SUSE 5614 Published by

New security advisories have been published for both SUSE Linux Enterprise and openSUSE distributions covering a wide range of software packages. Several updates carry an important rating and include fixes for the Linux Kernel Live Patches on various service packs. Beyond the kernel, important fixes address services like bind while users should also note moderate severity updates for tools like mapserver. Administrators should review the full list of referenced IDs and apply these patches promptly to maintain system security.

SUSE-SU-2026:1220-1: moderate: Security update for python-poetry
SUSE-SU-2026:1222-1: important: Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:1225-1: important: Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1236-1: important: Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1230-1: important: Security update for bind
SUSE-SU-2026:1231-1: important: Security update for the Linux Kernel (Live Patch 48 for SUSE Linux Enterprise 15 SP4)
openSUSE-SU-2026:20477-1: important: Security update for aws-c-event-stream
openSUSE-SU-2026:20465-1: important: Security update for tigervnc
openSUSE-SU-2026:20476-1: moderate: Security update for mapserver
openSUSE-SU-2026:20464-1: important: Security update for cockpit-repos
openSUSE-SU-2026:20466-1: important: Security update for libpng16
openSUSE-SU-2026:10507-1: moderate: python311-lupa-2.7-1.1 on GA media
openSUSE-SU-2026:10501-1: moderate: MozillaThunderbird-140.9.1-1.1 on GA media
openSUSE-SU-2026:10505-1: moderate: libIex-3_4-33-3.4.9-1.1 on GA media
openSUSE-SU-2026:10504-1: moderate: corepack24-24.14.1-1.1 on GA media
openSUSE-SU-2026:10502-1: moderate: dcmtk-3.7.0-2.1 on GA media
openSUSE-SU-2026:10503-1: moderate: firefox-esr-140.9.1-1.1 on GA media
openSUSE-SU-2026:10506-1: moderate: jupyter-jupyterlab-templates-0.5.3-1.1 on GA media
openSUSE-SU-2026:10500-1: moderate: 389-ds-3.1.4+e2562f589-1.1 on GA media




SUSE-SU-2026:1220-1: moderate: Security update for python-poetry


# Security update for python-poetry

Announcement ID: SUSE-SU-2026:1220-1
Release Date: 2026-04-08T16:03:10Z
Rating: moderate
References:

* bsc#1261383

Cross-References:

* CVE-2026-34591

CVSS scores:

* CVE-2026-34591 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34591 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2026-34591 ( NVD ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Leap 15.6

An update that solves one vulnerability can now be installed.

## Description:

This update for python-poetry fixes the following issue:

* CVE-2026-34591: From version 1.4.0 to before version 2.3.3, a crafted wheel
can contain ../ paths that Poetry writes to disk without containment checks,
allowing arbitrary file write (bsc#1261383).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1220=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* python311-poetry-1.7.1-150600.3.3.1

## References:

* https://www.suse.com/security/cve/CVE-2026-34591.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261383



SUSE-SU-2026:1222-1: important: Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise 15 SP4)


# Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise
15 SP4)

Announcement ID: SUSE-SU-2026:1222-1
Release Date: 2026-04-09T02:36:32Z
Rating: important
References:

* bsc#1252036
* bsc#1252689
* bsc#1256780
* bsc#1257238
* bsc#1258051
* bsc#1258784

Cross-References:

* CVE-2025-39973
* CVE-2025-40018
* CVE-2025-71120
* CVE-2026-22999
* CVE-2026-23074
* CVE-2026-23209

CVSS scores:

* CVE-2025-39973 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40018 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71120 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22999 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-22999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23074 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23074 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves six vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.164 fixes
various security issues

The following security issues were fixed:

* CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).
* CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup
(bsc#1252689).
* CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
gss_token in gss_read_proxy_verf (bsc#1256780).
* CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
qfq_change_class() (bsc#1257238).
* CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc
(bsc#1258051).
* CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink()
(bsc#1258784).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1222=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-1222=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1226=1 SUSE-2026-1223=1

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-1226=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2026-1223=1

