
* busybox-sh-1.37.0-150500.7.9.1
* busybox-coreutils-1.37.0-150500.7.9.1
* busybox-vi-1.37.0-150500.7.9.1
* busybox-bzip2-1.37.0-150500.7.9.1
* busybox-less-1.37.0-150500.7.9.1
* busybox-man-1.37.0-150500.7.9.1
* busybox-bc-1.37.0-150500.7.9.1
* busybox-wget-1.37.0-150500.7.9.1
* openSUSE Leap 15.6 (aarch64 x86_64)
* busybox-warewulf3-1.37.0-150500.10.14.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* busybox-1.37.0-150500.10.14.1
* busybox-static-1.37.0-150500.10.14.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* busybox-1.37.0-150500.10.14.1
* busybox-static-1.37.0-150500.10.14.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* busybox-1.37.0-150500.10.14.1
* busybox-static-1.37.0-150500.10.14.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* busybox-1.37.0-150500.10.14.1
* busybox-static-1.37.0-150500.10.14.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* busybox-1.37.0-150500.10.14.1
* busybox-static-1.37.0-150500.10.14.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* busybox-1.37.0-150500.10.14.1
* busybox-static-1.37.0-150500.10.14.1

## References:

* https://www.suse.com/security/cve/CVE-2025-46394.html
* https://www.suse.com/security/cve/CVE-2025-60876.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236670
* https://bugzilla.suse.com/show_bug.cgi?id=1241661
* https://bugzilla.suse.com/show_bug.cgi?id=1247779
* https://bugzilla.suse.com/show_bug.cgi?id=1249237
* https://bugzilla.suse.com/show_bug.cgi?id=1253245



SUSE-SU-2026:0237-1: moderate: Security update for wireshark


# Security update for wireshark

Announcement ID: SUSE-SU-2026:0237-1
Release Date: 2026-01-22T12:26:16Z
Rating: moderate
References:

* bsc#1256734
* bsc#1256736
* bsc#1256739

Cross-References:

* CVE-2026-0959
* CVE-2026-0960
* CVE-2026-0962

CVSS scores:

* CVE-2026-0959 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0959 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0959 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0959 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0960 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0960 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0962 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0962 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0962 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0962 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP7
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves three vulnerabilities can now be installed.

## Description:

This update for wireshark fixes the following issues:

* CVE-2026-0959: IEEE 802.11 dissector crash (bsc#1256734).
* CVE-2026-0960: HTTP3 dissector infinite loop (bsc#1256736).
* CVE-2026-0962: SOME/IP-SD dissector crash (bsc#1256739).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-237=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-237=1 openSUSE-SLE-15.6-2026-237=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-237=1

## Package List:

* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* wireshark-devel-4.2.14-150600.18.35.1
* wireshark-debuginfo-4.2.14-150600.18.35.1
* wireshark-ui-qt-debuginfo-4.2.14-150600.18.35.1
* wireshark-debugsource-4.2.14-150600.18.35.1
* wireshark-ui-qt-4.2.14-150600.18.35.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* wireshark-devel-4.2.14-150600.18.35.1
* libwireshark17-debuginfo-4.2.14-150600.18.35.1
* wireshark-debuginfo-4.2.14-150600.18.35.1
* libwiretap14-debuginfo-4.2.14-150600.18.35.1
* libwiretap14-4.2.14-150600.18.35.1
* wireshark-ui-qt-debuginfo-4.2.14-150600.18.35.1
* wireshark-debugsource-4.2.14-150600.18.35.1
* libwsutil15-debuginfo-4.2.14-150600.18.35.1
* libwireshark17-4.2.14-150600.18.35.1
* wireshark-4.2.14-150600.18.35.1
* wireshark-ui-qt-4.2.14-150600.18.35.1
* libwsutil15-4.2.14-150600.18.35.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libwireshark17-debuginfo-4.2.14-150600.18.35.1
* wireshark-debuginfo-4.2.14-150600.18.35.1
* libwiretap14-debuginfo-4.2.14-150600.18.35.1
* libwiretap14-4.2.14-150600.18.35.1
* wireshark-debugsource-4.2.14-150600.18.35.1
* libwsutil15-debuginfo-4.2.14-150600.18.35.1
* libwireshark17-4.2.14-150600.18.35.1
* wireshark-4.2.14-150600.18.35.1
* libwsutil15-4.2.14-150600.18.35.1

## References:

* https://www.suse.com/security/cve/CVE-2026-0959.html
* https://www.suse.com/security/cve/CVE-2026-0960.html
* https://www.suse.com/security/cve/CVE-2026-0962.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256734
* https://bugzilla.suse.com/show_bug.cgi?id=1256736
* https://bugzilla.suse.com/show_bug.cgi?id=1256739



SUSE-SU-2026:0246-1: important: Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5)


# Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise
15 SP5)

Announcement ID: SUSE-SU-2026:0246-1
Release Date: 2026-01-22T15:19:55Z
Rating: important
References:

* bsc#1235815
* bsc#1248400
* bsc#1248615
* bsc#1248670
* bsc#1250665
* bsc#1251165
* bsc#1251203
* bsc#1251787
* bsc#1253437
* bsc#1254451

Cross-References:

* CVE-2022-50327
* CVE-2022-50409
* CVE-2022-50490
* CVE-2023-53676
* CVE-2024-57849
* CVE-2024-58239
* CVE-2025-38476
* CVE-2025-38572
* CVE-2025-38608
* CVE-2025-40204

CVSS scores:

* CVE-2022-50327 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50409 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50490 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53676 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57849 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58239 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38476 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38608 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves 10 vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.91 fixes
various security issues

The following security issues were fixed:

* CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return
value (bsc#1254451).
* CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in
sk_stream_wait_memory (bsc#1250665).
* CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace
(bsc#1251165).
* CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in
lio_target_nacl_info_show() (bsc#1251787).
* CVE-2024-57849: s390/cpum_sf: handle CPU hotplug remove during sampling
(bsc#1235815).
* CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA
(bsc#1248615).
* CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline()
(bsc#1251203).
* CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment()
(bsc#1248400).
* CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data()
in ktls (bsc#1248670).
* CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-246=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-246=1

## Package List:

* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_22-debugsource-17-150500.2.1
* kernel-livepatch-5_14_21-150500_55_91-default-17-150500.2.1
* kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-17-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_22-debugsource-17-150500.2.1
* kernel-livepatch-5_14_21-150500_55_91-default-17-150500.2.1
* kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-17-150500.2.1

## References:

* https://www.suse.com/security/cve/CVE-2022-50327.html
* https://www.suse.com/security/cve/CVE-2022-50409.html
* https://www.suse.com/security/cve/CVE-2022-50490.html
* https://www.suse.com/security/cve/CVE-2023-53676.html
* https://www.suse.com/security/cve/CVE-2024-57849.html
* https://www.suse.com/security/cve/CVE-2024-58239.html
* https://www.suse.com/security/cve/CVE-2025-38476.html
* https://www.suse.com/security/cve/CVE-2025-38572.html
* https://www.suse.com/security/cve/CVE-2025-38608.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://bugzilla.suse.com/show_bug.cgi?id=1235815
* https://bugzilla.suse.com/show_bug.cgi?id=1248400
* https://bugzilla.suse.com/show_bug.cgi?id=1248615
* https://bugzilla.suse.com/show_bug.cgi?id=1248670
* https://bugzilla.suse.com/show_bug.cgi?id=1250665
* https://bugzilla.suse.com/show_bug.cgi?id=1251165
* https://bugzilla.suse.com/show_bug.cgi?id=1251203
* https://bugzilla.suse.com/show_bug.cgi?id=1251787
* https://bugzilla.suse.com/show_bug.cgi?id=1253437
* https://bugzilla.suse.com/show_bug.cgi?id=1254451