SUSE 5566 Published by

Security updates have been released for SUSE Linux, including an "important" security update for python-nltk. Additionally, several "moderate" security updates were issued for various packages such as istioctl, rclone, dnsdist, MozillaThunderbird, and others. These updates aim to address potential vulnerabilities and improve the overall security of the system. The list also includes a critical security update from SUSE for libsoup.

openSUSE-SU-2026:0057-1: important: Security update for python-nltk
openSUSE-SU-2026:0056-1: important: Security update for python-nltk
openSUSE-SU-2026:10220-1: moderate: istioctl-1.28.4-1.1 on GA media
openSUSE-SU-2026:10224-1: moderate: rclone-1.73.1-1.1 on GA media
openSUSE-SU-2026:10219-1: moderate: dnsdist-2.0.2-1.1 on GA media
openSUSE-SU-2026:10221-1: moderate: python311-3.11.14-4.1 on GA media
openSUSE-SU-2026:10223-1: moderate: python313-3.13.12-1.1 on GA media
openSUSE-SU-2026:10218-1: moderate: MozillaThunderbird-140.7.2-1.1 on GA media
SUSE-SU-2026:0580-1: moderate: Security update for apptainer
SUSE-SU-2026:0579-1: important: Security update for libsoup




openSUSE-SU-2026:0057-1: important: Security update for python-nltk


openSUSE Security Update: Security update for python-nltk
_______________________________

Announcement ID: openSUSE-SU-2026:0057-1
Rating: important
References: #1258436
Cross-References: CVE-2025-14009
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________

An update that fixes one vulnerability is now available.

Description:

This update for python-nltk fixes the following issues:

- CVE-2025-14009: Fixed Secure ZIP extraction (boo#1258436)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2026-57=1

Package List:

- openSUSE Backports SLE-15-SP6 (noarch):

python3-nltk-3.7-bp156.4.6.1

References:

https://www.suse.com/security/cve/CVE-2025-14009.html
https://bugzilla.suse.com/1258436



openSUSE-SU-2026:0056-1: important: Security update for python-nltk


openSUSE Security Update: Security update for python-nltk
_______________________________

Announcement ID: openSUSE-SU-2026:0056-1
Rating: important
References: #1258436
Cross-References: CVE-2025-14009
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________

An update that fixes one vulnerability is now available.

Description:

This update for python-nltk fixes the following issues:

- CVE-2025-14009: Fixed Secure ZIP extraction (boo#1258436)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP7:

zypper in -t patch openSUSE-2026-56=1

Package List:

- openSUSE Backports SLE-15-SP7 (noarch):

python3-nltk-3.7-bp157.3.3.1

References:

https://www.suse.com/security/cve/CVE-2025-14009.html
https://bugzilla.suse.com/1258436



openSUSE-SU-2026:10220-1: moderate: istioctl-1.28.4-1.1 on GA media


# istioctl-1.28.4-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10220-1
Rating: moderate

Cross-References:

* CVE-2025-61732
* CVE-2025-68121

CVSS scores:

* CVE-2025-61732 ( SUSE ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2025-61732 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-68121 ( SUSE ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the istioctl-1.28.4-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* istioctl 1.28.4-1.1
* istioctl-bash-completion 1.28.4-1.1
* istioctl-zsh-completion 1.28.4-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-61732.html
* https://www.suse.com/security/cve/CVE-2025-68121.html



openSUSE-SU-2026:10224-1: moderate: rclone-1.73.1-1.1 on GA media


# rclone-1.73.1-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10224-1
Rating: moderate

Cross-References:

* CVE-2025-68121

CVSS scores:

* CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-68121 ( SUSE ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the rclone-1.73.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* rclone 1.73.1-1.1
* rclone-bash-completion 1.73.1-1.1
* rclone-zsh-completion 1.73.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-68121.html



openSUSE-SU-2026:10219-1: moderate: dnsdist-2.0.2-1.1 on GA media


# dnsdist-2.0.2-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10219-1
Rating: moderate

Cross-References:

* CVE-2025-8671

CVSS scores:

* CVE-2025-8671 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-8671 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the dnsdist-2.0.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* dnsdist 2.0.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-8671.html



openSUSE-SU-2026:10221-1: moderate: python311-3.11.14-4.1 on GA media


# python311-3.11.14-4.1 on GA media

Announcement ID: openSUSE-SU-2026:10221-1
Rating: moderate

Cross-References:

* CVE-2025-11468
* CVE-2025-12781
* CVE-2025-15282
* CVE-2025-15366
* CVE-2025-15367
* CVE-2026-0672
* CVE-2026-0865

CVSS scores:

* CVE-2025-11468 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-11468 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-12781 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2025-12781 ( SUSE ): 2 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-15282 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-15282 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15366 ( SUSE ): 6.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-15366 ( SUSE ): 6 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15367 ( SUSE ): 6.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-15367 ( SUSE ): 6 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0672 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-0672 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-0865 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-0865 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 7 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the python311-3.11.14-4.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311 3.11.14-4.1
* python311-32bit 3.11.14-4.1
* python311-curses 3.11.14-4.1
* python311-dbm 3.11.14-4.1
* python311-idle 3.11.14-4.1
* python311-tk 3.11.14-4.1
* python311-x86-64-v3 3.11.14-4.1

## References:

* https://www.suse.com/security/cve/CVE-2025-11468.html
* https://www.suse.com/security/cve/CVE-2025-12781.html
* https://www.suse.com/security/cve/CVE-2025-15282.html
* https://www.suse.com/security/cve/CVE-2025-15366.html
* https://www.suse.com/security/cve/CVE-2025-15367.html
* https://www.suse.com/security/cve/CVE-2026-0672.html
* https://www.suse.com/security/cve/CVE-2026-0865.html



openSUSE-SU-2026:10223-1: moderate: python313-3.13.12-1.1 on GA media


# python313-3.13.12-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10223-1
Rating: moderate

Cross-References:

* CVE-2025-11468
* CVE-2025-15282
* CVE-2026-0672
* CVE-2026-0865
* CVE-2026-1299

CVSS scores:

* CVE-2025-11468 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-11468 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-15282 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-15282 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0672 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-0672 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-0865 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-0865 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-1299 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2026-1299 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 5 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the python313-3.13.12-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python313 3.13.12-1.1
* python313-32bit 3.13.12-1.1
* python313-curses 3.13.12-1.1
* python313-dbm 3.13.12-1.1
* python313-idle 3.13.12-1.1
* python313-tk 3.13.12-1.1
* python313-x86-64-v3 3.13.12-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-11468.html
* https://www.suse.com/security/cve/CVE-2025-15282.html
* https://www.suse.com/security/cve/CVE-2026-0672.html
* https://www.suse.com/security/cve/CVE-2026-0865.html
* https://www.suse.com/security/cve/CVE-2026-1299.html



openSUSE-SU-2026:10218-1: moderate: MozillaThunderbird-140.7.2-1.1 on GA media


# MozillaThunderbird-140.7.2-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10218-1
Rating: moderate

Cross-References:

* CVE-2026-2447

CVSS scores:

* CVE-2026-2447 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-2447 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the MozillaThunderbird-140.7.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* MozillaThunderbird 140.7.2-1.1
* MozillaThunderbird-openpgp-librnp 140.7.2-1.1
* MozillaThunderbird-translations-common 140.7.2-1.1
* MozillaThunderbird-translations-other 140.7.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-2447.html



SUSE-SU-2026:0580-1: moderate: Security update for apptainer


# Security update for apptainer

Announcement ID: SUSE-SU-2026:0580-1
Release Date: 2026-02-19T11:38:12Z
Rating: moderate
References:

* bsc#1253924
* bsc#1258047
* bsc#1258048

Cross-References:

* CVE-2025-47911
* CVE-2025-58190

CVSS scores:

* CVE-2025-47911 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-47911 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-47911 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-47911 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58190 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58190 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58190 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58190 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* HPC Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP7

An update that solves two vulnerabilities and has one security fix can now be
installed.

## Description:

This update for apptainer fixes the following issues:

* CVE-2025-58190: Fixed a HTML parser misimplementation of a part of the HTML
specification for table related tags. (bsc#1258048).
* CVE-2025-47911: Fixed an issue where the HTML parser takes a very long time
or even never returns. (bsc#1258047).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-580=1 openSUSE-SLE-15.6-2026-580=1

* HPC Module 15-SP7
zypper in -t patch SUSE-SLE-Module-HPC-15-SP7-2026-580=1

## Package List:

* openSUSE Leap 15.6 (aarch64 x86_64)
* apptainer-1.4.5-150600.4.15.1
* apptainer-debuginfo-1.4.5-150600.4.15.1
* openSUSE Leap 15.6 (noarch)
* apptainer-leap-1.4.5-150600.4.15.1
* apptainer-sle15_6-1.4.5-150600.4.15.1
* apptainer-sle15_7-1.4.5-150600.4.15.1
* apptainer-sle16-1.4.5-150600.4.15.1
* HPC Module 15-SP7 (aarch64 x86_64)
* apptainer-1.4.5-150600.4.15.1
* apptainer-debuginfo-1.4.5-150600.4.15.1
* HPC Module 15-SP7 (noarch)
* apptainer-sle15_7-1.4.5-150600.4.15.1

## References:

* https://www.suse.com/security/cve/CVE-2025-47911.html
* https://www.suse.com/security/cve/CVE-2025-58190.html
* https://bugzilla.suse.com/show_bug.cgi?id=1253924
* https://bugzilla.suse.com/show_bug.cgi?id=1258047
* https://bugzilla.suse.com/show_bug.cgi?id=1258048



SUSE-SU-2026:0579-1: important: Security update for libsoup


# Security update for libsoup

Announcement ID: SUSE-SU-2026:0579-1
Release Date: 2026-02-19T11:38:02Z
Rating: important
References:

* bsc#1257440
* bsc#1257598

Cross-References:

* CVE-2026-1536
* CVE-2026-1761

CVSS scores:

* CVE-2026-1536 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N
* CVE-2026-1536 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
* CVE-2026-1536 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2026-1761 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-1761 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-1761 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves two vulnerabilities can now be installed.

## Description:

This update for libsoup fixes the following issues:

* CVE-2026-1536: Always validate the headers value when coming from untrusted
source to avoid HTTP header injection (bsc#1257440).
* CVE-2026-1761: Check length of bytes read in
soup_filter_input_stream_read_until to avoid a stack-based buffer overflow
(bsc#1257598).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-579=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-579=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-579=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-579=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-579=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-579=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-579=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-579=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-579=1

## Package List:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.31.1
* libsoup-devel-3.0.4-150400.3.31.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.31.1
* libsoup-debugsource-3.0.4-150400.3.31.1
* libsoup-3_0-0-3.0.4-150400.3.31.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.31.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.31.1
* libsoup-devel-3.0.4-150400.3.31.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.31.1
* libsoup-debugsource-3.0.4-150400.3.31.1
* libsoup-3_0-0-3.0.4-150400.3.31.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.31.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.31.1
* libsoup-devel-3.0.4-150400.3.31.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.31.1
* libsoup-debugsource-3.0.4-150400.3.31.1
* libsoup-3_0-0-3.0.4-150400.3.31.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.31.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.31.1
* libsoup-devel-3.0.4-150400.3.31.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.31.1
* libsoup-debugsource-3.0.4-150400.3.31.1
* libsoup-3_0-0-3.0.4-150400.3.31.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* libsoup-lang-3.0.4-150400.3.31.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.31.1
* libsoup-devel-3.0.4-150400.3.31.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.31.1
* libsoup-debugsource-3.0.4-150400.3.31.1
* libsoup-3_0-0-3.0.4-150400.3.31.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* libsoup-lang-3.0.4-150400.3.31.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.31.1
* libsoup-devel-3.0.4-150400.3.31.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.31.1
* libsoup-debugsource-3.0.4-150400.3.31.1
* libsoup-3_0-0-3.0.4-150400.3.31.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.31.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.31.1
* libsoup-devel-3.0.4-150400.3.31.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.31.1
* libsoup-debugsource-3.0.4-150400.3.31.1
* libsoup-3_0-0-3.0.4-150400.3.31.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.31.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.31.1
* libsoup-devel-3.0.4-150400.3.31.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.31.1
* libsoup-debugsource-3.0.4-150400.3.31.1
* libsoup-3_0-0-3.0.4-150400.3.31.1
* openSUSE Leap 15.4 (x86_64)
* libsoup-3_0-0-32bit-3.0.4-150400.3.31.1
* libsoup-devel-32bit-3.0.4-150400.3.31.1
* libsoup-3_0-0-32bit-debuginfo-3.0.4-150400.3.31.1
* openSUSE Leap 15.4 (noarch)
* libsoup-lang-3.0.4-150400.3.31.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libsoup-3_0-0-64bit-debuginfo-3.0.4-150400.3.31.1
* libsoup-3_0-0-64bit-3.0.4-150400.3.31.1
* libsoup-devel-64bit-3.0.4-150400.3.31.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.31.1
* libsoup-devel-3.0.4-150400.3.31.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.31.1
* libsoup-debugsource-3.0.4-150400.3.31.1
* libsoup-3_0-0-3.0.4-150400.3.31.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.31.1

## References:

* https://www.suse.com/security/cve/CVE-2026-1536.html
* https://www.suse.com/security/cve/CVE-2026-1761.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257440
* https://bugzilla.suse.com/show_bug.cgi?id=1257598