## Package List:

* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-7-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_31-debugsource-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-7-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-7-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_31-debugsource-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-7-150500.2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_40-debugsource-16-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-11-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_43-debugsource-11-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-16-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-16-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-11-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_40-debugsource-16-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-11-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_43-debugsource-11-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-16-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-16-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-11-150400.2.1

## References:

* https://www.suse.com/security/cve/CVE-2025-39973.html
* https://www.suse.com/security/cve/CVE-2025-40018.html
* https://www.suse.com/security/cve/CVE-2025-71120.html
* https://www.suse.com/security/cve/CVE-2026-22999.html
* https://www.suse.com/security/cve/CVE-2026-23074.html
* https://www.suse.com/security/cve/CVE-2026-23209.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252036
* https://bugzilla.suse.com/show_bug.cgi?id=1252689
* https://bugzilla.suse.com/show_bug.cgi?id=1256780
* https://bugzilla.suse.com/show_bug.cgi?id=1257238
* https://bugzilla.suse.com/show_bug.cgi?id=1258051
* https://bugzilla.suse.com/show_bug.cgi?id=1258784



SUSE-SU-2026:1225-1: important: Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6)


# Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise
15 SP6)

Announcement ID: SUSE-SU-2026:1225-1
Release Date: 2026-04-09T01:53:44Z
Rating: important
References:

* bsc#1252036
* bsc#1252689
* bsc#1253404
* bsc#1256780
* bsc#1257238
* bsc#1258051
* bsc#1258183
* bsc#1258784

Cross-References:

* CVE-2025-39973
* CVE-2025-40018
* CVE-2025-40159
* CVE-2025-71120
* CVE-2026-22999
* CVE-2026-23074
* CVE-2026-23111
* CVE-2026-23209

CVSS scores:

* CVE-2025-39973 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40018 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40159 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71120 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22999 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-22999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23074 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23074 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23111 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23111 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves eight vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise Kernel 6.4.0-150600.23.70 fixes
various security issues

The following security issues were fixed:

* CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).
* CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup
(bsc#1252689).
* CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation
(bsc#1253404).
* CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
gss_token in gss_read_proxy_verf (bsc#1256780).
* CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
qfq_change_class() (bsc#1257238).
* CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc
(bsc#1258051).
* CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in
nft_map_catchall_activate() (bsc#1258183).
* CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink()
(bsc#1258784).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1225=1 SUSE-2026-1224=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-1225=1 SUSE-SLE-
Module-Live-Patching-15-SP6-2026-1224=1

## Package List:

* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_73-default-5-150600.2.1
* kernel-livepatch-6_4_0-150600_23_73-default-debuginfo-5-150600.2.1
* kernel-livepatch-6_4_0-150600_23_70-default-debuginfo-8-150600.2.1
* kernel-livepatch-6_4_0-150600_23_70-default-8-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_15-debugsource-8-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_16-debugsource-5-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_73-default-5-150600.2.1
* kernel-livepatch-6_4_0-150600_23_73-default-debuginfo-5-150600.2.1
* kernel-livepatch-6_4_0-150600_23_70-default-debuginfo-8-150600.2.1
* kernel-livepatch-6_4_0-150600_23_70-default-8-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_15-debugsource-8-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_16-debugsource-5-150600.2.1

## References:

* https://www.suse.com/security/cve/CVE-2025-39973.html
* https://www.suse.com/security/cve/CVE-2025-40018.html
* https://www.suse.com/security/cve/CVE-2025-40159.html
* https://www.suse.com/security/cve/CVE-2025-71120.html
* https://www.suse.com/security/cve/CVE-2026-22999.html
* https://www.suse.com/security/cve/CVE-2026-23074.html
* https://www.suse.com/security/cve/CVE-2026-23111.html
* https://www.suse.com/security/cve/CVE-2026-23209.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252036
* https://bugzilla.suse.com/show_bug.cgi?id=1252689
* https://bugzilla.suse.com/show_bug.cgi?id=1253404
* https://bugzilla.suse.com/show_bug.cgi?id=1256780
* https://bugzilla.suse.com/show_bug.cgi?id=1257238
* https://bugzilla.suse.com/show_bug.cgi?id=1258051
* https://bugzilla.suse.com/show_bug.cgi?id=1258183
* https://bugzilla.suse.com/show_bug.cgi?id=1258784



SUSE-SU-2026:1236-1: important: Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6)


# Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise
15 SP6)

Announcement ID: SUSE-SU-2026:1236-1
Release Date: 2026-04-09T14:22:37Z
Rating: important
References:

* bsc#1252036
* bsc#1252689
* bsc#1253404
* bsc#1256780
* bsc#1257238
* bsc#1258051
* bsc#1258183
* bsc#1258784

Cross-References:

* CVE-2025-39973
* CVE-2025-40018
* CVE-2025-40159
* CVE-2025-71120
* CVE-2026-22999
* CVE-2026-23074
* CVE-2026-23111
* CVE-2026-23209

CVSS scores:

* CVE-2025-39973 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40018 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40159 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71120 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22999 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-22999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23074 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23074 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23111 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23111 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves eight vulnerabilities can now be installed.

## Description:

This update for the SUSE Linux Enterprise Kernel 6.4.0-150600.23.53 fixes
various security issues

The following security issues were fixed:

* CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).
* CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup
(bsc#1252689).
* CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation
(bsc#1253404).
* CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
gss_token in gss_read_proxy_verf (bsc#1256780).
* CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
qfq_change_class() (bsc#1257238).
* CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc
(bsc#1258051).
* CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in
nft_map_catchall_activate() (bsc#1258183).
* CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink()
(bsc#1258784).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1236=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-1236=1

## Package List:

* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_53-default-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-14-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_12-debugsource-14-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_53-default-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-14-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_12-debugsource-14-150600.2.1

## References:

* https://www.suse.com/security/cve/CVE-2025-39973.html
* https://www.suse.com/security/cve/CVE-2025-40018.html
* https://www.suse.com/security/cve/CVE-2025-40159.html
* https://www.suse.com/security/cve/CVE-2025-71120.html
* https://www.suse.com/security/cve/CVE-2026-22999.html
* https://www.suse.com/security/cve/CVE-2026-23074.html
* https://www.suse.com/security/cve/CVE-2026-23111.html
* https://www.suse.com/security/cve/CVE-2026-23209.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252036
* https://bugzilla.suse.com/show_bug.cgi?id=1252689
* https://bugzilla.suse.com/show_bug.cgi?id=1253404
* https://bugzilla.suse.com/show_bug.cgi?id=1256780
* https://bugzilla.suse.com/show_bug.cgi?id=1257238
* https://bugzilla.suse.com/show_bug.cgi?id=1258051
* https://bugzilla.suse.com/show_bug.cgi?id=1258183
* https://bugzilla.suse.com/show_bug.cgi?id=1258784



SUSE-SU-2026:1230-1: important: Security update for bind


# Security update for bind

Announcement ID: SUSE-SU-2026:1230-1
Release Date: 2026-04-09T08:58:39Z
Rating: important
References:

* bsc#1260805

Cross-References:

* CVE-2026-1519

CVSS scores:

* CVE-2026-1519 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-1519 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-1519 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for bind fixes the following issues:

* CVE-2026-1519: high CPU load during insecure delegation validation due to
excessive NSEC3 iterations (bsc#1260805).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1230=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1230=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1230=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1230=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1230=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1230=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* bind-debugsource-9.16.50-150500.8.35.1
* bind-utils-debuginfo-9.16.50-150500.8.35.1
* bind-9.16.50-150500.8.35.1
* bind-utils-9.16.50-150500.8.35.1
* bind-debuginfo-9.16.50-150500.8.35.1
* openSUSE Leap 15.5 (noarch)
* python3-bind-9.16.50-150500.8.35.1
* bind-doc-9.16.50-150500.8.35.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* bind-utils-9.16.50-150500.8.35.1
* bind-utils-debuginfo-9.16.50-150500.8.35.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* python3-bind-9.16.50-150500.8.35.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* bind-debugsource-9.16.50-150500.8.35.1
* bind-debuginfo-9.16.50-150500.8.35.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* bind-debugsource-9.16.50-150500.8.35.1
* bind-utils-debuginfo-9.16.50-150500.8.35.1
* bind-9.16.50-150500.8.35.1
* bind-utils-9.16.50-150500.8.35.1
* bind-debuginfo-9.16.50-150500.8.35.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* python3-bind-9.16.50-150500.8.35.1
* bind-doc-9.16.50-150500.8.35.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* bind-debugsource-9.16.50-150500.8.35.1
* bind-utils-debuginfo-9.16.50-150500.8.35.1
* bind-9.16.50-150500.8.35.1
* bind-utils-9.16.50-150500.8.35.1
* bind-debuginfo-9.16.50-150500.8.35.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* python3-bind-9.16.50-150500.8.35.1
* bind-doc-9.16.50-150500.8.35.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* bind-debugsource-9.16.50-150500.8.35.1
* bind-utils-debuginfo-9.16.50-150500.8.35.1
* bind-9.16.50-150500.8.35.1
* bind-utils-9.16.50-150500.8.35.1
* bind-debuginfo-9.16.50-150500.8.35.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* python3-bind-9.16.50-150500.8.35.1
* bind-doc-9.16.50-150500.8.35.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* bind-debugsource-9.16.50-150500.8.35.1
* bind-utils-debuginfo-9.16.50-150500.8.35.1
* bind-9.16.50-150500.8.35.1
* bind-utils-9.16.50-150500.8.35.1
* bind-debuginfo-9.16.50-150500.8.35.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* python3-bind-9.16.50-150500.8.35.1
* bind-doc-9.16.50-150500.8.35.1

## References:

* https://www.suse.com/security/cve/CVE-2026-1519.html
* https://bugzilla.suse.com/show_bug.cgi?id=1260805



SUSE-SU-2026:1231-1: important: Security update for the Linux Kernel (Live Patch 48 for SUSE Linux Enterprise 15 SP4)


# Security update for the Linux Kernel (Live Patch 48 for SUSE Linux Enterprise
15 SP4)

Announcement ID: SUSE-SU-2026:1231-1
Release Date: 2026-04-09T09:04:40Z
Rating: important
References:

* bsc#1258784

Cross-References:

* CVE-2026-23209

CVSS scores:

* CVE-2026-23209 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that solves one vulnerability can now be installed.

## Description:

This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.194 fixes one
security issue

The following security issue was fixed:

* CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink()
(bsc#1258784).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1231=1

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-1231=1

## Package List:

* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_194-default-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_48-debugsource-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_194-default-debuginfo-2-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_194-default-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_48-debugsource-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_194-default-debuginfo-2-150400.2.1

## References:

* https://www.suse.com/security/cve/CVE-2026-23209.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258784



openSUSE-SU-2026:20477-1: important: Security update for aws-c-event-stream


openSUSE security update: security update for aws-c-event-stream
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20477-1
Rating: important
References:

* bsc#1261298

Cross-References:

* CVE-2026-5190

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for aws-c-event-stream fixes the following issues:

Changes in aws-c-event-stream:

- CVE-2026-5190: Fixed a out-of-bounds write caused by crafted event-stream messages (bsc#1261298)

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-packagehub-191=1

Package List:

- openSUSE Leap 16.0:

aws-c-event-stream-devel-0.4.2-bp160.2.1
libaws-c-event-stream1-0.4.2-bp160.2.1

References:

* https://www.suse.com/security/cve/CVE-2026-5190.html



openSUSE-SU-2026:20465-1: important: Security update for tigervnc


openSUSE security update: security update for tigervnc
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20465-1
Rating: important
References:

* bsc#1260871

Cross-References:

* CVE-2026-34352

CVSS scores:

* CVE-2026-34352 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for tigervnc fixes the following issues:

- CVE-2026-34352: Fixed permissions to prevent other users from observing the screen, or modifying what is sent to the client. (bsc#1260871)

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-479=1

Package List:

- openSUSE Leap 16.0:

libXvnc-devel-1.15.0-160000.3.1
libXvnc1-1.15.0-160000.3.1
tigervnc-1.15.0-160000.3.1
tigervnc-selinux-1.15.0-160000.3.1
tigervnc-x11vnc-1.15.0-160000.3.1
xorg-x11-Xvnc-1.15.0-160000.3.1
xorg-x11-Xvnc-java-1.15.0-160000.3.1
xorg-x11-Xvnc-module-1.15.0-160000.3.1
xorg-x11-Xvnc-novnc-1.15.0-160000.3.1

References:

* https://www.suse.com/security/cve/CVE-2026-34352.html



openSUSE-SU-2026:20476-1: moderate: Security update for mapserver


openSUSE security update: security update for mapserver
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20476-1
Rating: moderate
References:

* bsc#1260869

Cross-References:

* CVE-2026-33721

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for mapserver fixes the following issues:

Changes in mapserver:

- Update to release 8.6.1
* msSLDParseRasterSymbolizer: fix potential heap buffer overflow
[boo#1260869] [CVE-2026-33721]
* GetFeatureInfo with IDENTIFY CLASSAUTO: take into account
SYMBOL.ANCHORPOINT
* WCS 2.0: fix issue when input raster in a rotated pole lon/lat
CRS with lon_0?> 180
* UVRaster: fix WMS-Time support on layers with TILEINDEX
pointing to a shapefile
* WMS GetCapabilities response: use group title and abstract when
using wms_layer_group instead of GROUP

- Update to release 8.6.0
* Add `CONNECTIONTYPE RASTERLABEL`
* Set `MS_LEGEND_KEYSIZE_MAX` to 1000
* Add 4 new `COMPOSITE.COMPOP` blending operations
* Allow encryption key files to use paths relative to a mapfile
* Allow `use_default_extent_for_getfeature` to be used for OGC
Features API and PostGIS
* Allow append of additional query parameters for OGCAPI
* New MapServer index page
* WMS `GetFeatureInfo`: add options to precisely identify points
through their symbols
* Add `FALLBACK` parameter for the `CLASS` object, to be applied
if none of the previously defined classes has been applied

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-packagehub-190=1

Package List:

- openSUSE Leap 16.0:

libjavamapscript-8.6.1-bp160.1.1
libmapserver2-8.6.1-bp160.1.1
mapserver-8.6.1-bp160.1.1
mapserver-devel-8.6.1-bp160.1.1
perl-mapscript-8.6.1-bp160.1.1
php-mapscriptng-8.6.1-bp160.1.1
python313-mapserver-8.6.1-bp160.1.1

References:

* https://www.suse.com/security/cve/CVE-2026-33721.html



openSUSE-SU-2026:20464-1: important: Security update for cockpit-repos


openSUSE security update: security update for cockpit-repos
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20464-1
Rating: important
References:

* bsc#1258637

Cross-References:

* CVE-2026-26996

CVSS scores:

* CVE-2026-26996 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-26996 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for cockpit-repos fixes the following issue:

- CVE-2026-26996: minimatch: ReDoS when glob pattern contains many consecutive wildcards followed by a literal character
that doesn't appear in the test string (bsc#1258637).

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-478=1

Package List:

- openSUSE Leap 16.0:

cockpit-repos-4.7-160000.2.1

References:

* https://www.suse.com/security/cve/CVE-2026-26996.html



openSUSE-SU-2026:20466-1: important: Security update for libpng16


openSUSE security update: security update for libpng16
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20466-1
Rating: important
References:

* bsc#1260754
* bsc#1260755

Cross-References:

* CVE-2026-33416
* CVE-2026-33636

CVSS scores:

* CVE-2026-33416 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33416 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33636 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-33636 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 2 vulnerabilities and has 2 bug fixes can now be installed.

Description:

This update for libpng16 fixes the following issues:

- CVE-2026-33416: use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE` can lead to arbitrary code
execution (bsc#1260754).
- CVE-2026-33636: out-of-bounds read/write in the palette expansion on ARM Neon can lead to information leak and
crashes (bsc#1260755).

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-480=1

Package List:

- openSUSE Leap 16.0:

libpng16-16-1.6.44-160000.6.1
libpng16-16-x86-64-v3-1.6.44-160000.6.1
libpng16-compat-devel-1.6.44-160000.6.1
libpng16-compat-devel-x86-64-v3-1.6.44-160000.6.1
libpng16-devel-1.6.44-160000.6.1
libpng16-devel-x86-64-v3-1.6.44-160000.6.1
libpng16-tools-1.6.44-160000.6.1

References:

* https://www.suse.com/security/cve/CVE-2026-33416.html
* https://www.suse.com/security/cve/CVE-2026-33636.html



openSUSE-SU-2026:10507-1: moderate: python311-lupa-2.7-1.1 on GA media


# python311-lupa-2.7-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10507-1
Rating: moderate

Cross-References:

* CVE-2026-34444

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python311-lupa-2.7-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311-lupa 2.7-1.1
* python313-lupa 2.7-1.1
* python314-lupa 2.7-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-34444.html



openSUSE-SU-2026:10501-1: moderate: MozillaThunderbird-140.9.1-1.1 on GA media


# MozillaThunderbird-140.9.1-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10501-1
Rating: moderate

Cross-References:

* CVE-2026-5731
* CVE-2026-5732
* CVE-2026-5734

Affected Products:

* openSUSE Tumbleweed

An update that solves 3 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the MozillaThunderbird-140.9.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* MozillaThunderbird 140.9.1-1.1
* MozillaThunderbird-openpgp-librnp 140.9.1-1.1
* MozillaThunderbird-translations-common 140.9.1-1.1
* MozillaThunderbird-translations-other 140.9.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-5731.html
* https://www.suse.com/security/cve/CVE-2026-5732.html
* https://www.suse.com/security/cve/CVE-2026-5734.html



openSUSE-SU-2026:10505-1: moderate: libIex-3_4-33-3.4.9-1.1 on GA media


# libIex-3_4-33-3.4.9-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10505-1
Rating: moderate

Cross-References:

* CVE-2026-34378
* CVE-2026-34379
* CVE-2026-34380
* CVE-2026-34543
* CVE-2026-34544
* CVE-2026-34545
* CVE-2026-34588
* CVE-2026-34589

CVSS scores:

* CVE-2026-34378 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-34378 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34379 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
* CVE-2026-34379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34380 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
* CVE-2026-34380 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2026-34543 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34544 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-34544 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-34545 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-34545 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34588 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-34588 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34589 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-34589 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 8 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the libIex-3_4-33-3.4.9-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libIex-3_4-33 3.4.9-1.1
* libIex-3_4-33-32bit 3.4.9-1.1
* libIex-3_4-33-x86-64-v3 3.4.9-1.1
* libIlmThread-3_4-33 3.4.9-1.1
* libIlmThread-3_4-33-32bit 3.4.9-1.1
* libIlmThread-3_4-33-x86-64-v3 3.4.9-1.1
* libOpenEXR-3_4-33 3.4.9-1.1
* libOpenEXR-3_4-33-32bit 3.4.9-1.1
* libOpenEXR-3_4-33-x86-64-v3 3.4.9-1.1
* libOpenEXRCore-3_4-33 3.4.9-1.1
* libOpenEXRCore-3_4-33-32bit 3.4.9-1.1
* libOpenEXRCore-3_4-33-x86-64-v3 3.4.9-1.1
* libOpenEXRUtil-3_4-33 3.4.9-1.1
* libOpenEXRUtil-3_4-33-32bit 3.4.9-1.1
* libOpenEXRUtil-3_4-33-x86-64-v3 3.4.9-1.1
* openexr 3.4.9-1.1
* openexr-devel 3.4.9-1.1
* openexr-doc 3.4.9-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-34378.html
* https://www.suse.com/security/cve/CVE-2026-34379.html
* https://www.suse.com/security/cve/CVE-2026-34380.html
* https://www.suse.com/security/cve/CVE-2026-34543.html
* https://www.suse.com/security/cve/CVE-2026-34544.html
* https://www.suse.com/security/cve/CVE-2026-34545.html
* https://www.suse.com/security/cve/CVE-2026-34588.html
* https://www.suse.com/security/cve/CVE-2026-34589.html



openSUSE-SU-2026:10504-1: moderate: corepack24-24.14.1-1.1 on GA media


# corepack24-24.14.1-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10504-1
Rating: moderate

Cross-References:

* CVE-2026-21710
* CVE-2026-21712
* CVE-2026-21713
* CVE-2026-21714
* CVE-2026-21715
* CVE-2026-21716
* CVE-2026-21717

CVSS scores:

* CVE-2026-21710 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-21710 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21712 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-21712 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21713 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-21713 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-21714 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-21714 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21715 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-21715 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-21716 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21716 ( SUSE ): 2 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-21717 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-21717 ( SUSE ): 7.2 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 7 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the corepack24-24.14.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* corepack24 24.14.1-1.1
* nodejs24 24.14.1-1.1
* nodejs24-devel 24.14.1-1.1
* nodejs24-docs 24.14.1-1.1
* npm24 24.14.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-21710.html
* https://www.suse.com/security/cve/CVE-2026-21712.html
* https://www.suse.com/security/cve/CVE-2026-21713.html
* https://www.suse.com/security/cve/CVE-2026-21714.html
* https://www.suse.com/security/cve/CVE-2026-21715.html
* https://www.suse.com/security/cve/CVE-2026-21716.html
* https://www.suse.com/security/cve/CVE-2026-21717.html



openSUSE-SU-2026:10502-1: moderate: dcmtk-3.7.0-2.1 on GA media


# dcmtk-3.7.0-2.1 on GA media

Announcement ID: openSUSE-SU-2026:10502-1
Rating: moderate

Cross-References:

* CVE-2026-5663

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the dcmtk-3.7.0-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* dcmtk 3.7.0-2.1
* dcmtk-devel 3.7.0-2.1
* libdcmtk20 3.7.0-2.1

## References:

* https://www.suse.com/security/cve/CVE-2026-5663.html



openSUSE-SU-2026:10503-1: moderate: firefox-esr-140.9.1-1.1 on GA media


# firefox-esr-140.9.1-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10503-1
Rating: moderate

Cross-References:

* CVE-2026-5731
* CVE-2026-5732
* CVE-2026-5734

Affected Products:

* openSUSE Tumbleweed

An update that solves 3 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the firefox-esr-140.9.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* firefox-esr 140.9.1-1.1
* firefox-esr-branding-upstream 140.9.1-1.1
* firefox-esr-translations-common 140.9.1-1.1
* firefox-esr-translations-other 140.9.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-5731.html
* https://www.suse.com/security/cve/CVE-2026-5732.html
* https://www.suse.com/security/cve/CVE-2026-5734.html



openSUSE-SU-2026:10506-1: moderate: jupyter-jupyterlab-templates-0.5.3-1.1 on GA media


# jupyter-jupyterlab-templates-0.5.3-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10506-1
Rating: moderate

Cross-References:

* CVE-2026-34601

CVSS scores:

* CVE-2026-34601 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-34601 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the jupyter-jupyterlab-templates-0.5.3-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* jupyter-jupyterlab-templates 0.5.3-1.1
* python311-jupyterlab-templates 0.5.3-1.1
* python313-jupyterlab-templates 0.5.3-1.1
* python314-jupyterlab-templates 0.5.3-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-34601.html



openSUSE-SU-2026:10500-1: moderate: 389-ds-3.1.4+e2562f589-1.1 on GA media


# 389-ds-3.1.4+e2562f589-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10500-1
Rating: moderate

Cross-References:

* CVE-2025-14905

CVSS scores:

* CVE-2025-14905 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-14905 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the 389-ds-3.1.4+e2562f589-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* 389-ds 3.1.4+e2562f589-1.1
* 389-ds-devel 3.1.4+e2562f589-1.1
* 389-ds-snmp 3.1.4+e2562f589-1.1
* lib389 3.1.4+e2562f589-1.1
* libsvrcore0 3.1.4+e2562f589-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-14905.html