openSUSE-SU-2026:10079-1: moderate: python311-weasyprint-68.0-1.1 on GA media
openSUSE-SU-2026:10075-1: moderate: corepack24-24.13.0-2.1 on GA media
openSUSE-SU-2026:10078-1: moderate: python311-pyasn1-0.6.2-1.1 on GA media
openSUSE-SU-2026:10074-1: moderate: corepack22-22.22.0-1.1 on GA media
openSUSE-SU-2026:10073-1: moderate: alloy-1.12.2-2.1 on GA media
SUSE-SU-2026:0212-1: important: Security update for ovmf
SUSE-SU-2026:0211-1: important: Security update for libsoup
SUSE-SU-2026:0218-1: important: Security update for go1.25
SUSE-SU-2026:0213-1: important: Security update for ovmf
SUSE-SU-2026:0217-1: critical: Security update for keylime
SUSE-SU-2026:0220-1: moderate: Security update for python-filelock
SUSE-SU-2026:0216-1: important: Security update for kernel-firmware
SUSE-SU-2026:0219-1: important: Security update for go1.24
SUSE-SU-2026:0226-1: moderate: Security update for python-marshmallow
SUSE-SU-2026:0224-1: moderate: Security update for libtasn1
SUSE-SU-2026:0223-1: moderate: Security update for libsodium
SUSE-SU-2026:0227-1: important: Security update for net-snmp
SUSE-SU-2026:0232-1: important: Security update for pgadmin4
SUSE-SU-2026:0229-1: important: Security update for ffmpeg-4
SUSE-SU-2026:0233-1: moderate: Security update for python-virtualenv
SUSE-SU-2026:0234-1: moderate: Security update for libpng16
SUSE-SU-2026:0228-1: important: Security update for net-snmp
SUSE-SU-2026:0231-1: low: Security update for exiv2-0_26
SUSE-SU-2026:0243-1: moderate: Security update for librsvg
SUSE-SU-2026:0245-1: moderate: Security update for php7
SUSE-SU-2026:0236-1: important: Security update for busybox
SUSE-SU-2026:0237-1: moderate: Security update for wireshark
SUSE-SU-2026:0246-1: important: Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5)
openSUSE-SU-2026:10079-1: moderate: python311-weasyprint-68.0-1.1 on GA media
# python311-weasyprint-68.0-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10079-1
Rating: moderate
Cross-References:
* CVE-2025-68616
CVSS scores:
* CVE-2025-68616 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the python311-weasyprint-68.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python311-weasyprint 68.0-1.1
* python312-weasyprint 68.0-1.1
* python313-weasyprint 68.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-68616.html
openSUSE-SU-2026:10075-1: moderate: corepack24-24.13.0-2.1 on GA media
# corepack24-24.13.0-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10075-1
Rating: moderate
Cross-References:
* CVE-2026-22036
CVSS scores:
* CVE-2026-22036 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22036 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the corepack24-24.13.0-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* corepack24 24.13.0-2.1
* nodejs24 24.13.0-2.1
* nodejs24-devel 24.13.0-2.1
* nodejs24-docs 24.13.0-2.1
* npm24 24.13.0-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-22036.html
openSUSE-SU-2026:10078-1: moderate: python311-pyasn1-0.6.2-1.1 on GA media
# python311-pyasn1-0.6.2-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10078-1
Rating: moderate
Cross-References:
* CVE-2026-2141
* CVE-2026-23490
CVSS scores:
* CVE-2026-23490 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the python311-pyasn1-0.6.2-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python311-pyasn1 0.6.2-1.1
* python312-pyasn1 0.6.2-1.1
* python313-pyasn1 0.6.2-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-2141.html
* https://www.suse.com/security/cve/CVE-2026-23490.html
openSUSE-SU-2026:10074-1: moderate: corepack22-22.22.0-1.1 on GA media
# corepack22-22.22.0-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10074-1
Rating: moderate
Cross-References:
* CVE-2025-55130
* CVE-2025-55131
* CVE-2025-55132
* CVE-2025-59465
* CVE-2025-59466
* CVE-2026-21637
* CVE-2026-22036
CVSS scores:
* CVE-2025-55130 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55130 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55131 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55131 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55132 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-55132 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-59465 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59465 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-59466 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59466 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21637 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-21637 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-22036 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22036 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 7 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the corepack22-22.22.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* corepack22 22.22.0-1.1
* nodejs22 22.22.0-1.1
* nodejs22-devel 22.22.0-1.1
* nodejs22-docs 22.22.0-1.1
* npm22 22.22.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-55130.html
* https://www.suse.com/security/cve/CVE-2025-55131.html
* https://www.suse.com/security/cve/CVE-2025-55132.html
* https://www.suse.com/security/cve/CVE-2025-59465.html
* https://www.suse.com/security/cve/CVE-2025-59466.html
* https://www.suse.com/security/cve/CVE-2026-21637.html
* https://www.suse.com/security/cve/CVE-2026-22036.html
openSUSE-SU-2026:10073-1: moderate: alloy-1.12.2-2.1 on GA media
# alloy-1.12.2-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10073-1
Rating: moderate
Cross-References:
* CVE-2025-31133
* CVE-2025-68156
CVSS scores:
* CVE-2025-31133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-31133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-68156 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68156 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the alloy-1.12.2-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* alloy 1.12.2-2.1
## References:
* https://www.suse.com/security/cve/CVE-2025-31133.html
* https://www.suse.com/security/cve/CVE-2025-68156.html
SUSE-SU-2026:0212-1: important: Security update for ovmf
# Security update for ovmf
Announcement ID: SUSE-SU-2026:0212-1
Release Date: 2026-01-22T12:08:35Z
Rating: important
References:
* bsc#1218680
Cross-References:
* CVE-2022-36765
CVSS scores:
* CVE-2022-36765 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
* CVE-2022-36765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-36765 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves one vulnerability can now be installed.
## Description:
This update for ovmf fixes the following issues:
* CVE-2022-36765: Fixed integer overflow to buffer overflow via local network
vulnerability (bsc#1218680).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-212=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-212=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-212=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-212=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-212=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-212=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-212=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-212=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-212=1
## Package List:
* openSUSE Leap 15.4 (aarch64 x86_64)
* ovmf-202202-150400.5.21.1
* ovmf-tools-202202-150400.5.21.1
* openSUSE Leap 15.4 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch32-202202-150400.5.21.1
* qemu-ovmf-ia32-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* openSUSE Leap 15.4 (x86_64)
* qemu-ovmf-x86_64-debug-202202-150400.5.21.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* ovmf-202202-150400.5.21.1
* ovmf-tools-202202-150400.5.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* ovmf-202202-150400.5.21.1
* ovmf-tools-202202-150400.5.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64)
* ovmf-202202-150400.5.21.1
* ovmf-tools-202202-150400.5.21.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
* qemu-uefi-aarch64-202202-150400.5.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* ovmf-202202-150400.5.21.1
* ovmf-tools-202202-150400.5.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* qemu-ovmf-x86_64-202202-150400.5.21.1
## References:
* https://www.suse.com/security/cve/CVE-2022-36765.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218680
SUSE-SU-2026:0211-1: important: Security update for libsoup
# Security update for libsoup
Announcement ID: SUSE-SU-2026:0211-1
Release Date: 2026-01-22T12:08:12Z
Rating: important
References:
* bsc#1254876
* bsc#1256399
* bsc#1256418
Cross-References:
* CVE-2025-14523
* CVE-2026-0716
* CVE-2026-0719
CVSS scores:
* CVE-2025-14523 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-14523 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2025-14523 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2026-0716 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0716 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L
* CVE-2026-0716 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-0719 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0719 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-0719 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for libsoup fixes the following issues:
* CVE-2025-14523: Reject duplicated Host in headers and followed upstream
update (bsc#1254876).
* CVE-2026-0716: Fixed out-of-bounds read for websocket (bsc#1256418)
* CVE-2026-0719: Fixed overflow for password md4sum (bsc#1256399)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-211=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-211=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-211=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-211=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-211=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-211=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-211=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-211=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-211=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* openSUSE Leap 15.4 (x86_64)
* libsoup-3_0-0-32bit-debuginfo-3.0.4-150400.3.28.1
* libsoup-3_0-0-32bit-3.0.4-150400.3.28.1
* libsoup-devel-32bit-3.0.4-150400.3.28.1
* openSUSE Leap 15.4 (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libsoup-devel-64bit-3.0.4-150400.3.28.1
* libsoup-3_0-0-64bit-debuginfo-3.0.4-150400.3.28.1
* libsoup-3_0-0-64bit-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libsoup-devel-3.0.4-150400.3.28.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1
* libsoup-3_0-0-3.0.4-150400.3.28.1
* libsoup-debugsource-3.0.4-150400.3.28.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.28.1
## References:
* https://www.suse.com/security/cve/CVE-2025-14523.html
* https://www.suse.com/security/cve/CVE-2026-0716.html
* https://www.suse.com/security/cve/CVE-2026-0719.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254876
* https://bugzilla.suse.com/show_bug.cgi?id=1256399
* https://bugzilla.suse.com/show_bug.cgi?id=1256418
SUSE-SU-2026:0218-1: important: Security update for go1.25
# Security update for go1.25
Announcement ID: SUSE-SU-2026:0218-1
Release Date: 2026-01-22T12:13:12Z
Rating: important
References:
* bsc#1244485
* bsc#1256816
* bsc#1256817
* bsc#1256818
* bsc#1256819
* bsc#1256820
* bsc#1256821
Cross-References:
* CVE-2025-61726
* CVE-2025-61728
* CVE-2025-61730
* CVE-2025-61731
* CVE-2025-68119
* CVE-2025-68121
CVSS scores:
* CVE-2025-61726 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61726 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61728 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61730 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-61730 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-61731 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61731 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68119 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68119 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68121 ( SUSE ): 7.6
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected Products:
* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves six vulnerabilities and has one security fix can now be
installed.
## Description:
This update for go1.25 fixes the following issues:
Update to go1.25.6 (released 2026-01-15) (bsc#1244485)
Security fixes:
* CVE-2025-61730: crypto/tls: handshake messages may be processed at the
incorrect encryption level (bsc#1256821).
* CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain
(bsc#1256820).
* CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary
code execution (bsc#1256819).
* CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm
(bsc#1256817).
* CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP
archives (bsc#1256816).
* CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated
session ticket keys, session resumption does not account for the expiration
of full certificate chain (bsc#1256818).
Other fixes:
* go#76392 os: package initialization hangs is Stdin is blocked
* go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH
enabled
* go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes
* go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4
windows 386
* go#76776 runtime: race detector crash on ppc64le
* go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while
compiling <function>: runtime error: index out of range
* go#76973 errors: errors.Join behavior changed in 1.25
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-218=1
* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-218=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-218=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-218=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-218=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-218=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-218=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-218=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-218=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-218=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-218=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-218=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* go1.25-1.25.6-150000.1.26.1
* go1.25-race-1.25.6-150000.1.26.1
* go1.25-doc-1.25.6-150000.1.26.1
## References:
* https://www.suse.com/security/cve/CVE-2025-61726.html
* https://www.suse.com/security/cve/CVE-2025-61728.html
* https://www.suse.com/security/cve/CVE-2025-61730.html
* https://www.suse.com/security/cve/CVE-2025-61731.html
* https://www.suse.com/security/cve/CVE-2025-68119.html
* https://www.suse.com/security/cve/CVE-2025-68121.html
* https://bugzilla.suse.com/show_bug.cgi?id=1244485
* https://bugzilla.suse.com/show_bug.cgi?id=1256816
* https://bugzilla.suse.com/show_bug.cgi?id=1256817
* https://bugzilla.suse.com/show_bug.cgi?id=1256818
* https://bugzilla.suse.com/show_bug.cgi?id=1256819
* https://bugzilla.suse.com/show_bug.cgi?id=1256820
* https://bugzilla.suse.com/show_bug.cgi?id=1256821
SUSE-SU-2026:0213-1: important: Security update for ovmf
# Security update for ovmf
Announcement ID: SUSE-SU-2026:0213-1
Release Date: 2026-01-22T12:08:49Z
Rating: important
References:
* bsc#1218680
Cross-References:
* CVE-2022-36765
CVSS scores:
* CVE-2022-36765 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
* CVE-2022-36765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-36765 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for ovmf fixes the following issues:
* CVE-2022-36765: Fixed integer overflow to buffer overflow via local network
vulnerability (bsc#1218680).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-213=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-213=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-213=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-213=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-213=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-213=1
## Package List:
* openSUSE Leap 15.5 (aarch64 x86_64)
* ovmf-202208-150500.6.12.1
* ovmf-tools-202208-150500.6.12.1
* openSUSE Leap 15.5 (noarch)
* qemu-uefi-aarch64-202208-150500.6.12.1
* qemu-ovmf-x86_64-202208-150500.6.12.1
* qemu-uefi-aarch32-202208-150500.6.12.1
* qemu-ovmf-ia32-202208-150500.6.12.1
* openSUSE Leap 15.5 (x86_64)
* qemu-ovmf-x86_64-debug-202208-150500.6.12.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* qemu-ovmf-x86_64-202208-150500.6.12.1
* qemu-uefi-aarch64-202208-150500.6.12.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* ovmf-202208-150500.6.12.1
* ovmf-tools-202208-150500.6.12.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* qemu-ovmf-x86_64-202208-150500.6.12.1
* qemu-uefi-aarch64-202208-150500.6.12.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* ovmf-202208-150500.6.12.1
* ovmf-tools-202208-150500.6.12.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* qemu-ovmf-x86_64-202208-150500.6.12.1
* qemu-uefi-aarch64-202208-150500.6.12.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 x86_64)
* ovmf-202208-150500.6.12.1
* ovmf-tools-202208-150500.6.12.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* qemu-ovmf-x86_64-202208-150500.6.12.1
* qemu-uefi-aarch64-202208-150500.6.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* ovmf-202208-150500.6.12.1
* ovmf-tools-202208-150500.6.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* qemu-ovmf-x86_64-202208-150500.6.12.1
## References:
* https://www.suse.com/security/cve/CVE-2022-36765.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218680
SUSE-SU-2026:0217-1: critical: Security update for keylime
# Security update for keylime
Announcement ID: SUSE-SU-2026:0217-1
Release Date: 2026-01-22T12:12:11Z
Rating: critical
References:
* bsc#1254199
Cross-References:
* CVE-2025-13609
CVSS scores:
* CVE-2025-13609 ( SUSE ): 9.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
* CVE-2025-13609 ( SUSE ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-13609 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for keylime fixes the following issues:
* CVE-2025-13609: avoid re-registration of clients with same UUID but with
different TPM identity (bsc#1254199).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-217=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-217=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-217=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-217=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-217=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-217=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-217=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-217=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-217=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-217=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-217=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-217=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-217=1
## Package List:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* openSUSE Leap 15.4 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* openSUSE Leap 15.6 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
* Basesystem Module 15-SP7 (noarch)
* keylime-config-6.3.2-150400.4.23.1
* keylime-logrotate-6.3.2-150400.4.23.1
* keylime-agent-6.3.2-150400.4.23.1
* keylime-firewalld-6.3.2-150400.4.23.1
* keylime-verifier-6.3.2-150400.4.23.1
* python3-keylime-6.3.2-150400.4.23.1
* keylime-tpm_cert_store-6.3.2-150400.4.23.1
* keylime-registrar-6.3.2-150400.4.23.1
## References:
* https://www.suse.com/security/cve/CVE-2025-13609.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254199
SUSE-SU-2026:0220-1: moderate: Security update for python-filelock
# Security update for python-filelock
Announcement ID: SUSE-SU-2026:0220-1
Release Date: 2026-01-22T12:15:30Z
Rating: moderate
References:
* bsc#1255244
* bsc#1256457
Cross-References:
* CVE-2025-68146
* CVE-2026-22701
CVSS scores:
* CVE-2025-68146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-68146 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-22701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-22701 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves two vulnerabilities can now be installed.
## Description:
This update for python-filelock fixes the following issues:
* CVE-2025-68146: TOCTOU race condition may allow local attackers to corrupt
or truncate arbitrary user files (bsc#1255244).
* CVE-2026-22701: TOCTOU race condition in the SoftFileLock implementation
(bsc#1256457).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-220=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-220=1
* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-220=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* python311-filelock-3.12.2-150400.10.8.1
* openSUSE Leap 15.6 (noarch)
* python311-filelock-3.12.2-150400.10.8.1
* Python 3 Module 15-SP7 (noarch)
* python311-filelock-3.12.2-150400.10.8.1
## References:
* https://www.suse.com/security/cve/CVE-2025-68146.html
* https://www.suse.com/security/cve/CVE-2026-22701.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255244
* https://bugzilla.suse.com/show_bug.cgi?id=1256457
SUSE-SU-2026:0216-1: important: Security update for kernel-firmware
# Security update for kernel-firmware
Announcement ID: SUSE-SU-2026:0216-1
Release Date: 2026-01-22T12:11:06Z
Rating: important
References:
* bsc#1256483
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that has one security fix can now be installed.
## Description:
This update for kernel-firmware fixes the following issues:
* Update AMD CPU ucode to 20251203 (bsc#1256483)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-216=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-216=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-216=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-216=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-216=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-216=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-216=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-216=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-216=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* ucode-amd-20220509-150400.4.31.1
* kernel-firmware-all-20220509-150400.4.31.1
* kernel-firmware-liquidio-20220509-150400.4.31.1
* kernel-firmware-bluetooth-20220509-150400.4.31.1
* kernel-firmware-radeon-20220509-150400.4.31.1
* kernel-firmware-mwifiex-20220509-150400.4.31.1
* kernel-firmware-nfp-20220509-150400.4.31.1
* kernel-firmware-ath11k-20220509-150400.4.31.1
* kernel-firmware-mediatek-20220509-150400.4.31.1
* kernel-firmware-realtek-20220509-150400.4.31.1
* kernel-firmware-brcm-20220509-150400.4.31.1
* kernel-firmware-sound-20220509-150400.4.31.1
* kernel-firmware-atheros-20220509-150400.4.31.1
* kernel-firmware-amdgpu-20220509-150400.4.31.1
* kernel-firmware-qlogic-20220509-150400.4.31.1
* kernel-firmware-ueagle-20220509-150400.4.31.1
* kernel-firmware-chelsio-20220509-150400.4.31.1
* kernel-firmware-i915-20220509-150400.4.31.1
* kernel-firmware-dpaa2-20220509-150400.4.31.1
* kernel-firmware-media-20220509-150400.4.31.1
* kernel-firmware-network-20220509-150400.4.31.1
* kernel-firmware-qcom-20220509-150400.4.31.1
* kernel-firmware-platform-20220509-150400.4.31.1
* kernel-firmware-mellanox-20220509-150400.4.31.1
* kernel-firmware-ath10k-20220509-150400.4.31.1
* kernel-firmware-nvidia-20220509-150400.4.31.1
* kernel-firmware-serial-20220509-150400.4.31.1
* kernel-firmware-prestera-20220509-150400.4.31.1
* kernel-firmware-intel-20220509-150400.4.31.1
* kernel-firmware-marvell-20220509-150400.4.31.1
* kernel-firmware-ti-20220509-150400.4.31.1
* kernel-firmware-bnx2-20220509-150400.4.31.1
* kernel-firmware-usb-network-20220509-150400.4.31.1
* kernel-firmware-iwlwifi-20220509-150400.4.31.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1256483
SUSE-SU-2026:0219-1: important: Security update for go1.24
# Security update for go1.24
Announcement ID: SUSE-SU-2026:0219-1
Release Date: 2026-01-22T12:14:15Z
Rating: important
References:
* bsc#1236217
* bsc#1256816
* bsc#1256817
* bsc#1256818
* bsc#1256819
* bsc#1256820
* bsc#1256821
Cross-References:
* CVE-2025-61726
* CVE-2025-61728
* CVE-2025-61730
* CVE-2025-61731
* CVE-2025-68119
* CVE-2025-68121
CVSS scores:
* CVE-2025-61726 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61726 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61728 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61730 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-61730 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-61731 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61731 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68119 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68119 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68121 ( SUSE ): 7.6
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected Products:
* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves six vulnerabilities and has one security fix can now be
installed.
## Description:
This update for go1.24 fixes the following issues:
Update to go1.24.12 (released 2026-01-15) (bsc#1236217)
Security fixes:
* CVE-2025-61730: crypto/tls: handshake messages may be processed at the
incorrect encryption level (bsc#1256821).
* CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain
(bsc#1256820).
* CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary
code execution (bsc#1256819).
* CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm
(bsc#1256817).
* CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP
archives (bsc#1256816).
* CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated
session ticket keys, session resumption does not account for the expiration
of full certificate chain (bsc#1256818).
Other fixes:
* go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH
enabled
* go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes
* go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4
windows 386
* go#76796 runtime: race detector crash on ppc64le
* go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while
compiling <function>: runtime error: index out of range
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-219=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-219=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-219=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-219=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-219=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-219=1
* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-219=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-219=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-219=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-219=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-219=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-219=1
## Package List:
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* go1.24-doc-1.24.12-150000.1.53.1
* go1.24-1.24.12-150000.1.53.1
* go1.24-race-1.24.12-150000.1.53.1
## References:
* https://www.suse.com/security/cve/CVE-2025-61726.html
* https://www.suse.com/security/cve/CVE-2025-61728.html
* https://www.suse.com/security/cve/CVE-2025-61730.html
* https://www.suse.com/security/cve/CVE-2025-61731.html
* https://www.suse.com/security/cve/CVE-2025-68119.html
* https://www.suse.com/security/cve/CVE-2025-68121.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236217
* https://bugzilla.suse.com/show_bug.cgi?id=1256816
* https://bugzilla.suse.com/show_bug.cgi?id=1256817
* https://bugzilla.suse.com/show_bug.cgi?id=1256818
* https://bugzilla.suse.com/show_bug.cgi?id=1256819
* https://bugzilla.suse.com/show_bug.cgi?id=1256820
* https://bugzilla.suse.com/show_bug.cgi?id=1256821
SUSE-SU-2026:0226-1: moderate: Security update for python-marshmallow
# Security update for python-marshmallow
Announcement ID: SUSE-SU-2026:0226-1
Release Date: 2026-01-22T12:20:28Z
Rating: moderate
References:
* bsc#1255473
Cross-References:
* CVE-2025-68480
CVSS scores:
* CVE-2025-68480 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-68480 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-68480 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Public Cloud Module 15-SP6
* Public Cloud Module 15-SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for python-marshmallow fixes the following issues:
* CVE-2025-68480: Fixed possible DoS when using Schema.load(data, many=True)
(bsc#1255473).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-226=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-226=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-226=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2026-226=1
* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2026-226=1
* Public Cloud Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2026-226=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* python311-marshmallow-3.20.2-150400.9.10.1
* openSUSE Leap 15.6 (noarch)
* python311-marshmallow-3.20.2-150400.9.10.1
* Public Cloud Module 15-SP4 (noarch)
* python311-marshmallow-3.20.2-150400.9.10.1
* Public Cloud Module 15-SP5 (noarch)
* python311-marshmallow-3.20.2-150400.9.10.1
* Public Cloud Module 15-SP6 (noarch)
* python311-marshmallow-3.20.2-150400.9.10.1
* Public Cloud Module 15-SP7 (noarch)
* python311-marshmallow-3.20.2-150400.9.10.1
## References:
* https://www.suse.com/security/cve/CVE-2025-68480.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255473
SUSE-SU-2026:0224-1: moderate: Security update for libtasn1
# Security update for libtasn1
Announcement ID: SUSE-SU-2026:0224-1
Release Date: 2026-01-22T12:18:39Z
Rating: moderate
References:
* bsc#1256341
Cross-References:
* CVE-2025-13151
CVSS scores:
* CVE-2025-13151 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-13151 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
* CVE-2025-13151 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for libtasn1 fixes the following issues:
* CVE-2025-13151: stack-based buffer overflow in `asn1_expend_octet_string`
(bsc#1256341).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-224=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-224=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-224=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-224=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-224=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-224=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-224=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-224=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-224=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-devel-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* openSUSE Leap 15.6 (x86_64)
* libtasn1-devel-32bit-4.13-150000.4.14.1
* libtasn1-6-32bit-4.13-150000.4.14.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.14.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-devel-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* Basesystem Module 15-SP7 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.14.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.14.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libtasn1-4.13-150000.4.14.1
* libtasn1-6-4.13-150000.4.14.1
* libtasn1-debugsource-4.13-150000.4.14.1
* libtasn1-6-debuginfo-4.13-150000.4.14.1
* libtasn1-debuginfo-4.13-150000.4.14.1
## References:
* https://www.suse.com/security/cve/CVE-2025-13151.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256341
SUSE-SU-2026:0223-1: moderate: Security update for libsodium
# Security update for libsodium
Announcement ID: SUSE-SU-2026:0223-1
Release Date: 2026-01-22T12:18:06Z
Rating: moderate
References:
* bsc#1256070
Cross-References:
* CVE-2025-15444
CVSS scores:
* CVE-2025-15444 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-15444 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for libsodium fixes the following issues:
* CVE-2025-15444: fixed cryptographic bypass via improper elliptic curve point
validation (bsc#1256070).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-223=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-223=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-223=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-223=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-223=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-223=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-223=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-223=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-223=1
## Package List:
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium-devel-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* openSUSE Leap 15.6 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.11.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.11.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libsodium-debugsource-1.0.18-150000.4.11.1
* libsodium-devel-1.0.18-150000.4.11.1
* libsodium23-1.0.18-150000.4.11.1
* libsodium23-debuginfo-1.0.18-150000.4.11.1
* Basesystem Module 15-SP7 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.11.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.11.1
## References:
* https://www.suse.com/security/cve/CVE-2025-15444.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256070
SUSE-SU-2026:0227-1: important: Security update for net-snmp
# Security update for net-snmp
Announcement ID: SUSE-SU-2026:0227-1
Release Date: 2026-01-22T12:21:40Z
Rating: important
References:
* bsc#1255491
Cross-References:
* CVE-2025-68615
CVSS scores:
* CVE-2025-68615 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68615 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68615 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for net-snmp fixes the following issues:
* CVE-2025-68615: Fixed snmptrapd buffer overflow (bsc#1255491)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-227=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-227=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-227=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-227=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-227=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-227=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-227=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-227=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-227=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-227=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-227=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-227=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-227=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-227=1
## Package List:
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* net-snmp-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* openSUSE Leap 15.3 (x86_64)
* net-snmp-devel-32bit-5.9.4-150300.15.21.1
* libsnmp40-32bit-5.9.4-150300.15.21.1
* libsnmp40-32bit-debuginfo-5.9.4-150300.15.21.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python3-net-snmp-5.9.4-150300.15.21.1
* net-snmp-devel-5.9.4-150300.15.21.1
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* python2-net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* perl-SNMP-debuginfo-5.9.4-150300.15.21.1
* python2-net-snmp-5.9.4-150300.15.21.1
* net-snmp-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* python3-net-snmp-debuginfo-5.9.4-150300.15.21.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* net-snmp-devel-64bit-5.9.4-150300.15.21.1
* libsnmp40-64bit-debuginfo-5.9.4-150300.15.21.1
* libsnmp40-64bit-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* snmp-mibs-5.9.4-150300.15.21.1
* net-snmp-debugsource-5.9.4-150300.15.21.1
* libsnmp40-debuginfo-5.9.4-150300.15.21.1
* net-snmp-debuginfo-5.9.4-150300.15.21.1
* libsnmp40-5.9.4-150300.15.21.1
## References:
* https://www.suse.com/security/cve/CVE-2025-68615.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255491
SUSE-SU-2026:0232-1: important: Security update for pgadmin4
# Security update for pgadmin4
Announcement ID: SUSE-SU-2026:0232-1
Release Date: 2026-01-22T12:24:17Z
Rating: important
References:
* bsc#1249151
Cross-References:
* CVE-2025-9636
CVSS scores:
* CVE-2025-9636 ( SUSE ): 7.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2025-9636 ( SUSE ): 7.9 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
* CVE-2025-9636 ( NVD ): 7.9 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
Affected Products:
* openSUSE Leap 15.3
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for pgadmin4 fixes the following issues:
* CVE-2025-9636: Fixed Cross-Origin Opener Policy (COOP) vulnerability
(bsc#1249151).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-232=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-232=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-232=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-232=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-232=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-232=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-232=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-232=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-232=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-232=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-232=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-232=1
## Package List:
* Python 3 Module 15-SP7 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* Python 3 Module 15-SP7 (s390x)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (s390x)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* pgadmin4-web-4.30-150300.3.24.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* pgadmin4-4.30-150300.3.24.1
* pgadmin4-debuginfo-4.30-150300.3.24.1
* openSUSE Leap 15.3 (noarch)
* pgadmin4-doc-4.30-150300.3.24.1
* pgadmin4-web-4.30-150300.3.24.1
* pgadmin4-web-uwsgi-4.30-150300.3.24.1
## References:
* https://www.suse.com/security/cve/CVE-2025-9636.html
* https://bugzilla.suse.com/show_bug.cgi?id=1249151
SUSE-SU-2026:0229-1: important: Security update for ffmpeg-4
# Security update for ffmpeg-4
Announcement ID: SUSE-SU-2026:0229-1
Release Date: 2026-01-22T12:22:23Z
Rating: important
References:
* bsc#1220545
* bsc#1255392
Cross-References:
* CVE-2023-6601
* CVE-2025-63757
CVSS scores:
* CVE-2023-6601 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2023-6601 ( NVD ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
* CVE-2023-6601 ( NVD ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
* CVE-2025-63757 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-63757 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-63757 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for ffmpeg-4 fixes the following issues:
* CVE-2023-6601: Fixed HLS Unsafe File Extension Bypass (bsc#1220545).
