openSUSE-SU-2026:0095-1: important: Security update for python-cbor2
SUSE-SU-2026:1000-1: important: Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:1041-1: important: Security update for the Linux Kernel
SUSE-SU-2026:1042-1: important: Security update for govulncheck-vulndb
SUSE-SU-2026:1039-1: important: Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5)
openSUSE-SU-2026:20390-1: moderate: Security update for protobuf
openSUSE-SU-2026:20394-1: low: Security update for mumble
openSUSE-SU-2026:20383-1: important: Security update for net-snmp
openSUSE-SU-2026:20380-1: important: Security update for snpguest
openSUSE-SU-2026:20388-1: important: Security update for postgresql17
openSUSE-SU-2026:20393-1: important: Security update for python-simpleeval
openSUSE-SU-2026:20378-1: important: Security update for libpng16
SUSE-SU-2026:1003-1: important: Security update for the Linux Kernel
SUSE-SU-2026:1008-1: important: Security update for Prometheus
openSUSE-SU-2026:10415-1: moderate: glances-common-4.5.2-1.1 on GA media
openSUSE-SU-2026:10413-1: moderate: firefox-esr-140.9.0-1.1 on GA media
openSUSE-SU-2026:10416-1: moderate: python313-PyMuPDF-1.27.2.2-1.1 on GA media
openSUSE-SU-2026:10407-1: moderate: azure-storage-azcopy-10.32.2-1.1 on GA media
openSUSE-SU-2026:10410-1: moderate: pnpm-10.32.1-1.1 on GA media
openSUSE-SU-2026:10412-1: moderate: python311-pydicom-3.0.2-1.1 on GA media
openSUSE-SU-2026:10414-1: moderate: perl-Crypt-URandom-0.550.0-1.1 on GA media
openSUSE-SU-2026:10409-1: moderate: pgvector-devel-0.8.2-1.1 on GA media
openSUSE-SU-2026:10411-1: moderate: python311-dynaconf-3.2.13-1.1 on GA media
SUSE-SU-2026:1013-1: important: Security update 5.0.7 for Multi-Linux Manager Client Tools
SUSE-SU-2026:1027-1: important: Security update for salt
SUSE-SU-2026:1028-1: important: Security update for salt
SUSE-SU-2026:1029-1: important: Security update for salt
SUSE-SU-2026:1035-1: important: Maintenance update for Multi-Linux Manager 4.3 Release Notes Release Notes
SUSE-SU-2026:1037-1: important: Security update for grafana
SUSE-SU-2026:1002-1: important: Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5)
openSUSE-SU-2026:0095-1: important: Security update for python-cbor2
openSUSE Security Update: Security update for python-cbor2
_______________________________
Announcement ID: openSUSE-SU-2026:0095-1
Rating: important
References: #1260367
Cross-References: CVE-2026-26209
CVSS scores:
CVE-2026-26209 (SUSE): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that fixes one vulnerability is now available.
Description:
This update for python-cbor2 fixes the following issues:
- CVE-2026-26209: Fixed uncontrolled recursion via crafted CBOR payloads
that could cause a denial of service (boo#1260367)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-95=1
Package List:
- openSUSE Backports SLE-15-SP7 (aarch64 i586 ppc64le s390x x86_64):
python311-cbor2-5.5.1-bp157.2.6.1
References:
https://www.suse.com/security/cve/CVE-2026-26209.html
https://bugzilla.suse.com/1260367
SUSE-SU-2026:1000-1: important: Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5)
# Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise
15 SP5)
Announcement ID: SUSE-SU-2026:1000-1
Release Date: 2026-03-25T07:34:28Z
Rating: important
References:
* bsc#1247240
* bsc#1250730
* bsc#1254755
* bsc#1255053
* bsc#1255378
* bsc#1255402
* bsc#1255595
* bsc#1256624
* bsc#1256644
* bsc#1257118
* bsc#1257629
Cross-References:
* CVE-2022-50697
* CVE-2023-53257
* CVE-2023-53781
* CVE-2025-21738
* CVE-2025-38159
* CVE-2025-38488
* CVE-2025-40258
* CVE-2025-68284
* CVE-2025-68285
* CVE-2025-68813
* CVE-2025-71085
CVSS scores:
* CVE-2022-50697 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50697 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53257 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53257 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53781 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53781 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21738 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21738 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21738 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38159 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38159 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38488 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38488 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40258 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68284 ( SUSE ): 7.0
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68284 ( SUSE ): 7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-68285 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68285 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68813 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68813 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71085 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71085 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 11 vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise Kernel 5.14.21-150500.55.97 fixes
various security issues
The following security issues were fixed:
* CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant
uninit (bsc#1255595).
* CVE-2023-53257: wifi: mac80211: check S1G action frame size (bsc#1250730).
* CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler()
(bsc#1254755).
* CVE-2025-21738: ata: libata-sff: ensure that we cannot write outside the
allocated buffer (bsc#1257118).
* CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out
of bounds (bsc#1257629).
* CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using
async crypto (bsc#1247240).
* CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work()
(bsc#1255053).
* CVE-2025-68284: libceph: prevent potential out-of-bounds writes in
handle_auth_session_key() (bsc#1255378).
* CVE-2025-68285: libceph: fix potential use-after-free in
have_mon_and_osd_map() (bsc#1255402).
* CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path
(bsc#1256644).
* CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of
calipso_skbuff_setattr() (bsc#1256624).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-999=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2026-1000=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1000=1 SUSE-2026-999=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-16-150500.2.2
* kernel-livepatch-SLE15-SP5_Update_23-debugsource-16-150500.2.2
* kernel-livepatch-5_14_21-150500_55_97-default-16-150500.2.2
* kernel-livepatch-5_14_21-150500_55_94-default-16-150500.2.2
* kernel-livepatch-SLE15-SP5_Update_24-debugsource-16-150500.2.2
* kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-16-150500.2.2
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-16-150500.2.2
* kernel-livepatch-SLE15-SP5_Update_23-debugsource-16-150500.2.2
* kernel-livepatch-5_14_21-150500_55_97-default-16-150500.2.2
* kernel-livepatch-5_14_21-150500_55_94-default-16-150500.2.2
* kernel-livepatch-SLE15-SP5_Update_24-debugsource-16-150500.2.2
* kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-16-150500.2.2
## References:
* https://www.suse.com/security/cve/CVE-2022-50697.html
* https://www.suse.com/security/cve/CVE-2023-53257.html
* https://www.suse.com/security/cve/CVE-2023-53781.html
* https://www.suse.com/security/cve/CVE-2025-21738.html
* https://www.suse.com/security/cve/CVE-2025-38159.html
* https://www.suse.com/security/cve/CVE-2025-38488.html
* https://www.suse.com/security/cve/CVE-2025-40258.html
* https://www.suse.com/security/cve/CVE-2025-68284.html
* https://www.suse.com/security/cve/CVE-2025-68285.html
* https://www.suse.com/security/cve/CVE-2025-68813.html
* https://www.suse.com/security/cve/CVE-2025-71085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1247240
* https://bugzilla.suse.com/show_bug.cgi?id=1250730
* https://bugzilla.suse.com/show_bug.cgi?id=1254755
* https://bugzilla.suse.com/show_bug.cgi?id=1255053
* https://bugzilla.suse.com/show_bug.cgi?id=1255378
* https://bugzilla.suse.com/show_bug.cgi?id=1255402
* https://bugzilla.suse.com/show_bug.cgi?id=1255595
* https://bugzilla.suse.com/show_bug.cgi?id=1256624
* https://bugzilla.suse.com/show_bug.cgi?id=1256644
* https://bugzilla.suse.com/show_bug.cgi?id=1257118
* https://bugzilla.suse.com/show_bug.cgi?id=1257629
SUSE-SU-2026:1041-1: important: Security update for the Linux Kernel
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2026:1041-1
Release Date: 2026-03-25T14:13:36Z
Rating: important
References:
* bsc#1226591
* bsc#1241345
* bsc#1243055
* bsc#1245728
* bsc#1249998
* bsc#1251135
* bsc#1251186
* bsc#1251966
* bsc#1251971
* bsc#1252266
* bsc#1252911
* bsc#1252924
* bsc#1253049
* bsc#1254306
* bsc#1254992
* bsc#1255084
* bsc#1256564
* bsc#1256645
* bsc#1256690
* bsc#1256716
* bsc#1257231
* bsc#1257466
* bsc#1257472
* bsc#1257473
* bsc#1257732
* bsc#1257735
* bsc#1257749
* bsc#1257790
* bsc#1257891
* bsc#1257952
* bsc#1258181
* bsc#1258338
* bsc#1258340
* bsc#1258376
* bsc#1258377
* bsc#1258395
* bsc#1258424
* bsc#1258464
* bsc#1258518
* bsc#1258524
* bsc#1258832
* bsc#1258849
* bsc#1258850
* bsc#1258928
* bsc#1259070
* bsc#1259857
Cross-References:
* CVE-2023-53817
* CVE-2024-38542
* CVE-2025-37861
* CVE-2025-39817
* CVE-2025-39964
* CVE-2025-40099
* CVE-2025-40103
* CVE-2025-40253
* CVE-2025-71066
* CVE-2025-71113
* CVE-2025-71231
* CVE-2026-23004
* CVE-2026-23054
* CVE-2026-23060
* CVE-2026-23074
* CVE-2026-23089
* CVE-2026-23111
* CVE-2026-23141
* CVE-2026-23157
* CVE-2026-23191
* CVE-2026-23202
* CVE-2026-23204
* CVE-2026-23207
* CVE-2026-23209
* CVE-2026-23214
* CVE-2026-23268
* CVE-2026-23269
CVSS scores:
* CVE-2023-53817 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38542 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-38542 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-37861 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37861 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37861 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39817 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-39964 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39964 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-39964 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40099 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40099 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-40103 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40103 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71066 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71113 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71113 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-71231 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71231 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71231 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23004 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23004 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23054 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23060 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23060 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23074 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23074 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23089 ( SUSE ): 5.2
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23089 ( SUSE ): 5.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23089 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23111 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23111 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23157 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23191 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23191 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23191 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23202 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23202 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23204 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23204 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23207 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23207 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23207 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23209 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23214 ( SUSE ): 5.1
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23214 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23214 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23268 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23268 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23269 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23269 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves 27 vulnerabilities and has 19 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2023-53817: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992).
* CVE-2024-38542: RDMA/mana_ib: boundary check before installing cq callbacks
(bsc#1226591).
* CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (bsc#1243055).
* CVE-2025-39817: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
(bsc#1249998).
* CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in
af_alg_sendmsg (bsc#1251966).
* CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input
(bsc#1252911).
* CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink
(bsc#1252924).
* CVE-2025-40253: s390/ctcm: Fix double-kfree (bsc#1255084).
* CVE-2025-71066: net/sched: ets: Always remove class from active list before
deleting in ets_qdisc_change (bsc#1256645).
* CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716).
* CVE-2025-71231: crypto: iaa - Fix out-of-bounds index in
find_empty_iaa_compression_mode (bsc#1258424).
* CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and
rt_del_uncached_list() (bsc#1257231).
* CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen