SUSE 5573 Published by

Several security updates have been released for SUSE Linux, including patches for python39 and python312. Additionally, updates were made to freerdp and docker-stable to address potential security issues. Other affected software includes libsoup2, openvswitch, erlang, qemu, redis, and ucode-intel, among others. Some of these updates are rated as important while others are considered moderate in severity.

SUSE-SU-2026:0643-1: important: Security update for python39
SUSE-SU-2026:0644-1: important: Security update for python312
SUSE-SU-2026:0649-1: important: Security update for freerdp
SUSE-SU-2026:0650-1: moderate: Security update for redis
SUSE-SU-2026:0656-1: important: Security update for freerdp
SUSE-SU-2026:0659-1: important: Security update for docker-stable
SUSE-SU-2026:0657-1: important: Security update for libsoup2
SUSE-SU-2026:0660-1: moderate: Security update for openvswitch
SUSE-SU-2026:0661-1: moderate: Security update for erlang
SUSE-SU-2026:0662-1: moderate: Security update for qemu
SUSE-SU-2026:0666-1: moderate: Security update for docker
SUSE-SU-2026:0664-1: important: Security update for python3
SUSE-SU-2026:0667-1: moderate: Security update for redis7
SUSE-SU-2026:0668-1: important: Security update for ucode-intel
openSUSE-SU-2026:10256-1: moderate: regclient-0.11.2-1.1 on GA media
openSUSE-SU-2026:10252-1: moderate: cockpit-repos-4.7-4.1 on GA media
openSUSE-SU-2026:10250-1: moderate: cockpit-machines-348-1.1 on GA media
openSUSE-SU-2026:10251-1: moderate: cockpit-packages-4.1-4.1 on GA media
openSUSE-SU-2026:10253-1: moderate: cockpit-subscriptions-14.4-4.1 on GA media
openSUSE-SU-2026:20262-1: moderate: Security update for docker-stable
openSUSE-SU-2026:20270-1: low: Security update for autogen



SUSE-SU-2026:0643-1: important: Security update for python39


# Security update for python39

Announcement ID: SUSE-SU-2026:0643-1
Release Date: 2026-02-25T16:27:58Z
Rating: important
References:

* bsc#1257029
* bsc#1257031
* bsc#1257041
* bsc#1257042
* bsc#1257044
* bsc#1257046

Cross-References:

* CVE-2025-11468
* CVE-2025-15282
* CVE-2025-15366
* CVE-2025-15367
* CVE-2026-0672
* CVE-2026-0865

CVSS scores:

* CVE-2025-11468 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-11468 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-11468 ( NVD ): 5.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-15282 ( SUSE ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15282 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-15282 ( NVD ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-15366 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15366 ( SUSE ): 6.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-15366 ( NVD ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-15367 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15367 ( SUSE ): 6.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-15367 ( NVD ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-0672 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-0672 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-0672 ( NVD ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-0865 ( SUSE ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0865 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-0865 ( NVD ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Leap 15.3
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves six vulnerabilities can now be installed.

## Description:

This update for python39 fixes the following issues:

* CVE-2025-11468: Fixed a header injection when folding a long comment in an
email header containing exclusively unfoldable characters. (bsc#1257029)
* CVE-2026-0672: Fixed a HTTP header injection via user-controlled cookie
values and parameters when using http.cookies.Morsel. (bsc#1257031)
* CVE-2026-0865: Fixed a bug where a user-controlled header containing
newlines can allow injecting HTTP headers. (bsc#1257042)
* CVE-2025-15282: Fixed a bug where a user-controlled data URLs parsed may
allow injecting headers. (bsc#1257046)
* CVE-2025-15366: Fixed a bug wherer a user-controlled command can allow
additional commands injected using newlines. (bsc#1257044)
* CVE-2025-15367: Fixed control characters which may allow the injection of
additional commands. (bsc#1257041)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-643=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-643=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-643=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-643=1

## Package List:

* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python39-tools-3.9.25-150300.4.93.1
* python39-tk-debuginfo-3.9.25-150300.4.93.1
* python39-base-debuginfo-3.9.25-150300.4.93.1
* python39-idle-3.9.25-150300.4.93.1
* python39-tk-3.9.25-150300.4.93.1
* python39-curses-3.9.25-150300.4.93.1
* python39-debugsource-3.9.25-150300.4.93.1
* libpython3_9-1_0-3.9.25-150300.4.93.1
* python39-debuginfo-3.9.25-150300.4.93.1
* python39-dbm-debuginfo-3.9.25-150300.4.93.1
* python39-3.9.25-150300.4.93.1
* python39-doc-devhelp-3.9.25-150300.4.93.1
* python39-devel-3.9.25-150300.4.93.1
* python39-core-debugsource-3.9.25-150300.4.93.1
* python39-curses-debuginfo-3.9.25-150300.4.93.1
* python39-base-3.9.25-150300.4.93.1
* libpython3_9-1_0-debuginfo-3.9.25-150300.4.93.1
* python39-doc-3.9.25-150300.4.93.1
* python39-testsuite-3.9.25-150300.4.93.1
* python39-dbm-3.9.25-150300.4.93.1
* python39-testsuite-debuginfo-3.9.25-150300.4.93.1
* openSUSE Leap 15.3 (x86_64)
* libpython3_9-1_0-32bit-3.9.25-150300.4.93.1
* python39-base-32bit-debuginfo-3.9.25-150300.4.93.1
* libpython3_9-1_0-32bit-debuginfo-3.9.25-150300.4.93.1
* python39-32bit-debuginfo-3.9.25-150300.4.93.1
* python39-32bit-3.9.25-150300.4.93.1
* python39-base-32bit-3.9.25-150300.4.93.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* python39-64bit-3.9.25-150300.4.93.1
* python39-64bit-debuginfo-3.9.25-150300.4.93.1
* python39-base-64bit-3.9.25-150300.4.93.1
* libpython3_9-1_0-64bit-3.9.25-150300.4.93.1
* libpython3_9-1_0-64bit-debuginfo-3.9.25-150300.4.93.1
* python39-base-64bit-debuginfo-3.9.25-150300.4.93.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python39-tools-3.9.25-150300.4.93.1
* python39-tk-debuginfo-3.9.25-150300.4.93.1
* python39-base-debuginfo-3.9.25-150300.4.93.1
* python39-idle-3.9.25-150300.4.93.1
* python39-tk-3.9.25-150300.4.93.1
* python39-curses-3.9.25-150300.4.93.1
* python39-debugsource-3.9.25-150300.4.93.1
* libpython3_9-1_0-3.9.25-150300.4.93.1
* python39-debuginfo-3.9.25-150300.4.93.1
* python39-dbm-debuginfo-3.9.25-150300.4.93.1
* python39-3.9.25-150300.4.93.1
* python39-doc-devhelp-3.9.25-150300.4.93.1
* python39-devel-3.9.25-150300.4.93.1
* python39-core-debugsource-3.9.25-150300.4.93.1
* python39-base-3.9.25-150300.4.93.1
* python39-curses-debuginfo-3.9.25-150300.4.93.1
* libpython3_9-1_0-debuginfo-3.9.25-150300.4.93.1
* python39-doc-3.9.25-150300.4.93.1
* python39-testsuite-3.9.25-150300.4.93.1
* python39-dbm-3.9.25-150300.4.93.1
* python39-testsuite-debuginfo-3.9.25-150300.4.93.1
* openSUSE Leap 15.6 (x86_64)
* libpython3_9-1_0-32bit-3.9.25-150300.4.93.1
* python39-base-32bit-debuginfo-3.9.25-150300.4.93.1
* libpython3_9-1_0-32bit-debuginfo-3.9.25-150300.4.93.1
* python39-32bit-debuginfo-3.9.25-150300.4.93.1
* python39-32bit-3.9.25-150300.4.93.1
* python39-base-32bit-3.9.25-150300.4.93.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* python39-curses-3.9.25-150300.4.93.1
* libpython3_9-1_0-3.9.25-150300.4.93.1
* python39-dbm-3.9.25-150300.4.93.1
* python39-base-3.9.25-150300.4.93.1
* python39-3.9.25-150300.4.93.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* python39-curses-3.9.25-150300.4.93.1
* libpython3_9-1_0-3.9.25-150300.4.93.1
* python39-dbm-3.9.25-150300.4.93.1
* python39-base-3.9.25-150300.4.93.1
* python39-3.9.25-150300.4.93.1

## References:

* https://www.suse.com/security/cve/CVE-2025-11468.html
* https://www.suse.com/security/cve/CVE-2025-15282.html
* https://www.suse.com/security/cve/CVE-2025-15366.html
* https://www.suse.com/security/cve/CVE-2025-15367.html
* https://www.suse.com/security/cve/CVE-2026-0672.html
* https://www.suse.com/security/cve/CVE-2026-0865.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257029
* https://bugzilla.suse.com/show_bug.cgi?id=1257031
* https://bugzilla.suse.com/show_bug.cgi?id=1257041
* https://bugzilla.suse.com/show_bug.cgi?id=1257042
* https://bugzilla.suse.com/show_bug.cgi?id=1257044
* https://bugzilla.suse.com/show_bug.cgi?id=1257046



SUSE-SU-2026:0644-1: important: Security update for python312


# Security update for python312

Announcement ID: SUSE-SU-2026:0644-1
Release Date: 2026-02-25T16:28:32Z
Rating: important
References:

* bsc#1257029
* bsc#1257031
* bsc#1257041
* bsc#1257042
* bsc#1257044
* bsc#1257046

Cross-References:

* CVE-2025-11468
* CVE-2025-15282
* CVE-2025-15366
* CVE-2025-15367
* CVE-2026-0672
* CVE-2026-0865

CVSS scores:

* CVE-2025-11468 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-11468 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-11468 ( NVD ): 5.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-15282 ( SUSE ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15282 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-15282 ( NVD ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-15366 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15366 ( SUSE ): 6.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-15366 ( NVD ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-15367 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15367 ( SUSE ): 6.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-15367 ( NVD ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-0672 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-0672 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-0672 ( NVD ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-0865 ( SUSE ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0865 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-0865 ( NVD ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves six vulnerabilities can now be installed.

## Description:

This update for python312 fixes the following issues:

* CVE-2025-11468: header injection when folding a long comment in an email
header containing exclusively unfoldable characters (bsc#1257029).
* CVE-2026-0672: HTTP header injection via user-controlled cookie values and
parameters when using http.cookies.Morsel (bsc#1257031).
* CVE-2026-0865: user-controlled header containing newlines can allow
injecting HTTP headers (bsc#1257042).
* CVE-2025-15366: user-controlled command can allow additional commands
injected using newlines (bsc#1257044).
* CVE-2025-15282: user-controlled data URLs parsed may allow injecting headers
(bsc#1257046).
* CVE-2025-15367: control characters may allow the injection of additional
commands (bsc#1257041).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-644=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-644=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-644=1 openSUSE-SLE-15.6-2026-644=1

## Package List:

* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libpython3_12-1_0-debuginfo-3.12.12-150600.3.43.1
* python312-3.12.12-150600.3.43.1
* python312-debuginfo-3.12.12-150600.3.43.1
* python312-curses-debuginfo-3.12.12-150600.3.43.1
* python312-debugsource-3.12.12-150600.3.43.1
* python312-tools-3.12.12-150600.3.43.1
* python312-dbm-debuginfo-3.12.12-150600.3.43.1
* python312-tk-3.12.12-150600.3.43.1
* python312-base-debuginfo-3.12.12-150600.3.43.1
* python312-core-debugsource-3.12.12-150600.3.43.1
* python312-curses-3.12.12-150600.3.43.1
* python312-dbm-3.12.12-150600.3.43.1
* python312-base-3.12.12-150600.3.43.1
* python312-idle-3.12.12-150600.3.43.1
* python312-tk-debuginfo-3.12.12-150600.3.43.1
* libpython3_12-1_0-3.12.12-150600.3.43.1
* python312-devel-3.12.12-150600.3.43.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libpython3_12-1_0-debuginfo-3.12.12-150600.3.43.1
* python312-3.12.12-150600.3.43.1
* python312-debuginfo-3.12.12-150600.3.43.1
* python312-curses-debuginfo-3.12.12-150600.3.43.1
* python312-debugsource-3.12.12-150600.3.43.1
* python312-tools-3.12.12-150600.3.43.1
* python312-dbm-debuginfo-3.12.12-150600.3.43.1
* python312-tk-3.12.12-150600.3.43.1
* python312-base-debuginfo-3.12.12-150600.3.43.1
* python312-core-debugsource-3.12.12-150600.3.43.1
* python312-curses-3.12.12-150600.3.43.1
* python312-dbm-3.12.12-150600.3.43.1
* python312-base-3.12.12-150600.3.43.1
* python312-idle-3.12.12-150600.3.43.1
* python312-tk-debuginfo-3.12.12-150600.3.43.1
* libpython3_12-1_0-3.12.12-150600.3.43.1
* python312-devel-3.12.12-150600.3.43.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libpython3_12-1_0-debuginfo-3.12.12-150600.3.43.1
* python312-curses-debuginfo-3.12.12-150600.3.43.1
* python312-core-debugsource-3.12.12-150600.3.43.1
* python312-curses-3.12.12-150600.3.43.1
* python312-idle-3.12.12-150600.3.43.1
* python312-tk-debuginfo-3.12.12-150600.3.43.1
* python312-doc-3.12.12-150600.3.43.1
* python312-debugsource-3.12.12-150600.3.43.1
* python312-debuginfo-3.12.12-150600.3.43.1
* python312-dbm-debuginfo-3.12.12-150600.3.43.1
* python312-tk-3.12.12-150600.3.43.1
* python312-testsuite-debuginfo-3.12.12-150600.3.43.1
* python312-base-debuginfo-3.12.12-150600.3.43.1
* libpython3_12-1_0-3.12.12-150600.3.43.1
* python312-testsuite-3.12.12-150600.3.43.1
* python312-3.12.12-150600.3.43.1
* python312-tools-3.12.12-150600.3.43.1
* python312-doc-devhelp-3.12.12-150600.3.43.1
* python312-dbm-3.12.12-150600.3.43.1
* python312-base-3.12.12-150600.3.43.1
* python312-devel-3.12.12-150600.3.43.1
* openSUSE Leap 15.6 (x86_64)
* python312-base-32bit-debuginfo-3.12.12-150600.3.43.1
* libpython3_12-1_0-32bit-3.12.12-150600.3.43.1
* python312-32bit-3.12.12-150600.3.43.1
* libpython3_12-1_0-32bit-debuginfo-3.12.12-150600.3.43.1
* python312-base-32bit-3.12.12-150600.3.43.1
* python312-32bit-debuginfo-3.12.12-150600.3.43.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* python312-64bit-debuginfo-3.12.12-150600.3.43.1
* libpython3_12-1_0-64bit-3.12.12-150600.3.43.1
* libpython3_12-1_0-64bit-debuginfo-3.12.12-150600.3.43.1
* python312-base-64bit-3.12.12-150600.3.43.1
* python312-64bit-3.12.12-150600.3.43.1
* python312-base-64bit-debuginfo-3.12.12-150600.3.43.1

## References:

* https://www.suse.com/security/cve/CVE-2025-11468.html
* https://www.suse.com/security/cve/CVE-2025-15282.html
* https://www.suse.com/security/cve/CVE-2025-15366.html
* https://www.suse.com/security/cve/CVE-2025-15367.html
* https://www.suse.com/security/cve/CVE-2026-0672.html
* https://www.suse.com/security/cve/CVE-2026-0865.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257029
* https://bugzilla.suse.com/show_bug.cgi?id=1257031
* https://bugzilla.suse.com/show_bug.cgi?id=1257041
* https://bugzilla.suse.com/show_bug.cgi?id=1257042
* https://bugzilla.suse.com/show_bug.cgi?id=1257044
* https://bugzilla.suse.com/show_bug.cgi?id=1257046



SUSE-SU-2026:0649-1: important: Security update for freerdp


# Security update for freerdp

Announcement ID: SUSE-SU-2026:0649-1
Release Date: 2026-02-25T16:31:43Z
Rating: important
References:

* bsc#1257981
* bsc#1257982
* bsc#1257983
* bsc#1257986
* bsc#1257988
* bsc#1257989
* bsc#1257990
* bsc#1257991

Cross-References:

* CVE-2026-24491
* CVE-2026-24675
* CVE-2026-24676
* CVE-2026-24679
* CVE-2026-24681
* CVE-2026-24682
* CVE-2026-24683
* CVE-2026-24684

CVSS scores:

* CVE-2026-24491 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-24491 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-24491 ( NVD ): 7.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-24491 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-24675 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-24675 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-24675 ( NVD ): 7.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-24675 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-24676 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-24676 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-24676 ( NVD ): 7.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-24676 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-24679 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-24679 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-24679 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-24679 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-24681 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-24681 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-24681 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-24681 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-24682 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-24682 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-24682 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-24682 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-24683 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-24683 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-24683 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-24683 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-24684 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-24684 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-24684 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-24684 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves eight vulnerabilities can now be installed.

## Description:

This update for freerdp fixes the following issues:

* CVE-2026-24491: heap-use-after-free in video_timer (bsc#1257981).
* CVE-2026-24675: heap-use-after-free in urb_select_interface (bsc#1257982).
* CVE-2026-24676: heap-use-after-free in audio_format_compatible
(bsc#1257983).
* CVE-2026-24679: heap-buffer-overflow in urb_select_interface (bsc#1257986).
* CVE-2026-24681: heap-use-after-free in urb_bulk_transfer_cb (bsc#1257988).
* CVE-2026-24682: heap-buffer-overflow in audio_formats_free (bsc#1257989).
* CVE-2026-24683: heap-use-after-free in ainput_send_input_event
(bsc#1257990).
* CVE-2026-24684: heap-use-after-free in play_thread (bsc#1257991).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-649=1 SUSE-2026-649=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-649=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* freerdp-server-2.11.2-150600.4.9.1
* freerdp-2.11.2-150600.4.9.1
* libfreerdp2-2-2.11.2-150600.4.9.1
* libuwac0-0-debuginfo-2.11.2-150600.4.9.1
* freerdp-proxy-2.11.2-150600.4.9.1
* libwinpr2-2-2.11.2-150600.4.9.1
* freerdp-devel-2.11.2-150600.4.9.1
* freerdp-debuginfo-2.11.2-150600.4.9.1
* freerdp-server-debuginfo-2.11.2-150600.4.9.1
* libfreerdp2-2-debuginfo-2.11.2-150600.4.9.1
* libwinpr2-2-debuginfo-2.11.2-150600.4.9.1
* freerdp-proxy-debuginfo-2.11.2-150600.4.9.1
* uwac0-0-devel-2.11.2-150600.4.9.1
* freerdp-debugsource-2.11.2-150600.4.9.1
* libuwac0-0-2.11.2-150600.4.9.1
* winpr-devel-2.11.2-150600.4.9.1
* freerdp-wayland-debuginfo-2.11.2-150600.4.9.1
* freerdp-wayland-2.11.2-150600.4.9.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
* uwac0-0-devel-2.11.2-150600.4.9.1
* freerdp-debuginfo-2.11.2-150600.4.9.1
* freerdp-debugsource-2.11.2-150600.4.9.1

## References:

* https://www.suse.com/security/cve/CVE-2026-24491.html
* https://www.suse.com/security/cve/CVE-2026-24675.html
* https://www.suse.com/security/cve/CVE-2026-24676.html
* https://www.suse.com/security/cve/CVE-2026-24679.html
* https://www.suse.com/security/cve/CVE-2026-24681.html
* https://www.suse.com/security/cve/CVE-2026-24682.html
* https://www.suse.com/security/cve/CVE-2026-24683.html
* https://www.suse.com/security/cve/CVE-2026-24684.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257981
* https://bugzilla.suse.com/show_bug.cgi?id=1257982
* https://bugzilla.suse.com/show_bug.cgi?id=1257983
* https://bugzilla.suse.com/show_bug.cgi?id=1257986
* https://bugzilla.suse.com/show_bug.cgi?id=1257988
* https://bugzilla.suse.com/show_bug.cgi?id=1257989
* https://bugzilla.suse.com/show_bug.cgi?id=1257990
* https://bugzilla.suse.com/show_bug.cgi?id=1257991



SUSE-SU-2026:0650-1: moderate: Security update for redis


# Security update for redis

Announcement ID: SUSE-SU-2026:0650-1
Release Date: 2026-02-25T16:33:35Z
Rating: moderate
References:

* bsc#1258706

Affected Products:

* openSUSE Leap 15.6

An update that has one security fix can now be installed.

## Description:

This update for redis fixes the following issue:

* a user can manipulate data read by a connection by injecting sequences into
a Redis error reply (bsc#1258706).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-650=1 openSUSE-SLE-15.6-2026-650=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* redis-debugsource-7.2.4-150600.3.21.1
* redis-debuginfo-7.2.4-150600.3.21.1
* redis-7.2.4-150600.3.21.1

## References:

* https://bugzilla.suse.com/show_bug.cgi?id=1258706



SUSE-SU-2026:0656-1: important: Security update for freerdp


# Security update for freerdp

Announcement ID: SUSE-SU-2026:0656-1
Release Date: 2026-02-26T15:06:37Z
Rating: important
References:

* bsc#1256721
* bsc#1256723
* bsc#1256943
* bsc#1256945
* bsc#1256946
* bsc#1256947

Cross-References:

* CVE-2026-22855
* CVE-2026-22857
* CVE-2026-23533
* CVE-2026-23732
* CVE-2026-23883
* CVE-2026-23884

CVSS scores:

* CVE-2026-22855 ( SUSE ): 6.1
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22855 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
* CVE-2026-22855 ( NVD ): 5.6
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-22855 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-22857 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22857 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-22857 ( NVD ): 6.8
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-22857 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23533 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23533 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-23533 ( NVD ): 7.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23533 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23732 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-23732 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-23732 ( NVD ): 5.5
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23732 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23883 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23883 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-23883 ( NVD ): 7.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23883 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23884 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23884 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-23884 ( NVD ): 7.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23884 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves six vulnerabilities can now be installed.

## Description:

This update for freerdp fixes the following issues:

* CVE-2026-22855: heap-buffer-overflow in smartcard_unpack_set_attrib_call
(bsc#1256721).
* CVE-2026-22857: heap-use-after-free in irp_thread_func (bsc#1256723).
* CVE-2026-23533: improper validation can lead to heap buffer overflow in
`clear_decompress_residual_data` (bsc#1256943).
* CVE-2026-23732: improper validation can lead to heap buffer overflow in
`Glyph_Alloc` (bsc#1256945).
* CVE-2026-23883: use-after-free when `update_pointer_color` and
`freerdp_image_copy_from_pointer_data` fail (bsc#1256946).
* CVE-2026-23884: use-after-free in `gdi_set_bounds` (bsc#1256947).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-656=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-656=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* winpr2-devel-2.4.0-150400.3.41.1
* freerdp-server-debuginfo-2.4.0-150400.3.41.1
* libuwac0-0-2.4.0-150400.3.41.1
* freerdp-debugsource-2.4.0-150400.3.41.1
* libwinpr2-2.4.0-150400.3.41.1
* freerdp-proxy-2.4.0-150400.3.41.1
* libfreerdp2-2.4.0-150400.3.41.1
* libwinpr2-debuginfo-2.4.0-150400.3.41.1
* freerdp-devel-2.4.0-150400.3.41.1
* libuwac0-0-debuginfo-2.4.0-150400.3.41.1
* freerdp-server-2.4.0-150400.3.41.1
* freerdp-2.4.0-150400.3.41.1
* freerdp-debuginfo-2.4.0-150400.3.41.1
* freerdp-wayland-debuginfo-2.4.0-150400.3.41.1
* freerdp-wayland-2.4.0-150400.3.41.1
* uwac0-0-devel-2.4.0-150400.3.41.1
* freerdp-proxy-debuginfo-2.4.0-150400.3.41.1
* libfreerdp2-debuginfo-2.4.0-150400.3.41.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
* libwinpr2-2.4.0-150400.3.41.1
* freerdp-debugsource-2.4.0-150400.3.41.1
* libfreerdp2-2.4.0-150400.3.41.1
* libwinpr2-debuginfo-2.4.0-150400.3.41.1
* freerdp-debuginfo-2.4.0-150400.3.41.1
* libfreerdp2-debuginfo-2.4.0-150400.3.41.1

## References:

* https://www.suse.com/security/cve/CVE-2026-22855.html
* https://www.suse.com/security/cve/CVE-2026-22857.html
* https://www.suse.com/security/cve/CVE-2026-23533.html
* https://www.suse.com/security/cve/CVE-2026-23732.html
* https://www.suse.com/security/cve/CVE-2026-23883.html
* https://www.suse.com/security/cve/CVE-2026-23884.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256721
* https://bugzilla.suse.com/show_bug.cgi?id=1256723
* https://bugzilla.suse.com/show_bug.cgi?id=1256943
* https://bugzilla.suse.com/show_bug.cgi?id=1256945
* https://bugzilla.suse.com/show_bug.cgi?id=1256946
* https://bugzilla.suse.com/show_bug.cgi?id=1256947



SUSE-SU-2026:0659-1: important: Security update for docker-stable


# Security update for docker-stable

Announcement ID: SUSE-SU-2026:0659-1
Release Date: 2026-02-26T15:09:09Z
Rating: important
References:

* bsc#1240513

Cross-References:

* CVE-2025-30204

CVSS scores:

* CVE-2025-30204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-30204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-30204 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Containers Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for docker-stable fixes the following issues:

* CVE-2025-30204: Fixed a vulnerability in jwt-go which allowed excessive
memory allocation during header parsing. (bsc#1240513)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-659=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-659=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-659=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-659=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-659=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-659=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-659=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-659=1

* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-659=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-659=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-659=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-659=1

## Package List:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* docker-stable-24.0.9_ce-150000.1.36.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* docker-stable-24.0.9_ce-150000.1.36.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* docker-stable-24.0.9_ce-150000.1.36.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* docker-stable-24.0.9_ce-150000.1.36.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* docker-stable-zsh-completion-24.0.9_ce-150000.1.36.1
* docker-stable-bash-completion-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* docker-stable-24.0.9_ce-150000.1.36.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* docker-stable-24.0.9_ce-150000.1.36.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* docker-stable-24.0.9_ce-150000.1.36.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* docker-stable-zsh-completion-24.0.9_ce-150000.1.36.1
* docker-stable-bash-completion-24.0.9_ce-150000.1.36.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* docker-stable-24.0.9_ce-150000.1.36.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.36.1
* openSUSE Leap 15.6 (noarch)
* docker-stable-zsh-completion-24.0.9_ce-150000.1.36.1
* docker-stable-fish-completion-24.0.9_ce-150000.1.36.1
* docker-stable-bash-completion-24.0.9_ce-150000.1.36.1
* docker-stable-rootless-extras-24.0.9_ce-150000.1.36.1
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* docker-stable-24.0.9_ce-150000.1.36.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.36.1
* Containers Module 15-SP7 (noarch)
* docker-stable-zsh-completion-24.0.9_ce-150000.1.36.1
* docker-stable-bash-completion-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* docker-stable-24.0.9_ce-150000.1.36.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* docker-stable-24.0.9_ce-150000.1.36.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* docker-stable-24.0.9_ce-150000.1.36.1
* docker-stable-debuginfo-24.0.9_ce-150000.1.36.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.36.1

## References:

* https://www.suse.com/security/cve/CVE-2025-30204.html
* https://bugzilla.suse.com/show_bug.cgi?id=1240513



SUSE-SU-2026:0657-1: important: Security update for libsoup2


# Security update for libsoup2

Announcement ID: SUSE-SU-2026:0657-1
Release Date: 2026-02-26T15:07:21Z
Rating: important
References:

* bsc#1240751
* bsc#1258120
* bsc#1258170
* bsc#1258508

Cross-References:

* CVE-2025-32049
* CVE-2026-2369
* CVE-2026-2443
* CVE-2026-2708

CVSS scores:

* CVE-2025-32049 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-32049 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-32049 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-2369 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-2369 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-2443 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-2443 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-2443 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-2708 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-2708 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves four vulnerabilities can now be installed.

## Description:

This update for libsoup2 fixes the following issues:

* CVE-2025-32049: denial of Service attack to websocket server (bsc#1240751).
* CVE-2026-2369: buffer overread due to integer underflow when handling zero-
length resources (bsc#1258120).
* CVE-2026-2443: out-of-bounds read when processing specially crafted HTTP
Range headers can lead to heap information disclosure to remote attackers
(bsc#1258170).
* CVE-2026-2708: HTTP request smuggling via duplicate Content-Length headers
(bsc#1258508).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-657=1 openSUSE-SLE-15.6-2026-657=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-657=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-657=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-657=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.27.1
* libsoup2-devel-2.74.3-150600.4.27.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.27.1
* libsoup2-debugsource-2.74.3-150600.4.27.1
* libsoup-2_4-1-2.74.3-150600.4.27.1
* openSUSE Leap 15.6 (x86_64)
* libsoup-2_4-1-32bit-debuginfo-2.74.3-150600.4.27.1
* libsoup-2_4-1-32bit-2.74.3-150600.4.27.1
* libsoup2-devel-32bit-2.74.3-150600.4.27.1
* openSUSE Leap 15.6 (noarch)
* libsoup2-lang-2.74.3-150600.4.27.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libsoup-2_4-1-64bit-debuginfo-2.74.3-150600.4.27.1
* libsoup-2_4-1-64bit-2.74.3-150600.4.27.1
* libsoup2-devel-64bit-2.74.3-150600.4.27.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.27.1
* libsoup2-devel-2.74.3-150600.4.27.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.27.1
* libsoup2-debugsource-2.74.3-150600.4.27.1
* libsoup-2_4-1-2.74.3-150600.4.27.1
* Basesystem Module 15-SP7 (noarch)
* libsoup2-lang-2.74.3-150600.4.27.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.27.1
* libsoup2-devel-2.74.3-150600.4.27.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.27.1
* libsoup2-debugsource-2.74.3-150600.4.27.1
* libsoup-2_4-1-2.74.3-150600.4.27.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* libsoup2-lang-2.74.3-150600.4.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.27.1
* libsoup2-devel-2.74.3-150600.4.27.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.27.1
* libsoup2-debugsource-2.74.3-150600.4.27.1
* libsoup-2_4-1-2.74.3-150600.4.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* libsoup2-lang-2.74.3-150600.4.27.1

## References:

* https://www.suse.com/security/cve/CVE-2025-32049.html
* https://www.suse.com/security/cve/CVE-2026-2369.html
* https://www.suse.com/security/cve/CVE-2026-2443.html
* https://www.suse.com/security/cve/CVE-2026-2708.html
* https://bugzilla.suse.com/show_bug.cgi?id=1240751
* https://bugzilla.suse.com/show_bug.cgi?id=1258120
* https://bugzilla.suse.com/show_bug.cgi?id=1258170
* https://bugzilla.suse.com/show_bug.cgi?id=1258508



SUSE-SU-2026:0660-1: moderate: Security update for openvswitch


# Security update for openvswitch

Announcement ID: SUSE-SU-2026:0660-1
Release Date: 2026-02-26T15:09:27Z
Rating: moderate
References:

* bsc#1255435

Cross-References:

* CVE-2024-2182

CVSS scores:

* CVE-2024-2182 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-2182 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4

An update that solves one vulnerability can now be installed.

## Description:

This update for openvswitch fixes the following issues:

* CVE-2024-2182: Fixed insufficient validation of incoming BFD packets may
lead to denial of service (bsc#1255435)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-660=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* openvswitch-test-2.14.2-150400.24.29.1
* ovn-docker-20.06.2-150400.24.29.1
* ovn-central-debuginfo-20.06.2-150400.24.29.1
* openvswitch-2.14.2-150400.24.29.1
* openvswitch-vtep-debuginfo-2.14.2-150400.24.29.1
* openvswitch-pki-2.14.2-150400.24.29.1
* ovn-20.06.2-150400.24.29.1
* python3-ovs-2.14.2-150400.24.29.1
* libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.29.1
* libovn-20_06-0-20.06.2-150400.24.29.1
* libopenvswitch-2_14-0-2.14.2-150400.24.29.1
* openvswitch-test-debuginfo-2.14.2-150400.24.29.1
* ovn-vtep-20.06.2-150400.24.29.1
* openvswitch-debuginfo-2.14.2-150400.24.29.1
* ovn-vtep-debuginfo-20.06.2-150400.24.29.1
* openvswitch-devel-2.14.2-150400.24.29.1
* ovn-host-20.06.2-150400.24.29.1
* ovn-devel-20.06.2-150400.24.29.1
* openvswitch-ipsec-2.14.2-150400.24.29.1
* openvswitch-debugsource-2.14.2-150400.24.29.1
* libovn-20_06-0-debuginfo-20.06.2-150400.24.29.1
* openvswitch-vtep-2.14.2-150400.24.29.1
* ovn-central-20.06.2-150400.24.29.1
* ovn-host-debuginfo-20.06.2-150400.24.29.1
* ovn-debuginfo-20.06.2-150400.24.29.1
* openSUSE Leap 15.4 (noarch)
* ovn-doc-20.06.2-150400.24.29.1
* openvswitch-doc-2.14.2-150400.24.29.1

## References:

* https://www.suse.com/security/cve/CVE-2024-2182.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255435



SUSE-SU-2026:0661-1: moderate: Security update for erlang


# Security update for erlang

Announcement ID: SUSE-SU-2026:0661-1
Release Date: 2026-02-26T15:10:16Z
Rating: moderate
References:

* bsc#1249469
* bsc#1249470
* bsc#1249472

Cross-References:

* CVE-2025-48038
* CVE-2025-48039
* CVE-2025-48040

CVSS scores:

* CVE-2025-48038 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-48038 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-48038 ( NVD ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-48039 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-48039 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-48039 ( NVD ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-48040 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-48040 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-48040 ( NVD ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Leap 15.3
* openSUSE Leap 15.6
* Server Applications Module 15-SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves three vulnerabilities can now be installed.