* CVE-2025-63757: Fixed integer overflow in yuv2ya16_X_c_template()
(bsc#1255392).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-229=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-229=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-229=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-229=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-229=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libavformat58_76-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-4.4.6-150400.3.60.1
* libavresample4_0-debuginfo-4.4.6-150400.3.60.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-debugsource-4.4.6-150400.3.60.1
* ffmpeg-4-libswresample-devel-4.4.6-150400.3.60.1
* libavutil56_70-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-libavresample-devel-4.4.6-150400.3.60.1
* libavcodec58_134-4.4.6-150400.3.60.1
* libavfilter7_110-4.4.6-150400.3.60.1
* libavformat58_76-4.4.6-150400.3.60.1
* libavutil56_70-4.4.6-150400.3.60.1
* libswresample3_9-4.4.6-150400.3.60.1
* ffmpeg-4-private-devel-4.4.6-150400.3.60.1
* libswresample3_9-debuginfo-4.4.6-150400.3.60.1
* libavresample4_0-4.4.6-150400.3.60.1
* libavfilter7_110-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-libavformat-devel-4.4.6-150400.3.60.1
* ffmpeg-4-libavutil-devel-4.4.6-150400.3.60.1
* libpostproc55_9-4.4.6-150400.3.60.1
* libswscale5_9-4.4.6-150400.3.60.1
* libswscale5_9-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-libavcodec-devel-4.4.6-150400.3.60.1
* libavdevice58_13-4.4.6-150400.3.60.1
* ffmpeg-4-libavdevice-devel-4.4.6-150400.3.60.1
* libavdevice58_13-debuginfo-4.4.6-150400.3.60.1
* libpostproc55_9-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-libavfilter-devel-4.4.6-150400.3.60.1
* ffmpeg-4-libswscale-devel-4.4.6-150400.3.60.1
* ffmpeg-4-libpostproc-devel-4.4.6-150400.3.60.1
* openSUSE Leap 15.4 (x86_64)
* libavutil56_70-32bit-debuginfo-4.4.6-150400.3.60.1
* libswscale5_9-32bit-debuginfo-4.4.6-150400.3.60.1
* libavfilter7_110-32bit-debuginfo-4.4.6-150400.3.60.1
* libavfilter7_110-32bit-4.4.6-150400.3.60.1
* libpostproc55_9-32bit-4.4.6-150400.3.60.1
* libpostproc55_9-32bit-debuginfo-4.4.6-150400.3.60.1
* libavcodec58_134-32bit-4.4.6-150400.3.60.1
* libswresample3_9-32bit-debuginfo-4.4.6-150400.3.60.1
* libavdevice58_13-32bit-debuginfo-4.4.6-150400.3.60.1
* libavresample4_0-32bit-debuginfo-4.4.6-150400.3.60.1
* libavutil56_70-32bit-4.4.6-150400.3.60.1
* libavformat58_76-32bit-debuginfo-4.4.6-150400.3.60.1
* libswresample3_9-32bit-4.4.6-150400.3.60.1
* libavcodec58_134-32bit-debuginfo-4.4.6-150400.3.60.1
* libavformat58_76-32bit-4.4.6-150400.3.60.1
* libswscale5_9-32bit-4.4.6-150400.3.60.1
* libavdevice58_13-32bit-4.4.6-150400.3.60.1
* libavresample4_0-32bit-4.4.6-150400.3.60.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libavresample4_0-64bit-debuginfo-4.4.6-150400.3.60.1
* libavdevice58_13-64bit-debuginfo-4.4.6-150400.3.60.1
* libavformat58_76-64bit-4.4.6-150400.3.60.1
* libavcodec58_134-64bit-debuginfo-4.4.6-150400.3.60.1
* libavutil56_70-64bit-debuginfo-4.4.6-150400.3.60.1
* libavformat58_76-64bit-debuginfo-4.4.6-150400.3.60.1
* libswresample3_9-64bit-4.4.6-150400.3.60.1
* libavdevice58_13-64bit-4.4.6-150400.3.60.1
* libswscale5_9-64bit-4.4.6-150400.3.60.1
* libavresample4_0-64bit-4.4.6-150400.3.60.1
* libavutil56_70-64bit-4.4.6-150400.3.60.1
* libavfilter7_110-64bit-debuginfo-4.4.6-150400.3.60.1
* libavfilter7_110-64bit-4.4.6-150400.3.60.1
* libpostproc55_9-64bit-4.4.6-150400.3.60.1
* libpostproc55_9-64bit-debuginfo-4.4.6-150400.3.60.1
* libswscale5_9-64bit-debuginfo-4.4.6-150400.3.60.1
* libavcodec58_134-64bit-4.4.6-150400.3.60.1
* libswresample3_9-64bit-debuginfo-4.4.6-150400.3.60.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libpostproc55_9-4.4.6-150400.3.60.1
* libavformat58_76-4.4.6-150400.3.60.1
* libavutil56_70-4.4.6-150400.3.60.1
* libswresample3_9-4.4.6-150400.3.60.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.60.1
* libswresample3_9-debuginfo-4.4.6-150400.3.60.1
* libswscale5_9-4.4.6-150400.3.60.1
* libavformat58_76-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-debugsource-4.4.6-150400.3.60.1
* libavutil56_70-debuginfo-4.4.6-150400.3.60.1
* libpostproc55_9-debuginfo-4.4.6-150400.3.60.1
* libavcodec58_134-4.4.6-150400.3.60.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.60.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libpostproc55_9-4.4.6-150400.3.60.1
* libavformat58_76-4.4.6-150400.3.60.1
* libavutil56_70-4.4.6-150400.3.60.1
* libswresample3_9-4.4.6-150400.3.60.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.60.1
* libswresample3_9-debuginfo-4.4.6-150400.3.60.1
* libswscale5_9-4.4.6-150400.3.60.1
* libavformat58_76-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-debugsource-4.4.6-150400.3.60.1
* libavutil56_70-debuginfo-4.4.6-150400.3.60.1
* libpostproc55_9-debuginfo-4.4.6-150400.3.60.1
* libavcodec58_134-4.4.6-150400.3.60.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.60.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libpostproc55_9-4.4.6-150400.3.60.1
* libavformat58_76-4.4.6-150400.3.60.1
* libavutil56_70-4.4.6-150400.3.60.1
* libswresample3_9-4.4.6-150400.3.60.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.60.1
* libswresample3_9-debuginfo-4.4.6-150400.3.60.1
* libswscale5_9-4.4.6-150400.3.60.1
* libavformat58_76-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-debugsource-4.4.6-150400.3.60.1
* libavutil56_70-debuginfo-4.4.6-150400.3.60.1
* libpostproc55_9-debuginfo-4.4.6-150400.3.60.1
* libavcodec58_134-4.4.6-150400.3.60.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.60.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libpostproc55_9-4.4.6-150400.3.60.1
* libavformat58_76-4.4.6-150400.3.60.1
* libavutil56_70-4.4.6-150400.3.60.1
* libswresample3_9-4.4.6-150400.3.60.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.60.1
* libswresample3_9-debuginfo-4.4.6-150400.3.60.1
* libswscale5_9-4.4.6-150400.3.60.1
* libavformat58_76-debuginfo-4.4.6-150400.3.60.1
* ffmpeg-4-debugsource-4.4.6-150400.3.60.1
* libavutil56_70-debuginfo-4.4.6-150400.3.60.1
* libpostproc55_9-debuginfo-4.4.6-150400.3.60.1
* libavcodec58_134-4.4.6-150400.3.60.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.60.1
## References:
* https://www.suse.com/security/cve/CVE-2023-6601.html
* https://www.suse.com/security/cve/CVE-2025-63757.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220545
* https://bugzilla.suse.com/show_bug.cgi?id=1255392
SUSE-SU-2026:0233-1: moderate: Security update for python-virtualenv
# Security update for python-virtualenv
Announcement ID: SUSE-SU-2026:0233-1
Release Date: 2026-01-22T12:24:36Z
Rating: moderate
References:
* bsc#1256458
Cross-References:
* CVE-2026-22702
CVSS scores:
* CVE-2026-22702 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-22702 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-22702 ( NVD ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for python-virtualenv fixes the following issues:
* CVE-2026-22702: Fixed local attacker can redirect file operations via TOCTOU
race condition (bsc#1256458).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-233=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-233=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-233=1
## Package List:
* Python 3 Module 15-SP7 (noarch)
* python311-virtualenv-20.22.0-150400.9.9.1
* openSUSE Leap 15.4 (noarch)
* python311-virtualenv-20.22.0-150400.9.9.1
* openSUSE Leap 15.6 (noarch)
* python311-virtualenv-20.22.0-150400.9.9.1
## References:
* https://www.suse.com/security/cve/CVE-2026-22702.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256458
SUSE-SU-2026:0234-1: moderate: Security update for libpng16
# Security update for libpng16
Announcement ID: SUSE-SU-2026:0234-1
Release Date: 2026-01-22T12:24:52Z
Rating: moderate
References:
* bsc#1256525
* bsc#1256526
Cross-References:
* CVE-2026-22695
* CVE-2026-22801
CVSS scores:
* CVE-2026-22695 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22695 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
* CVE-2026-22695 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
* CVE-2026-22695 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
* CVE-2026-22801 ( SUSE ): 7.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22801 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-22801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-22801 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves two vulnerabilities can now be installed.
## Description:
This update for libpng16 fixes the following issues:
* CVE-2026-22695: Fixed heap buffer over-read in png_image_finish_read
(bsc#1256525)
* CVE-2026-22801: Fixed integer truncation causing heap buffer over-read in
png_image_write_* (bsc#1256526).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-234=1 openSUSE-SLE-15.6-2026-234=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-234=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libpng16-16-debuginfo-1.6.40-150600.3.6.1
* libpng16-devel-1.6.40-150600.3.6.1
* libpng16-tools-1.6.40-150600.3.6.1
* libpng16-16-1.6.40-150600.3.6.1
* libpng16-compat-devel-1.6.40-150600.3.6.1
* libpng16-tools-debuginfo-1.6.40-150600.3.6.1
* libpng16-debugsource-1.6.40-150600.3.6.1
* openSUSE Leap 15.6 (x86_64)
* libpng16-16-32bit-debuginfo-1.6.40-150600.3.6.1
* libpng16-compat-devel-32bit-1.6.40-150600.3.6.1
* libpng16-devel-32bit-1.6.40-150600.3.6.1
* libpng16-16-32bit-1.6.40-150600.3.6.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libpng16-devel-64bit-1.6.40-150600.3.6.1
* libpng16-16-64bit-1.6.40-150600.3.6.1
* libpng16-16-64bit-debuginfo-1.6.40-150600.3.6.1
* libpng16-compat-devel-64bit-1.6.40-150600.3.6.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libpng16-16-debuginfo-1.6.40-150600.3.6.1
* libpng16-devel-1.6.40-150600.3.6.1
* libpng16-16-1.6.40-150600.3.6.1
* libpng16-compat-devel-1.6.40-150600.3.6.1
* libpng16-debugsource-1.6.40-150600.3.6.1
* Basesystem Module 15-SP7 (x86_64)
* libpng16-16-32bit-debuginfo-1.6.40-150600.3.6.1
* libpng16-16-32bit-1.6.40-150600.3.6.1
## References:
* https://www.suse.com/security/cve/CVE-2026-22695.html
* https://www.suse.com/security/cve/CVE-2026-22801.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256525
* https://bugzilla.suse.com/show_bug.cgi?id=1256526
SUSE-SU-2026:0228-1: important: Security update for net-snmp
# Security update for net-snmp
Announcement ID: SUSE-SU-2026:0228-1
Release Date: 2026-01-22T12:22:04Z
Rating: important
References:
* bsc#1255491
Cross-References:
* CVE-2025-68615
CVSS scores:
* CVE-2025-68615 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68615 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68615 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for net-snmp fixes the following issues:
* CVE-2025-68615: Fixed snmptrapd buffer overflow (bsc#1255491)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-228=1 openSUSE-SLE-15.6-2026-228=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-228=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-228=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-228=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-228=1
## Package List:
* openSUSE Leap 15.6 (x86_64)
* libsnmp40-32bit-debuginfo-5.9.4-150600.24.10.1
* net-snmp-devel-32bit-5.9.4-150600.24.10.1
* libsnmp40-32bit-5.9.4-150600.24.10.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* net-snmp-debuginfo-5.9.4-150600.24.10.1
* snmp-mibs-5.9.4-150600.24.10.1
* libsnmp40-debuginfo-5.9.4-150600.24.10.1
* net-snmp-debugsource-5.9.4-150600.24.10.1
* python3-net-snmp-5.9.4-150600.24.10.1
* python3-net-snmp-debuginfo-5.9.4-150600.24.10.1
* net-snmp-5.9.4-150600.24.10.1
* libsnmp40-5.9.4-150600.24.10.1
* net-snmp-devel-5.9.4-150600.24.10.1
* perl-SNMP-5.9.4-150600.24.10.1
* perl-SNMP-debuginfo-5.9.4-150600.24.10.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* net-snmp-devel-64bit-5.9.4-150600.24.10.1
* libsnmp40-64bit-5.9.4-150600.24.10.1
* libsnmp40-64bit-debuginfo-5.9.4-150600.24.10.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* net-snmp-debuginfo-5.9.4-150600.24.10.1
* snmp-mibs-5.9.4-150600.24.10.1
* libsnmp40-debuginfo-5.9.4-150600.24.10.1
* net-snmp-debugsource-5.9.4-150600.24.10.1
* net-snmp-5.9.4-150600.24.10.1
* libsnmp40-5.9.4-150600.24.10.1
* net-snmp-devel-5.9.4-150600.24.10.1
* perl-SNMP-5.9.4-150600.24.10.1
* perl-SNMP-debuginfo-5.9.4-150600.24.10.1
* SUSE Package Hub 15 15-SP7 (x86_64)
* libsnmp40-32bit-debuginfo-5.9.4-150600.24.10.1
* libsnmp40-32bit-5.9.4-150600.24.10.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* net-snmp-debuginfo-5.9.4-150600.24.10.1
* snmp-mibs-5.9.4-150600.24.10.1
* libsnmp40-debuginfo-5.9.4-150600.24.10.1
* net-snmp-debugsource-5.9.4-150600.24.10.1
* net-snmp-5.9.4-150600.24.10.1
* libsnmp40-5.9.4-150600.24.10.1
* net-snmp-devel-5.9.4-150600.24.10.1
* perl-SNMP-5.9.4-150600.24.10.1
* perl-SNMP-debuginfo-5.9.4-150600.24.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* net-snmp-debuginfo-5.9.4-150600.24.10.1
* snmp-mibs-5.9.4-150600.24.10.1
* libsnmp40-debuginfo-5.9.4-150600.24.10.1
* net-snmp-debugsource-5.9.4-150600.24.10.1
* net-snmp-5.9.4-150600.24.10.1
* libsnmp40-5.9.4-150600.24.10.1
* net-snmp-devel-5.9.4-150600.24.10.1
* perl-SNMP-5.9.4-150600.24.10.1
* perl-SNMP-debuginfo-5.9.4-150600.24.10.1
## References:
* https://www.suse.com/security/cve/CVE-2025-68615.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255491
SUSE-SU-2026:0231-1: low: Security update for exiv2-0_26
# Security update for exiv2-0_26
Announcement ID: SUSE-SU-2026:0231-1
Release Date: 2026-01-22T12:23:05Z
Rating: low
References:
* bsc#1248963
Cross-References:
* CVE-2025-55304
CVSS scores:
* CVE-2025-55304 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-55304 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-55304 ( NVD ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves one vulnerability can now be installed.
## Description:
This update for exiv2-0_26 fixes the following issues:
Add reference for previously fixed issue:
* CVE-2025-55304: Fixed quadratic performance algorithm in the ICC profile
parsing code of `JpegBase::readMetadata` (bsc#1248963).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-231=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-231=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-231=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-231=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-231=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-231=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* exiv2-0_26-debugsource-0.26-150400.9.27.1
* libexiv2-26-0.26-150400.9.27.1
* libexiv2-26-debuginfo-0.26-150400.9.27.1
* openSUSE Leap 15.4 (x86_64)
* libexiv2-26-32bit-0.26-150400.9.27.1
* libexiv2-26-32bit-debuginfo-0.26-150400.9.27.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libexiv2-26-64bit-debuginfo-0.26-150400.9.27.1
* libexiv2-26-64bit-0.26-150400.9.27.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* exiv2-0_26-debugsource-0.26-150400.9.27.1
* libexiv2-26-0.26-150400.9.27.1
* libexiv2-26-debuginfo-0.26-150400.9.27.1
* openSUSE Leap 15.6 (x86_64)
* libexiv2-26-32bit-0.26-150400.9.27.1
* libexiv2-26-32bit-debuginfo-0.26-150400.9.27.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libexiv2-26-0.26-150400.9.27.1
* libexiv2-26-debuginfo-0.26-150400.9.27.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libexiv2-26-0.26-150400.9.27.1
* libexiv2-26-debuginfo-0.26-150400.9.27.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libexiv2-26-0.26-150400.9.27.1
* libexiv2-26-debuginfo-0.26-150400.9.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libexiv2-26-0.26-150400.9.27.1
* libexiv2-26-debuginfo-0.26-150400.9.27.1
## References:
* https://www.suse.com/security/cve/CVE-2025-55304.html
* https://bugzilla.suse.com/show_bug.cgi?id=1248963
SUSE-SU-2026:0243-1: moderate: Security update for librsvg
# Security update for librsvg
Announcement ID: SUSE-SU-2026:0243-1
Release Date: 2026-01-22T13:57:48Z
Rating: moderate
References:
* bsc#1243867
Cross-References:
* CVE-2024-12224
CVSS scores:
* CVE-2024-12224 ( SUSE ): 2.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-12224 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2024-12224 ( NVD ): 5.1
CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* Basesystem Module 15-SP7
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for librsvg fixes the following issues:
Update to version 2.57.4 - bsc#1243867:
* CVE-2024-12224: RUSTSEC-2024-0421 - idna accepts Punycode labels that do not
produce any non-ASCII when decoded.
* RUSTSEC-2024-0404 - Unsoundness in anstream.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-243=1
* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-243=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-243=1 openSUSE-SLE-15.6-2026-243=1
## Package List:
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-loader-rsvg-debuginfo-2.57.4-150600.3.3.1
* librsvg-debugsource-2.57.4-150600.3.3.1
* librsvg-2-2-2.57.4-150600.3.3.1
* librsvg-2-2-debuginfo-2.57.4-150600.3.3.1
* gdk-pixbuf-loader-rsvg-2.57.4-150600.3.3.1
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* librsvg-debugsource-2.57.4-150600.3.3.1
* librsvg-devel-2.57.4-150600.3.3.1
* typelib-1_0-Rsvg-2_0-2.57.4-150600.3.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* typelib-1_0-Rsvg-2_0-2.57.4-150600.3.3.1
* gdk-pixbuf-loader-rsvg-debuginfo-2.57.4-150600.3.3.1
* rsvg-convert-2.57.4-150600.3.3.1
* librsvg-debugsource-2.57.4-150600.3.3.1
* librsvg-devel-2.57.4-150600.3.3.1
* librsvg-2-2-2.57.4-150600.3.3.1
* librsvg-2-2-debuginfo-2.57.4-150600.3.3.1
* gdk-pixbuf-loader-rsvg-2.57.4-150600.3.3.1
* rsvg-convert-debuginfo-2.57.4-150600.3.3.1
* openSUSE Leap 15.6 (x86_64)
* librsvg-2-2-32bit-2.57.4-150600.3.3.1
* librsvg-2-2-32bit-debuginfo-2.57.4-150600.3.3.1
* gdk-pixbuf-loader-rsvg-32bit-debuginfo-2.57.4-150600.3.3.1
* gdk-pixbuf-loader-rsvg-32bit-2.57.4-150600.3.3.1
* openSUSE Leap 15.6 (noarch)
* rsvg-thumbnailer-2.57.4-150600.3.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* gdk-pixbuf-loader-rsvg-64bit-2.57.4-150600.3.3.1
* gdk-pixbuf-loader-rsvg-64bit-debuginfo-2.57.4-150600.3.3.1
* librsvg-2-2-64bit-debuginfo-2.57.4-150600.3.3.1
* librsvg-2-2-64bit-2.57.4-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-12224.html
* https://bugzilla.suse.com/show_bug.cgi?id=1243867
SUSE-SU-2026:0245-1: moderate: Security update for php7
# Security update for php7
Announcement ID: SUSE-SU-2026:0245-1
Release Date: 2026-01-22T15:18:47Z
Rating: moderate
References:
* bsc#1255711
* jsc#PED-13850
Cross-References:
* CVE-2025-14178
CVSS scores:
* CVE-2025-14178 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14178 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-14178 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-14178 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Affected Products:
* Legacy Module 15-SP7
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7
An update that solves one vulnerability and contains one feature can now be
installed.
## Description:
This update for php7 fixes the following issues:
Security fixes:
* CVE-2025-14178: heap buffer overflow occurs in array_merge() when the total
element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE
(bsc#1255711).
Other fixes:
* Add all php7 packages to PackageHUB (unsupported), no source changes.
(bsc#1251932)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-245=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-245=1
* Legacy Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2026-245=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-245=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-245=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-245=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-245=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-245=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-245=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-245=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-245=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-245=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* php7-embed-debuginfo-7.4.33-150400.4.55.1
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-test-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-embed-debugsource-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-embed-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* php7-embed-debuginfo-7.4.33-150400.4.55.1
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-test-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-embed-debugsource-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-embed-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
* php7-embed-debuginfo-7.4.33-150400.4.55.1
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-test-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-embed-debugsource-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-embed-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* php7-json-7.4.33-150400.4.55.1
* php7-xmlreader-7.4.33-150400.4.55.1
* php7-calendar-7.4.33-150400.4.55.1
* php7-readline-debuginfo-7.4.33-150400.4.55.1
* php7-iconv-debuginfo-7.4.33-150400.4.55.1
* php7-ldap-debuginfo-7.4.33-150400.4.55.1
* php7-phar-debuginfo-7.4.33-150400.4.55.1
* php7-sysvsem-7.4.33-150400.4.55.1
* php7-pcntl-debuginfo-7.4.33-150400.4.55.1
* php7-zip-7.4.33-150400.4.55.1
* php7-zip-debuginfo-7.4.33-150400.4.55.1
* php7-bcmath-debuginfo-7.4.33-150400.4.55.1
* php7-pgsql-debuginfo-7.4.33-150400.4.55.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-debuginfo-7.4.33-150400.4.55.1
* php7-intl-debuginfo-7.4.33-150400.4.55.1
* php7-cli-debuginfo-7.4.33-150400.4.55.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-7.4.33-150400.4.55.1
* php7-fpm-7.4.33-150400.4.55.1
* php7-pgsql-7.4.33-150400.4.55.1
* php7-dba-debuginfo-7.4.33-150400.4.55.1
* php7-odbc-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.55.1
* php7-json-debuginfo-7.4.33-150400.4.55.1
* php7-pdo-7.4.33-150400.4.55.1
* php7-fpm-debugsource-7.4.33-150400.4.55.1
* php7-soap-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-7.4.33-150400.4.55.1
* php7-xsl-debuginfo-7.4.33-150400.4.55.1
* php7-shmop-debuginfo-7.4.33-150400.4.55.1
* php7-mysql-debuginfo-7.4.33-150400.4.55.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1
* php7-fpm-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-7.4.33-150400.4.55.1
* php7-sodium-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-debuginfo-7.4.33-150400.4.55.1
* php7-curl-debuginfo-7.4.33-150400.4.55.1
* php7-sockets-7.4.33-150400.4.55.1
* php7-openssl-debuginfo-7.4.33-150400.4.55.1
* php7-enchant-7.4.33-150400.4.55.1
* php7-ldap-7.4.33-150400.4.55.1
* php7-sqlite-7.4.33-150400.4.55.1
* php7-mbstring-debuginfo-7.4.33-150400.4.55.1
* php7-mbstring-7.4.33-150400.4.55.1
* php7-shmop-7.4.33-150400.4.55.1
* php7-ctype-7.4.33-150400.4.55.1
* php7-fileinfo-7.4.33-150400.4.55.1
* php7-odbc-7.4.33-150400.4.55.1
* php7-calendar-debuginfo-7.4.33-150400.4.55.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1
* php7-dom-7.4.33-150400.4.55.1
* apache2-mod_php7-7.4.33-150400.4.55.1
* php7-xsl-7.4.33-150400.4.55.1
* php7-intl-7.4.33-150400.4.55.1
* php7-openssl-7.4.33-150400.4.55.1
* php7-ftp-7.4.33-150400.4.55.1
* php7-posix-debuginfo-7.4.33-150400.4.55.1
* php7-tidy-7.4.33-150400.4.55.1
* php7-gd-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-7.4.33-150400.4.55.1
* php7-readline-7.4.33-150400.4.55.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.55.1
* php7-bz2-debuginfo-7.4.33-150400.4.55.1
* php7-zlib-debuginfo-7.4.33-150400.4.55.1
* php7-gd-7.4.33-150400.4.55.1
* php7-gmp-7.4.33-150400.4.55.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.55.1
* php7-snmp-7.4.33-150400.4.55.1
* php7-ftp-debuginfo-7.4.33-150400.4.55.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.55.1
* php7-sysvmsg-7.4.33-150400.4.55.1
* php7-fastcgi-7.4.33-150400.4.55.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.55.1
* php7-gmp-debuginfo-7.4.33-150400.4.55.1
* php7-pcntl-7.4.33-150400.4.55.1
* php7-sockets-debuginfo-7.4.33-150400.4.55.1
* php7-phar-7.4.33-150400.4.55.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.55.1
* php7-soap-7.4.33-150400.4.55.1
* php7-enchant-debuginfo-7.4.33-150400.4.55.1
* php7-tokenizer-7.4.33-150400.4.55.1
* php7-bcmath-7.4.33-150400.4.55.1
* php7-debugsource-7.4.33-150400.4.55.1
* php7-posix-7.4.33-150400.4.55.1
* php7-iconv-7.4.33-150400.4.55.1
* php7-dom-debuginfo-7.4.33-150400.4.55.1
* php7-devel-7.4.33-150400.4.55.1
* php7-exif-debuginfo-7.4.33-150400.4.55.1
* php7-sodium-7.4.33-150400.4.55.1
* php7-xmlwriter-7.4.33-150400.4.55.1
* php7-exif-7.4.33-150400.4.55.1
* php7-fastcgi-debugsource-7.4.33-150400.4.55.1
* php7-xmlrpc-7.4.33-150400.4.55.1
* php7-debuginfo-7.4.33-150400.4.55.1
* php7-curl-7.4.33-150400.4.55.1
* php7-dba-7.4.33-150400.4.55.1
* php7-opcache-debuginfo-7.4.33-150400.4.55.1
* php7-7.4.33-150400.4.55.1
* php7-mysql-7.4.33-150400.4.55.1
* php7-opcache-7.4.33-150400.4.55.1
* php7-cli-7.4.33-150400.4.55.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1
* php7-sqlite-debuginfo-7.4.33-150400.4.55.1
* php7-gettext-debuginfo-7.4.33-150400.4.55.1
* php7-ctype-debuginfo-7.4.33-150400.4.55.1
## References:
* https://www.suse.com/security/cve/CVE-2025-14178.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255711
* https://jira.suse.com/browse/PED-13850
SUSE-SU-2026:0236-1: important: Security update for busybox
# Security update for busybox
Announcement ID: SUSE-SU-2026:0236-1
Release Date: 2026-01-22T12:25:56Z
Rating: important
References:
* bsc#1236670
* bsc#1241661
* bsc#1247779
* bsc#1249237
* bsc#1253245
Cross-References:
* CVE-2025-46394
* CVE-2025-60876
CVSS scores:
* CVE-2025-46394 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N
* CVE-2025-46394 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
* CVE-2025-46394 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-46394 ( NVD ): 3.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2025-60876 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:H/SI:H/SA:N
* CVE-2025-60876 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
* CVE-2025-60876 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities and has three security fixes can now
be installed.
## Description:
This update for busybox fixes the following issues:
This update for busybox fixes the following issues:
Security issues:
* CVE-2025-46394: Fixed tar hidden files via escape sequence (CVE-2025-46394,
bsc#1241661)
* CVE-2025-60876: Fixed HTTP request header injection in wget (CVE-2025-60876,
bsc#1253245)
Other issues:
* Set CONFIG_FIRST_SYSTEM_ID to 201 to avoid confclict (bsc#1236670)
* Fixed unshare -mrpf sh core dump on ppc64le (bsc#1249237)
* Fixed adduser inside containers on an SELinux host (bsc#1247779)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-236=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-236=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-236=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-236=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-236=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-236=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-236=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-236=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* busybox-policycoreutils-1.37.0-150500.7.9.1
* busybox-tar-1.37.0-150500.7.9.1
* busybox-udhcpc-1.37.0-150500.7.9.1
* busybox-selinux-tools-1.37.0-150500.7.9.1
* busybox-findutils-1.37.0-150500.7.9.1
* busybox-time-1.37.0-150500.7.9.1
* busybox-netcat-1.37.0-150500.7.9.1
* busybox-ncurses-utils-1.37.0-150500.7.9.1
* busybox-ed-1.37.0-150500.7.9.1
* busybox-adduser-1.37.0-150500.7.9.1
* busybox-links-1.37.0-150500.7.9.1
* busybox-traceroute-1.37.0-150500.7.9.1
* busybox-misc-1.37.0-150500.7.9.1
* busybox-net-tools-1.37.0-150500.7.9.1
* busybox-unzip-1.37.0-150500.7.9.1
* busybox-util-linux-1.37.0-150500.7.9.1
* busybox-iproute2-1.37.0-150500.7.9.1
* busybox-sharutils-1.37.0-150500.7.9.1
* busybox-whois-1.37.0-150500.7.9.1
* busybox-tftp-1.37.0-150500.7.9.1
* busybox-kbd-1.37.0-150500.7.9.1
* busybox-cpio-1.37.0-150500.7.9.1
* busybox-grep-1.37.0-150500.7.9.1
* busybox-patch-1.37.0-150500.7.9.1
* busybox-bind-utils-1.37.0-150500.7.9.1
* busybox-vlan-1.37.0-150500.7.9.1
* busybox-iputils-1.37.0-150500.7.9.1
* busybox-sendmail-1.37.0-150500.7.9.1
* busybox-attr-1.37.0-150500.7.9.1
* busybox-xz-1.37.0-150500.7.9.1
* busybox-gzip-1.37.0-150500.7.9.1
* busybox-hostname-1.37.0-150500.7.9.1
* busybox-kmod-1.37.0-150500.7.9.1
* busybox-sed-1.37.0-150500.7.9.1
* busybox-psmisc-1.37.0-150500.7.9.1
* busybox-dos2unix-1.37.0-150500.7.9.1
* busybox-sha3sum-1.37.0-150500.7.9.1
* busybox-which-1.37.0-150500.7.9.1
* busybox-gawk-1.37.0-150500.7.9.1
* busybox-tunctl-1.37.0-150500.7.9.1
* busybox-diffutils-1.37.0-150500.7.9.1
* busybox-telnet-1.37.0-150500.7.9.1
* busybox-sysvinit-tools-1.37.0-150500.7.9.1
* busybox-hexedit-1.37.0-150500.7.9.1
* busybox-syslogd-1.37.0-150500.7.9.1
* busybox-procps-1.37.0-150500.7.9.1
* busybox-sh-1.37.0-150500.7.9.1
* busybox-coreutils-1.37.0-150500.7.9.1
* busybox-vi-1.37.0-150500.7.9.1
* busybox-bzip2-1.37.0-150500.7.9.1
* busybox-less-1.37.0-150500.7.9.1
* busybox-man-1.37.0-150500.7.9.1
* busybox-bc-1.37.0-150500.7.9.1
* busybox-wget-1.37.0-150500.7.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* busybox-static-1.37.0-150500.10.14.1
* busybox-testsuite-1.37.0-150500.10.14.1
* busybox-1.37.0-150500.10.14.1
* busybox-static-debuginfo-1.37.0-150500.10.14.1
* busybox-debuginfo-1.37.0-150500.10.14.1
* busybox-debugsource-1.37.0-150500.10.14.1
* openSUSE Leap 15.5 (aarch64 x86_64 i586)
* busybox-warewulf3-1.37.0-150500.10.14.1
* busybox-warewulf3-debuginfo-1.37.0-150500.10.14.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* busybox-1.37.0-150500.10.14.1
* busybox-static-1.37.0-150500.10.14.1
* busybox-testsuite-1.37.0-150500.10.14.1
* openSUSE Leap 15.6 (noarch)
* busybox-policycoreutils-1.37.0-150500.7.9.1
* busybox-tar-1.37.0-150500.7.9.1
* busybox-udhcpc-1.37.0-150500.7.9.1
* busybox-selinux-tools-1.37.0-150500.7.9.1
* busybox-findutils-1.37.0-150500.7.9.1
* busybox-time-1.37.0-150500.7.9.1
* busybox-netcat-1.37.0-150500.7.9.1
* busybox-ncurses-utils-1.37.0-150500.7.9.1
* busybox-ed-1.37.0-150500.7.9.1
* busybox-adduser-1.37.0-150500.7.9.1
* busybox-links-1.37.0-150500.7.9.1
* busybox-traceroute-1.37.0-150500.7.9.1
* busybox-misc-1.37.0-150500.7.9.1
* busybox-net-tools-1.37.0-150500.7.9.1
* busybox-unzip-1.37.0-150500.7.9.1
* busybox-util-linux-1.37.0-150500.7.9.1
* busybox-iproute2-1.37.0-150500.7.9.1
* busybox-sharutils-1.37.0-150500.7.9.1
* busybox-whois-1.37.0-150500.7.9.1
* busybox-tftp-1.37.0-150500.7.9.1
* busybox-kbd-1.37.0-150500.7.9.1
* busybox-cpio-1.37.0-150500.7.9.1
* busybox-grep-1.37.0-150500.7.9.1
* busybox-patch-1.37.0-150500.7.9.1
* busybox-bind-utils-1.37.0-150500.7.9.1
* busybox-vlan-1.37.0-150500.7.9.1
* busybox-iputils-1.37.0-150500.7.9.1
* busybox-sendmail-1.37.0-150500.7.9.1
* busybox-attr-1.37.0-150500.7.9.1
* busybox-xz-1.37.0-150500.7.9.1
* busybox-gzip-1.37.0-150500.7.9.1
* busybox-hostname-1.37.0-150500.7.9.1
* busybox-kmod-1.37.0-150500.7.9.1
* busybox-sed-1.37.0-150500.7.9.1
* busybox-psmisc-1.37.0-150500.7.9.1
* busybox-dos2unix-1.37.0-150500.7.9.1
* busybox-sha3sum-1.37.0-150500.7.9.1
* busybox-which-1.37.0-150500.7.9.1
* busybox-gawk-1.37.0-150500.7.9.1
* busybox-tunctl-1.37.0-150500.7.9.1
* busybox-diffutils-1.37.0-150500.7.9.1
* busybox-telnet-1.37.0-150500.7.9.1
* busybox-sysvinit-tools-1.37.0-150500.7.9.1
* busybox-hexedit-1.37.0-150500.7.9.1
* busybox-syslogd-1.37.0-150500.7.9.1
* busybox-procps-1.37.0-150500.7.9.1
* busybox-sh-1.37.0-150500.7.9.1
* busybox-coreutils-1.37.0-150500.7.9.1
* busybox-vi-1.37.0-150500.7.9.1
* busybox-bzip2-1.37.0-150500.7.9.1
* busybox-less-1.37.0-150500.7.9.1
* busybox-man-1.37.0-150500.7.9.1
* busybox-bc-1.37.0-150500.7.9.1
* busybox-wget-1.37.0-150500.7.9.1
* openSUSE Leap 15.6 (aarch64 x86_64)
* busybox-warewulf3-1.37.0-150500.10.14.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* busybox-1.37.0-150500.10.14.1
* busybox-static-1.37.0-150500.10.14.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* busybox-1.37.0-150500.10.14.1
* busybox-static-1.37.0-150500.10.14.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* busybox-1.37.0-150500.10.14.1
* busybox-static-1.37.0-150500.10.14.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* busybox-1.37.0-150500.10.14.1
* busybox-static-1.37.0-150500.10.14.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* busybox-1.37.0-150500.10.14.1
* busybox-static-1.37.0-150500.10.14.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* busybox-1.37.0-150500.10.14.1
* busybox-static-1.37.0-150500.10.14.1
## References:
* https://www.suse.com/security/cve/CVE-2025-46394.html
* https://www.suse.com/security/cve/CVE-2025-60876.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236670
* https://bugzilla.suse.com/show_bug.cgi?id=1241661
* https://bugzilla.suse.com/show_bug.cgi?id=1247779
* https://bugzilla.suse.com/show_bug.cgi?id=1249237
* https://bugzilla.suse.com/show_bug.cgi?id=1253245
SUSE-SU-2026:0237-1: moderate: Security update for wireshark
# Security update for wireshark
Announcement ID: SUSE-SU-2026:0237-1
Release Date: 2026-01-22T12:26:16Z
Rating: moderate
References:
* bsc#1256734
* bsc#1256736
* bsc#1256739
Cross-References:
* CVE-2026-0959
* CVE-2026-0960
* CVE-2026-0962
CVSS scores:
* CVE-2026-0959 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0959 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0959 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0959 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0960 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0960 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0962 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0962 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0962 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-0962 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP7
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves three vulnerabilities can now be installed.
## Description:
This update for wireshark fixes the following issues:
* CVE-2026-0959: IEEE 802.11 dissector crash (bsc#1256734).
* CVE-2026-0960: HTTP3 dissector infinite loop (bsc#1256736).
* CVE-2026-0962: SOME/IP-SD dissector crash (bsc#1256739).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-237=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-237=1 openSUSE-SLE-15.6-2026-237=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-237=1
## Package List:
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* wireshark-devel-4.2.14-150600.18.35.1
* wireshark-debuginfo-4.2.14-150600.18.35.1
* wireshark-ui-qt-debuginfo-4.2.14-150600.18.35.1
* wireshark-debugsource-4.2.14-150600.18.35.1
* wireshark-ui-qt-4.2.14-150600.18.35.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* wireshark-devel-4.2.14-150600.18.35.1
* libwireshark17-debuginfo-4.2.14-150600.18.35.1
* wireshark-debuginfo-4.2.14-150600.18.35.1
* libwiretap14-debuginfo-4.2.14-150600.18.35.1
* libwiretap14-4.2.14-150600.18.35.1
* wireshark-ui-qt-debuginfo-4.2.14-150600.18.35.1
* wireshark-debugsource-4.2.14-150600.18.35.1
* libwsutil15-debuginfo-4.2.14-150600.18.35.1
* libwireshark17-4.2.14-150600.18.35.1
* wireshark-4.2.14-150600.18.35.1
* wireshark-ui-qt-4.2.14-150600.18.35.1
* libwsutil15-4.2.14-150600.18.35.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libwireshark17-debuginfo-4.2.14-150600.18.35.1
* wireshark-debuginfo-4.2.14-150600.18.35.1
* libwiretap14-debuginfo-4.2.14-150600.18.35.1
* libwiretap14-4.2.14-150600.18.35.1
* wireshark-debugsource-4.2.14-150600.18.35.1
* libwsutil15-debuginfo-4.2.14-150600.18.35.1
* libwireshark17-4.2.14-150600.18.35.1
* wireshark-4.2.14-150600.18.35.1
* libwsutil15-4.2.14-150600.18.35.1
## References:
* https://www.suse.com/security/cve/CVE-2026-0959.html
* https://www.suse.com/security/cve/CVE-2026-0960.html
* https://www.suse.com/security/cve/CVE-2026-0962.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256734
* https://bugzilla.suse.com/show_bug.cgi?id=1256736
* https://bugzilla.suse.com/show_bug.cgi?id=1256739
SUSE-SU-2026:0246-1: important: Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5)
# Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise
15 SP5)
Announcement ID: SUSE-SU-2026:0246-1
Release Date: 2026-01-22T15:19:55Z
Rating: important
References:
* bsc#1235815
* bsc#1248400
* bsc#1248615
* bsc#1248670
* bsc#1250665
* bsc#1251165
* bsc#1251203
* bsc#1251787
* bsc#1253437
* bsc#1254451
Cross-References:
* CVE-2022-50327
* CVE-2022-50409
* CVE-2022-50490
* CVE-2023-53676
* CVE-2024-57849
* CVE-2024-58239
* CVE-2025-38476
* CVE-2025-38572
* CVE-2025-38608
* CVE-2025-40204
CVSS scores:
* CVE-2022-50327 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50409 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50490 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53676 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57849 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58239 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38476 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38608 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 10 vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.91 fixes
various security issues
The following security issues were fixed:
* CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return
value (bsc#1254451).
* CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in
sk_stream_wait_memory (bsc#1250665).
* CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace
(bsc#1251165).
* CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in
lio_target_nacl_info_show() (bsc#1251787).
* CVE-2024-57849: s390/cpum_sf: handle CPU hotplug remove during sampling
(bsc#1235815).
* CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA
(bsc#1248615).
* CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline()
(bsc#1251203).
* CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment()
(bsc#1248400).
* CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data()
in ktls (bsc#1248670).
* CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-246=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-246=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_22-debugsource-17-150500.2.1
* kernel-livepatch-5_14_21-150500_55_91-default-17-150500.2.1
* kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-17-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_22-debugsource-17-150500.2.1
* kernel-livepatch-5_14_21-150500_55_91-default-17-150500.2.1
* kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-17-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50327.html
* https://www.suse.com/security/cve/CVE-2022-50409.html
* https://www.suse.com/security/cve/CVE-2022-50490.html
* https://www.suse.com/security/cve/CVE-2023-53676.html
* https://www.suse.com/security/cve/CVE-2024-57849.html
* https://www.suse.com/security/cve/CVE-2024-58239.html
* https://www.suse.com/security/cve/CVE-2025-38476.html
* https://www.suse.com/security/cve/CVE-2025-38572.html
* https://www.suse.com/security/cve/CVE-2025-38608.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://bugzilla.suse.com/show_bug.cgi?id=1235815
* https://bugzilla.suse.com/show_bug.cgi?id=1248400
* https://bugzilla.suse.com/show_bug.cgi?id=1248615
* https://bugzilla.suse.com/show_bug.cgi?id=1248670
* https://bugzilla.suse.com/show_bug.cgi?id=1250665
* https://bugzilla.suse.com/show_bug.cgi?id=1251165
* https://bugzilla.suse.com/show_bug.cgi?id=1251203
* https://bugzilla.suse.com/show_bug.cgi?id=1251787
* https://bugzilla.suse.com/show_bug.cgi?id=1253437
* https://bugzilla.suse.com/show_bug.cgi?id=1254451