## Description:

This update for erlang fixes the following issues:

* CVE-2025-48039:Fixed an excessive use of system resources. (bsc#1249469)
* CVE-2025-48038:Fixed an excessive use of system resources. (bsc#1249470)
* CVE-2025-48040:Fixed an excessive resource consumption. (bsc#1249472)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-661=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-661=1

* Server Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-661=1

## Package List:

* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* erlang-src-23.3.4.19-150300.3.29.1
* erlang-et-23.3.4.19-150300.3.29.1
* erlang-dialyzer-debuginfo-23.3.4.19-150300.3.29.1
* erlang-jinterface-23.3.4.19-150300.3.29.1
* erlang-diameter-23.3.4.19-150300.3.29.1
* erlang-epmd-23.3.4.19-150300.3.29.1
* erlang-wx-23.3.4.19-150300.3.29.1
* erlang-epmd-debuginfo-23.3.4.19-150300.3.29.1
* erlang-debugger-23.3.4.19-150300.3.29.1
* erlang-wx-debuginfo-23.3.4.19-150300.3.29.1
* erlang-reltool-23.3.4.19-150300.3.29.1
* erlang-wx-src-23.3.4.19-150300.3.29.1
* erlang-23.3.4.19-150300.3.29.1
* erlang-observer-23.3.4.19-150300.3.29.1
* erlang-reltool-src-23.3.4.19-150300.3.29.1
* erlang-diameter-src-23.3.4.19-150300.3.29.1
* erlang-debugsource-23.3.4.19-150300.3.29.1
* erlang-et-src-23.3.4.19-150300.3.29.1
* erlang-doc-23.3.4.19-150300.3.29.1
* erlang-debuginfo-23.3.4.19-150300.3.29.1
* erlang-debugger-src-23.3.4.19-150300.3.29.1
* erlang-jinterface-src-23.3.4.19-150300.3.29.1
* erlang-dialyzer-23.3.4.19-150300.3.29.1
* erlang-dialyzer-src-23.3.4.19-150300.3.29.1
* erlang-observer-src-23.3.4.19-150300.3.29.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* erlang-src-23.3.4.19-150300.3.29.1
* erlang-et-23.3.4.19-150300.3.29.1
* erlang-dialyzer-debuginfo-23.3.4.19-150300.3.29.1
* erlang-jinterface-23.3.4.19-150300.3.29.1
* erlang-diameter-23.3.4.19-150300.3.29.1
* erlang-epmd-23.3.4.19-150300.3.29.1
* erlang-wx-23.3.4.19-150300.3.29.1
* erlang-epmd-debuginfo-23.3.4.19-150300.3.29.1
* erlang-debugger-23.3.4.19-150300.3.29.1
* erlang-wx-debuginfo-23.3.4.19-150300.3.29.1
* erlang-reltool-23.3.4.19-150300.3.29.1
* erlang-wx-src-23.3.4.19-150300.3.29.1
* erlang-23.3.4.19-150300.3.29.1
* erlang-observer-23.3.4.19-150300.3.29.1
* erlang-reltool-src-23.3.4.19-150300.3.29.1
* erlang-diameter-src-23.3.4.19-150300.3.29.1
* erlang-debugsource-23.3.4.19-150300.3.29.1
* erlang-et-src-23.3.4.19-150300.3.29.1
* erlang-doc-23.3.4.19-150300.3.29.1
* erlang-debuginfo-23.3.4.19-150300.3.29.1
* erlang-debugger-src-23.3.4.19-150300.3.29.1
* erlang-jinterface-src-23.3.4.19-150300.3.29.1
* erlang-dialyzer-23.3.4.19-150300.3.29.1
* erlang-dialyzer-src-23.3.4.19-150300.3.29.1
* erlang-observer-src-23.3.4.19-150300.3.29.1
* Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* erlang-debuginfo-23.3.4.19-150300.3.29.1
* erlang-23.3.4.19-150300.3.29.1
* erlang-epmd-23.3.4.19-150300.3.29.1
* erlang-epmd-debuginfo-23.3.4.19-150300.3.29.1
* erlang-debugsource-23.3.4.19-150300.3.29.1

## References:

* https://www.suse.com/security/cve/CVE-2025-48038.html
* https://www.suse.com/security/cve/CVE-2025-48039.html
* https://www.suse.com/security/cve/CVE-2025-48040.html
* https://bugzilla.suse.com/show_bug.cgi?id=1249469
* https://bugzilla.suse.com/show_bug.cgi?id=1249470
* https://bugzilla.suse.com/show_bug.cgi?id=1249472



SUSE-SU-2026:0662-1: moderate: Security update for qemu


# Security update for qemu

Announcement ID: SUSE-SU-2026:0662-1
Release Date: 2026-02-26T15:12:27Z
Rating: moderate
References:

* bsc#1255400
* bsc#1256484

Cross-References:

* CVE-2025-14876
* CVE-2026-0665

CVSS scores:

* CVE-2025-14876 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-14876 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-0665 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0665 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-0665 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6

An update that solves two vulnerabilities can now be installed.

## Description:

This update for qemu fixes the following issues:

* CVE-2025-14876: qemu-kvm: Unbounded allocation in virtio-crypto
(bsc#1255400).
* CVE-2026-0665: out-of-bounds heap access can lead to a denial of service or
potential memory corruption (bsc#1256484).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-662=1 openSUSE-SLE-15.6-2026-662=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* qemu-audio-pipewire-debuginfo-8.2.10-150600.3.46.1
* qemu-ivshmem-tools-debuginfo-8.2.10-150600.3.46.1
* qemu-debugsource-8.2.10-150600.3.46.1
* qemu-block-iscsi-debuginfo-8.2.10-150600.3.46.1
* qemu-img-8.2.10-150600.3.46.1
* qemu-arm-debuginfo-8.2.10-150600.3.46.1
* qemu-block-curl-8.2.10-150600.3.46.1
* qemu-pr-helper-debuginfo-8.2.10-150600.3.46.1
* qemu-linux-user-8.2.10-150600.3.46.1
* qemu-headless-8.2.10-150600.3.46.1
* qemu-hw-display-virtio-vga-debuginfo-8.2.10-150600.3.46.1
* qemu-ppc-8.2.10-150600.3.46.1
* qemu-block-nfs-8.2.10-150600.3.46.1
* qemu-ui-spice-core-8.2.10-150600.3.46.1
* qemu-hw-usb-smartcard-8.2.10-150600.3.46.1
* qemu-audio-spice-debuginfo-8.2.10-150600.3.46.1
* qemu-hw-display-virtio-gpu-pci-8.2.10-150600.3.46.1
* qemu-ppc-debuginfo-8.2.10-150600.3.46.1
* qemu-accel-qtest-debuginfo-8.2.10-150600.3.46.1
* qemu-audio-jack-8.2.10-150600.3.46.1
* qemu-hw-usb-smartcard-debuginfo-8.2.10-150600.3.46.1
* qemu-ui-spice-core-debuginfo-8.2.10-150600.3.46.1
* qemu-guest-agent-debuginfo-8.2.10-150600.3.46.1
* qemu-hw-display-virtio-vga-8.2.10-150600.3.46.1
* qemu-audio-alsa-8.2.10-150600.3.46.1
* qemu-arm-8.2.10-150600.3.46.1
* qemu-linux-user-debuginfo-8.2.10-150600.3.46.1
* qemu-extra-debuginfo-8.2.10-150600.3.46.1
* qemu-hw-display-virtio-gpu-8.2.10-150600.3.46.1
* qemu-ui-gtk-8.2.10-150600.3.46.1
* qemu-audio-dbus-8.2.10-150600.3.46.1
* qemu-hw-display-qxl-8.2.10-150600.3.46.1
* qemu-extra-8.2.10-150600.3.46.1
* qemu-s390x-8.2.10-150600.3.46.1
* qemu-ui-opengl-debuginfo-8.2.10-150600.3.46.1
* qemu-chardev-baum-8.2.10-150600.3.46.1
* qemu-chardev-spice-8.2.10-150600.3.46.1
* qemu-audio-alsa-debuginfo-8.2.10-150600.3.46.1
* qemu-ui-dbus-8.2.10-150600.3.46.1
* qemu-hw-usb-host-8.2.10-150600.3.46.1
* qemu-ui-curses-debuginfo-8.2.10-150600.3.46.1
* qemu-s390x-debuginfo-8.2.10-150600.3.46.1
* qemu-audio-oss-8.2.10-150600.3.46.1
* qemu-hw-usb-redirect-debuginfo-8.2.10-150600.3.46.1
* qemu-chardev-baum-debuginfo-8.2.10-150600.3.46.1
* qemu-vhost-user-gpu-8.2.10-150600.3.46.1
* qemu-ivshmem-tools-8.2.10-150600.3.46.1
* qemu-accel-tcg-x86-debuginfo-8.2.10-150600.3.46.1
* qemu-ui-spice-app-debuginfo-8.2.10-150600.3.46.1
* qemu-block-curl-debuginfo-8.2.10-150600.3.46.1
* qemu-debuginfo-8.2.10-150600.3.46.1
* qemu-guest-agent-8.2.10-150600.3.46.1
* qemu-ksm-8.2.10-150600.3.46.1
* qemu-block-ssh-debuginfo-8.2.10-150600.3.46.1
* qemu-audio-spice-8.2.10-150600.3.46.1
* qemu-accel-tcg-x86-8.2.10-150600.3.46.1
* qemu-audio-pa-debuginfo-8.2.10-150600.3.46.1
* qemu-ui-curses-8.2.10-150600.3.46.1
* qemu-x86-8.2.10-150600.3.46.1
* qemu-audio-pipewire-8.2.10-150600.3.46.1
* qemu-tools-8.2.10-150600.3.46.1
* qemu-chardev-spice-debuginfo-8.2.10-150600.3.46.1
* qemu-ui-gtk-debuginfo-8.2.10-150600.3.46.1
* qemu-8.2.10-150600.3.46.1
* qemu-hw-display-virtio-gpu-debuginfo-8.2.10-150600.3.46.1
* qemu-ui-dbus-debuginfo-8.2.10-150600.3.46.1
* qemu-x86-debuginfo-8.2.10-150600.3.46.1
* qemu-ui-opengl-8.2.10-150600.3.46.1
* qemu-vhost-user-gpu-debuginfo-8.2.10-150600.3.46.1
* qemu-hw-usb-host-debuginfo-8.2.10-150600.3.46.1
* qemu-audio-pa-8.2.10-150600.3.46.1
* qemu-block-ssh-8.2.10-150600.3.46.1
* qemu-block-dmg-debuginfo-8.2.10-150600.3.46.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-8.2.10-150600.3.46.1
* qemu-hw-display-qxl-debuginfo-8.2.10-150600.3.46.1
* qemu-audio-dbus-debuginfo-8.2.10-150600.3.46.1
* qemu-block-nfs-debuginfo-8.2.10-150600.3.46.1
* qemu-block-gluster-debuginfo-8.2.10-150600.3.46.1
* qemu-audio-oss-debuginfo-8.2.10-150600.3.46.1
* qemu-tools-debuginfo-8.2.10-150600.3.46.1
* qemu-spice-8.2.10-150600.3.46.1
* qemu-linux-user-debugsource-8.2.10-150600.3.46.1
* qemu-block-gluster-8.2.10-150600.3.46.1
* qemu-pr-helper-8.2.10-150600.3.46.1
* qemu-block-iscsi-8.2.10-150600.3.46.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.10-150600.3.46.1
* qemu-hw-usb-redirect-8.2.10-150600.3.46.1
* qemu-block-dmg-8.2.10-150600.3.46.1
* qemu-img-debuginfo-8.2.10-150600.3.46.1
* qemu-hw-s390x-virtio-gpu-ccw-8.2.10-150600.3.46.1
* qemu-audio-jack-debuginfo-8.2.10-150600.3.46.1
* qemu-accel-qtest-8.2.10-150600.3.46.1
* qemu-ui-spice-app-8.2.10-150600.3.46.1
* openSUSE Leap 15.6 (noarch)
* qemu-ipxe-8.2.10-150600.3.46.1
* qemu-microvm-8.2.10-150600.3.46.1
* qemu-seabios-8.2.101.16.3_3_ga95067eb-150600.3.46.1
* qemu-skiboot-8.2.10-150600.3.46.1
* qemu-lang-8.2.10-150600.3.46.1
* qemu-doc-8.2.10-150600.3.46.1
* qemu-SLOF-8.2.10-150600.3.46.1
* qemu-vgabios-8.2.101.16.3_3_ga95067eb-150600.3.46.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* qemu-block-rbd-8.2.10-150600.3.46.1
* qemu-block-rbd-debuginfo-8.2.10-150600.3.46.1

## References:

* https://www.suse.com/security/cve/CVE-2025-14876.html
* https://www.suse.com/security/cve/CVE-2026-0665.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255400
* https://bugzilla.suse.com/show_bug.cgi?id=1256484



SUSE-SU-2026:0666-1: moderate: Security update for docker


# Security update for docker

Announcement ID: SUSE-SU-2026:0666-1
Release Date: 2026-02-26T15:17:40Z
Rating: moderate
References:

* bsc#1253904

Cross-References:

* CVE-2025-58181

CVSS scores:

* CVE-2025-58181 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58181 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58181 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* Basesystem Module 15-SP7
* Containers Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for docker fixes the following issues:

* CVE-2025-58181: Fixed a bug in crypto/ssh where invalidated number of
mechanisms can cause unbounded memory consumption. (bsc#1253904)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-666=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-666=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-666=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-666=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-666=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-666=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-666=1

* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-666=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-666=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-666=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* docker-buildx-debuginfo-0.29.0-150000.241.2
* docker-buildx-0.29.0-150000.241.2
* docker-debuginfo-28.5.1_ce-150000.241.2
* docker-28.5.1_ce-150000.241.2
* openSUSE Leap 15.6 (noarch)
* docker-fish-completion-28.5.1_ce-150000.241.2
* docker-bash-completion-28.5.1_ce-150000.241.2
* docker-zsh-completion-28.5.1_ce-150000.241.2
* docker-rootless-extras-28.5.1_ce-150000.241.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* docker-buildx-debuginfo-0.29.0-150000.241.2
* docker-buildx-0.29.0-150000.241.2
* docker-debuginfo-28.5.1_ce-150000.241.2
* docker-28.5.1_ce-150000.241.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* docker-buildx-debuginfo-0.29.0-150000.241.2
* docker-buildx-0.29.0-150000.241.2
* docker-debuginfo-28.5.1_ce-150000.241.2
* docker-28.5.1_ce-150000.241.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* docker-buildx-debuginfo-0.29.0-150000.241.2
* docker-buildx-0.29.0-150000.241.2
* docker-debuginfo-28.5.1_ce-150000.241.2
* docker-28.5.1_ce-150000.241.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* docker-buildx-debuginfo-0.29.0-150000.241.2
* docker-buildx-0.29.0-150000.241.2
* docker-debuginfo-28.5.1_ce-150000.241.2
* docker-28.5.1_ce-150000.241.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* docker-buildx-debuginfo-0.29.0-150000.241.2
* docker-buildx-0.29.0-150000.241.2
* docker-debuginfo-28.5.1_ce-150000.241.2
* docker-28.5.1_ce-150000.241.2
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* docker-buildx-debuginfo-0.29.0-150000.241.2
* docker-buildx-0.29.0-150000.241.2
* docker-debuginfo-28.5.1_ce-150000.241.2
* docker-28.5.1_ce-150000.241.2
* Containers Module 15-SP7 (noarch)
* docker-bash-completion-28.5.1_ce-150000.241.2
* docker-zsh-completion-28.5.1_ce-150000.241.2
* docker-rootless-extras-28.5.1_ce-150000.241.2
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* docker-buildx-debuginfo-0.29.0-150000.241.2
* docker-buildx-0.29.0-150000.241.2
* docker-debuginfo-28.5.1_ce-150000.241.2
* docker-28.5.1_ce-150000.241.2
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* docker-buildx-debuginfo-0.29.0-150000.241.2
* docker-buildx-0.29.0-150000.241.2
* docker-debuginfo-28.5.1_ce-150000.241.2
* docker-28.5.1_ce-150000.241.2

## References:

* https://www.suse.com/security/cve/CVE-2025-58181.html
* https://bugzilla.suse.com/show_bug.cgi?id=1253904



SUSE-SU-2026:0664-1: important: Security update for python3


# Security update for python3

Announcement ID: SUSE-SU-2026:0664-1
Release Date: 2026-02-26T15:16:08Z
Rating: important
References:

* bsc#1257029
* bsc#1257031
* bsc#1257041
* bsc#1257042
* bsc#1257044
* bsc#1257046

Cross-References:

* CVE-2025-11468
* CVE-2025-15282
* CVE-2025-15366
* CVE-2025-15367
* CVE-2026-0672
* CVE-2026-0865

CVSS scores:

* CVE-2025-11468 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-11468 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-11468 ( NVD ): 5.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-15282 ( SUSE ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15282 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-15282 ( NVD ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-15366 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15366 ( SUSE ): 6.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-15366 ( NVD ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-15367 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15367 ( SUSE ): 6.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-15367 ( NVD ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-0672 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-0672 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-0672 ( NVD ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-0865 ( SUSE ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0865 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-0865 ( NVD ): 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* Basesystem Module 15-SP7
* Development Tools Module 15-SP7
* openSUSE Leap 15.3
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves six vulnerabilities can now be installed.

## Description:

This update for python3 fixes the following issues:

* CVE-2025-11468: header injection when folding a long comment in an email
header containing exclusively unfoldable characters (bsc#1257029).
* CVE-2026-0672: HTTP header injection via user-controlled cookie values and
parameters when using http.cookies.Morsel (bsc#1257031).
* CVE-2026-0865: user-controlled header containing newlines can allow
injecting HTTP headers (bsc#1257042).
* CVE-2025-15366: user-controlled command can allow additional commands
injected using newlines (bsc#1257044).
* CVE-2025-15282: user-controlled data URLs parsed may allow injecting headers
(bsc#1257046).
* CVE-2025-15367: control characters may allow the injection of additional
commands (bsc#1257041).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-664=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-664=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-664=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-664=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-664=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-664=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-664=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-664=1

* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-664=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-664=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-664=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-664=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-664=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-664=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-664=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-664=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-664=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-664=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-664=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-664=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-664=1

## Package List:

* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python3-curses-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-doc-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-tk-3.6.15-150300.10.106.1
* python3-tools-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-tk-debuginfo-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-testsuite-debuginfo-3.6.15-150300.10.106.1
* python3-dbm-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* python3-testsuite-3.6.15-150300.10.106.1
* python3-dbm-debuginfo-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* python3-doc-devhelp-3.6.15-150300.10.106.1
* python3-curses-3.6.15-150300.10.106.1
* python3-devel-debuginfo-3.6.15-150300.10.106.1
* python3-idle-3.6.15-150300.10.106.1
* python3-devel-3.6.15-150300.10.106.1
* openSUSE Leap 15.3 (x86_64)
* libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.106.1
* libpython3_6m1_0-32bit-3.6.15-150300.10.106.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* libpython3_6m1_0-64bit-debuginfo-3.6.15-150300.10.106.1
* libpython3_6m1_0-64bit-3.6.15-150300.10.106.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python3-curses-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-doc-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-tk-3.6.15-150300.10.106.1
* python3-tools-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-tk-debuginfo-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-testsuite-debuginfo-3.6.15-150300.10.106.1
* python3-dbm-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* python3-testsuite-3.6.15-150300.10.106.1
* python3-dbm-debuginfo-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* python3-doc-devhelp-3.6.15-150300.10.106.1
* python3-curses-3.6.15-150300.10.106.1
* python3-devel-debuginfo-3.6.15-150300.10.106.1
* python3-idle-3.6.15-150300.10.106.1
* python3-devel-3.6.15-150300.10.106.1
* openSUSE Leap 15.6 (x86_64)
* libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.106.1
* libpython3_6m1_0-32bit-3.6.15-150300.10.106.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-curses-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-tk-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* python3-dbm-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-curses-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-devel-debuginfo-3.6.15-150300.10.106.1
* python3-tk-3.6.15-150300.10.106.1
* python3-idle-3.6.15-150300.10.106.1
* python3-devel-3.6.15-150300.10.106.1
* python3-dbm-debuginfo-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-tools-3.6.15-150300.10.106.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-curses-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-tk-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* python3-dbm-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-curses-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-devel-debuginfo-3.6.15-150300.10.106.1
* python3-tk-3.6.15-150300.10.106.1
* python3-tools-3.6.15-150300.10.106.1
* python3-idle-3.6.15-150300.10.106.1
* python3-devel-3.6.15-150300.10.106.1
* python3-dbm-debuginfo-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-curses-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-tk-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* python3-dbm-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-curses-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-devel-debuginfo-3.6.15-150300.10.106.1
* python3-tk-3.6.15-150300.10.106.1
* python3-tools-3.6.15-150300.10.106.1
* python3-idle-3.6.15-150300.10.106.1
* python3-devel-3.6.15-150300.10.106.1
* python3-dbm-debuginfo-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-curses-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-tk-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* python3-dbm-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-curses-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-devel-debuginfo-3.6.15-150300.10.106.1
* python3-tk-3.6.15-150300.10.106.1
* python3-tools-3.6.15-150300.10.106.1
* python3-idle-3.6.15-150300.10.106.1
* python3-devel-3.6.15-150300.10.106.1
* python3-dbm-debuginfo-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-curses-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-tk-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* python3-dbm-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-curses-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-devel-debuginfo-3.6.15-150300.10.106.1
* python3-tk-3.6.15-150300.10.106.1
* python3-tools-3.6.15-150300.10.106.1
* python3-idle-3.6.15-150300.10.106.1
* python3-devel-3.6.15-150300.10.106.1
* python3-dbm-debuginfo-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-curses-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-tk-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* python3-dbm-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-curses-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-devel-debuginfo-3.6.15-150300.10.106.1
* python3-tk-3.6.15-150300.10.106.1
* python3-tools-3.6.15-150300.10.106.1
* python3-idle-3.6.15-150300.10.106.1
* python3-devel-3.6.15-150300.10.106.1
* python3-dbm-debuginfo-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-curses-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-tk-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* python3-dbm-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-curses-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-devel-debuginfo-3.6.15-150300.10.106.1
* python3-tk-3.6.15-150300.10.106.1
* python3-tools-3.6.15-150300.10.106.1
* python3-idle-3.6.15-150300.10.106.1
* python3-devel-3.6.15-150300.10.106.1
* python3-dbm-debuginfo-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-curses-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-tk-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* python3-dbm-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-curses-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-devel-debuginfo-3.6.15-150300.10.106.1
* python3-tk-3.6.15-150300.10.106.1
* python3-tools-3.6.15-150300.10.106.1
* python3-idle-3.6.15-150300.10.106.1
* python3-devel-3.6.15-150300.10.106.1
* python3-dbm-debuginfo-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-curses-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-tk-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* python3-dbm-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-curses-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-devel-debuginfo-3.6.15-150300.10.106.1
* python3-tk-3.6.15-150300.10.106.1
* python3-tools-3.6.15-150300.10.106.1
* python3-idle-3.6.15-150300.10.106.1
* python3-devel-3.6.15-150300.10.106.1
* python3-dbm-debuginfo-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-curses-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-tk-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* python3-dbm-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-curses-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-devel-debuginfo-3.6.15-150300.10.106.1
* python3-tk-3.6.15-150300.10.106.1
* python3-tools-3.6.15-150300.10.106.1
* python3-idle-3.6.15-150300.10.106.1
* python3-devel-3.6.15-150300.10.106.1
* python3-dbm-debuginfo-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-curses-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-tk-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* python3-dbm-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-curses-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-devel-debuginfo-3.6.15-150300.10.106.1
* python3-tk-3.6.15-150300.10.106.1
* python3-tools-3.6.15-150300.10.106.1
* python3-idle-3.6.15-150300.10.106.1
* python3-devel-3.6.15-150300.10.106.1
* python3-dbm-debuginfo-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.106.1
* python3-debuginfo-3.6.15-150300.10.106.1
* python3-base-debuginfo-3.6.15-150300.10.106.1
* python3-core-debugsource-3.6.15-150300.10.106.1
* python3-3.6.15-150300.10.106.1
* libpython3_6m1_0-3.6.15-150300.10.106.1
* python3-debugsource-3.6.15-150300.10.106.1
* python3-base-3.6.15-150300.10.106.1

## References:

* https://www.suse.com/security/cve/CVE-2025-11468.html
* https://www.suse.com/security/cve/CVE-2025-15282.html
* https://www.suse.com/security/cve/CVE-2025-15366.html
* https://www.suse.com/security/cve/CVE-2025-15367.html
* https://www.suse.com/security/cve/CVE-2026-0672.html
* https://www.suse.com/security/cve/CVE-2026-0865.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257029
* https://bugzilla.suse.com/show_bug.cgi?id=1257031
* https://bugzilla.suse.com/show_bug.cgi?id=1257041
* https://bugzilla.suse.com/show_bug.cgi?id=1257042
* https://bugzilla.suse.com/show_bug.cgi?id=1257044
* https://bugzilla.suse.com/show_bug.cgi?id=1257046



SUSE-SU-2026:0667-1: moderate: Security update for redis7


# Security update for redis7

Announcement ID: SUSE-SU-2026:0667-1
Release Date: 2026-02-26T15:19:59Z
Rating: moderate
References:

* bsc#1258706

Affected Products:

* openSUSE Leap 15.6

An update that has one security fix can now be installed.

## Description:

This update for redis7 fixes the following issue:

* a user can manipulate data read by a connection by injecting sequences into
a Redis error reply (bsc#1258706).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-667=1 openSUSE-SLE-15.6-2026-667=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* redis7-7.0.8-150600.8.22.1
* redis7-debugsource-7.0.8-150600.8.22.1
* redis7-debuginfo-7.0.8-150600.8.22.1

## References:

* https://bugzilla.suse.com/show_bug.cgi?id=1258706



SUSE-SU-2026:0668-1: important: Security update for ucode-intel


# Security update for ucode-intel

Announcement ID: SUSE-SU-2026:0668-1
Release Date: 2026-02-26T15:21:26Z
Rating: important
References:

* bsc#1229129
* bsc#1258046

Cross-References:

* CVE-2024-24853
* CVE-2025-31648

CVSS scores:

* CVE-2024-24853 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2024-24853 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
* CVE-2025-31648 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-31648 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
* CVE-2025-31648 ( NVD ): 1.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-31648 ( NVD ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves two vulnerabilities can now be installed.

## Description:

This update for ucode-intel fixes the following issues:

* Intel CPU Microcode was updated to the 20260210 release (bsc#1258046)
* CVE-2024-24853: Updated fix for incorrect behavior order in transition
between executive monitor and SMI transfer monitor (STM) in some Intel(R)
Processor may allow a privileged user to potentially enable escalation of
privilege via local access. (bsc#1229129)
* CVE-2025-31648: Improper handling of values in the microcode flow for some
Intel Processor Family may allow an escalation of privilege. (bsc#1258046)

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-668=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-668=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-668=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-668=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-668=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-668=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-668=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-668=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-668=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-668=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-668=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-668=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-668=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-668=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-668=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-668=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-668=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-668=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-668=1

## Package List:

* SUSE Linux Enterprise Micro 5.2 (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
* ucode-intel-20260210-150200.62.1
* openSUSE Leap 15.6 (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* ucode-intel-20260210-150200.62.1
* Basesystem Module 15-SP7 (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* ucode-intel-20260210-150200.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* ucode-intel-20260210-150200.62.1

## References:

* https://www.suse.com/security/cve/CVE-2024-24853.html
* https://www.suse.com/security/cve/CVE-2025-31648.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229129
* https://bugzilla.suse.com/show_bug.cgi?id=1258046



openSUSE-SU-2026:10256-1: moderate: regclient-0.11.2-1.1 on GA media


# regclient-0.11.2-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10256-1
Rating: moderate

Cross-References:

* CVE-2025-68121

CVSS scores:

* CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-68121 ( SUSE ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the regclient-0.11.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* regclient 0.11.2-1.1
* regclient-bash-completion 0.11.2-1.1
* regclient-fish-completion 0.11.2-1.1
* regclient-zsh-completion 0.11.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-68121.html



openSUSE-SU-2026:10252-1: moderate: cockpit-repos-4.7-4.1 on GA media


# cockpit-repos-4.7-4.1 on GA media

Announcement ID: openSUSE-SU-2026:10252-1
Rating: moderate

Cross-References:

* CVE-2026-25547

CVSS scores:

* CVE-2026-25547 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25547 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the cockpit-repos-4.7-4.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* cockpit-repos 4.7-4.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25547.html



openSUSE-SU-2026:10250-1: moderate: cockpit-machines-348-1.1 on GA media


# cockpit-machines-348-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10250-1
Rating: moderate

Cross-References:

* CVE-2026-25547

CVSS scores:

* CVE-2026-25547 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25547 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the cockpit-machines-348-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* cockpit-machines 348-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25547.html



openSUSE-SU-2026:10251-1: moderate: cockpit-packages-4.1-4.1 on GA media


# cockpit-packages-4.1-4.1 on GA media

Announcement ID: openSUSE-SU-2026:10251-1
Rating: moderate

Cross-References:

* CVE-2026-25547

CVSS scores:

* CVE-2026-25547 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25547 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the cockpit-packages-4.1-4.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* cockpit-packages 4.1-4.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25547.html



openSUSE-SU-2026:10253-1: moderate: cockpit-subscriptions-14.4-4.1 on GA media


# cockpit-subscriptions-14.4-4.1 on GA media

Announcement ID: openSUSE-SU-2026:10253-1
Rating: moderate

Cross-References:

* CVE-2026-25547

CVSS scores:

* CVE-2026-25547 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25547 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the cockpit-subscriptions-14.4-4.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* cockpit-subscriptions 14.4-4.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25547.html



openSUSE-SU-2026:20262-1: moderate: Security update for docker-stable


openSUSE security update: security update for docker-stable
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20262-1
Rating: moderate
References:

* bsc#1250508
* bsc#1250596
* bsc#1252290

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that has 3 bug fixes can now be installed.

Description:

This update for docker-stable fixes the following issues:

- Enable SELinux in default daemon.json config (--selinux-enabled).
This has no practical impact on non-SELinux systems (bsc#1252290).
- Remove git-core recommends on SLE. Most SLE systems have installRecommends=yes
by default and thus end up installing git with Docker (bsc#1250508).
- Include historical changelog data from before the docker-stable fork.
This includes CVE numbers for security tracking reasons (bsc#1250596).

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-304=1

Package List:

- openSUSE Leap 16.0:

docker-stable-24.0.9_ce-160000.3.1
docker-stable-bash-completion-24.0.9_ce-160000.3.1
docker-stable-buildx-0.25.0-160000.3.1
docker-stable-fish-completion-24.0.9_ce-160000.3.1
docker-stable-rootless-extras-24.0.9_ce-160000.3.1
docker-stable-zsh-completion-24.0.9_ce-160000.3.1



openSUSE-SU-2026:20270-1: low: Security update for autogen


openSUSE security update: security update for autogen
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20270-1
Rating: low
References:

* bsc#1247921

Cross-References:

* CVE-2025-8746

CVSS scores:

* CVE-2025-8746 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-8746 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for autogen fixes the following issues:

- CVE-2025-8746: Fixed improper input validation and memory bounds checking
when processing certain malformed configuration files (bsc#1247921)

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-312=1

Package List:

- openSUSE Leap 16.0:

autogen-5.18.16-160000.3.1
autoopts-5.18.16-160000.3.1
libopts25-5.18.16-160000.3.1

References:

* https://www.suse.com/security/cve/CVE-2025-8746.html