SUSE-SU-2026:1220-1: moderate: Security update for python-poetry
SUSE-SU-2026:1222-1: important: Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:1225-1: important: Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1236-1: important: Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1230-1: important: Security update for bind
SUSE-SU-2026:1231-1: important: Security update for the Linux Kernel (Live Patch 48 for SUSE Linux Enterprise 15 SP4)
openSUSE-SU-2026:20477-1: important: Security update for aws-c-event-stream
openSUSE-SU-2026:20465-1: important: Security update for tigervnc
openSUSE-SU-2026:20476-1: moderate: Security update for mapserver
openSUSE-SU-2026:20464-1: important: Security update for cockpit-repos
openSUSE-SU-2026:20466-1: important: Security update for libpng16
openSUSE-SU-2026:10507-1: moderate: python311-lupa-2.7-1.1 on GA media
openSUSE-SU-2026:10501-1: moderate: MozillaThunderbird-140.9.1-1.1 on GA media
openSUSE-SU-2026:10505-1: moderate: libIex-3_4-33-3.4.9-1.1 on GA media
openSUSE-SU-2026:10504-1: moderate: corepack24-24.14.1-1.1 on GA media
openSUSE-SU-2026:10502-1: moderate: dcmtk-3.7.0-2.1 on GA media
openSUSE-SU-2026:10503-1: moderate: firefox-esr-140.9.1-1.1 on GA media
openSUSE-SU-2026:10506-1: moderate: jupyter-jupyterlab-templates-0.5.3-1.1 on GA media
openSUSE-SU-2026:10500-1: moderate: 389-ds-3.1.4+e2562f589-1.1 on GA media
SUSE-SU-2026:1220-1: moderate: Security update for python-poetry
# Security update for python-poetry
Announcement ID: SUSE-SU-2026:1220-1
Release Date: 2026-04-08T16:03:10Z
Rating: moderate
References:
* bsc#1261383
Cross-References:
* CVE-2026-34591
CVSS scores:
* CVE-2026-34591 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34591 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2026-34591 ( NVD ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* openSUSE Leap 15.6
An update that solves one vulnerability can now be installed.
## Description:
This update for python-poetry fixes the following issue:
* CVE-2026-34591: From version 1.4.0 to before version 2.3.3, a crafted wheel
can contain ../ paths that Poetry writes to disk without containment checks,
allowing arbitrary file write (bsc#1261383).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1220=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* python311-poetry-1.7.1-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2026-34591.html
* https://bugzilla.suse.com/show_bug.cgi?id=1261383
SUSE-SU-2026:1222-1: important: Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise 15 SP4)
# Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise
15 SP4)
Announcement ID: SUSE-SU-2026:1222-1
Release Date: 2026-04-09T02:36:32Z
Rating: important
References:
* bsc#1252036
* bsc#1252689
* bsc#1256780
* bsc#1257238
* bsc#1258051
* bsc#1258784
Cross-References:
* CVE-2025-39973
* CVE-2025-40018
* CVE-2025-71120
* CVE-2026-22999
* CVE-2026-23074
* CVE-2026-23209
CVSS scores:
* CVE-2025-39973 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40018 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71120 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22999 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-22999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23074 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23074 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves six vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.164 fixes
various security issues
The following security issues were fixed:
* CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).
* CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup
(bsc#1252689).
* CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
gss_token in gss_read_proxy_verf (bsc#1256780).
* CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
qfq_change_class() (bsc#1257238).
* CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc
(bsc#1258051).
* CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink()
(bsc#1258784).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1222=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-1222=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1226=1 SUSE-2026-1223=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-1226=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2026-1223=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-7-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_31-debugsource-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-7-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-7-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_31-debugsource-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_124-default-7-150500.2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_40-debugsource-16-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-11-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_43-debugsource-11-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-16-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-16-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-11-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_40-debugsource-16-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-11-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_43-debugsource-11-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-16-150400.2.1
* kernel-livepatch-5_14_21-150400_24_164-default-16-150400.2.1
* kernel-livepatch-5_14_21-150400_24_173-default-11-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2025-39973.html
* https://www.suse.com/security/cve/CVE-2025-40018.html
* https://www.suse.com/security/cve/CVE-2025-71120.html
* https://www.suse.com/security/cve/CVE-2026-22999.html
* https://www.suse.com/security/cve/CVE-2026-23074.html
* https://www.suse.com/security/cve/CVE-2026-23209.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252036
* https://bugzilla.suse.com/show_bug.cgi?id=1252689
* https://bugzilla.suse.com/show_bug.cgi?id=1256780
* https://bugzilla.suse.com/show_bug.cgi?id=1257238
* https://bugzilla.suse.com/show_bug.cgi?id=1258051
* https://bugzilla.suse.com/show_bug.cgi?id=1258784
SUSE-SU-2026:1225-1: important: Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6)
# Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise
15 SP6)
Announcement ID: SUSE-SU-2026:1225-1
Release Date: 2026-04-09T01:53:44Z
Rating: important
References:
* bsc#1252036
* bsc#1252689
* bsc#1253404
* bsc#1256780
* bsc#1257238
* bsc#1258051
* bsc#1258183
* bsc#1258784
Cross-References:
* CVE-2025-39973
* CVE-2025-40018
* CVE-2025-40159
* CVE-2025-71120
* CVE-2026-22999
* CVE-2026-23074
* CVE-2026-23111
* CVE-2026-23209
CVSS scores:
* CVE-2025-39973 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40018 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40159 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71120 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22999 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-22999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23074 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23074 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23111 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23111 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise Kernel 6.4.0-150600.23.70 fixes
various security issues
The following security issues were fixed:
* CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).
* CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup
(bsc#1252689).
* CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation
(bsc#1253404).
* CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
gss_token in gss_read_proxy_verf (bsc#1256780).
* CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
qfq_change_class() (bsc#1257238).
* CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc
(bsc#1258051).
* CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in
nft_map_catchall_activate() (bsc#1258183).
* CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink()
(bsc#1258784).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1225=1 SUSE-2026-1224=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-1225=1 SUSE-SLE-
Module-Live-Patching-15-SP6-2026-1224=1
## Package List:
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_73-default-5-150600.2.1
* kernel-livepatch-6_4_0-150600_23_73-default-debuginfo-5-150600.2.1
* kernel-livepatch-6_4_0-150600_23_70-default-debuginfo-8-150600.2.1
* kernel-livepatch-6_4_0-150600_23_70-default-8-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_15-debugsource-8-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_16-debugsource-5-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_73-default-5-150600.2.1
* kernel-livepatch-6_4_0-150600_23_73-default-debuginfo-5-150600.2.1
* kernel-livepatch-6_4_0-150600_23_70-default-debuginfo-8-150600.2.1
* kernel-livepatch-6_4_0-150600_23_70-default-8-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_15-debugsource-8-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_16-debugsource-5-150600.2.1
## References:
* https://www.suse.com/security/cve/CVE-2025-39973.html
* https://www.suse.com/security/cve/CVE-2025-40018.html
* https://www.suse.com/security/cve/CVE-2025-40159.html
* https://www.suse.com/security/cve/CVE-2025-71120.html
* https://www.suse.com/security/cve/CVE-2026-22999.html
* https://www.suse.com/security/cve/CVE-2026-23074.html
* https://www.suse.com/security/cve/CVE-2026-23111.html
* https://www.suse.com/security/cve/CVE-2026-23209.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252036
* https://bugzilla.suse.com/show_bug.cgi?id=1252689
* https://bugzilla.suse.com/show_bug.cgi?id=1253404
* https://bugzilla.suse.com/show_bug.cgi?id=1256780
* https://bugzilla.suse.com/show_bug.cgi?id=1257238
* https://bugzilla.suse.com/show_bug.cgi?id=1258051
* https://bugzilla.suse.com/show_bug.cgi?id=1258183
* https://bugzilla.suse.com/show_bug.cgi?id=1258784
SUSE-SU-2026:1236-1: important: Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6)
# Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise
15 SP6)
Announcement ID: SUSE-SU-2026:1236-1
Release Date: 2026-04-09T14:22:37Z
Rating: important
References:
* bsc#1252036
* bsc#1252689
* bsc#1253404
* bsc#1256780
* bsc#1257238
* bsc#1258051
* bsc#1258183
* bsc#1258784
Cross-References:
* CVE-2025-39973
* CVE-2025-40018
* CVE-2025-40159
* CVE-2025-71120
* CVE-2026-22999
* CVE-2026-23074
* CVE-2026-23111
* CVE-2026-23209
CVSS scores:
* CVE-2025-39973 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40018 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40159 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71120 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22999 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-22999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23074 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23074 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23111 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23111 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for the SUSE Linux Enterprise Kernel 6.4.0-150600.23.53 fixes
various security issues
The following security issues were fixed:
* CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).
* CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup
(bsc#1252689).
* CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation
(bsc#1253404).
* CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
gss_token in gss_read_proxy_verf (bsc#1256780).
* CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
qfq_change_class() (bsc#1257238).
* CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc
(bsc#1258051).
* CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in
nft_map_catchall_activate() (bsc#1258183).
* CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink()
(bsc#1258784).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1236=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-1236=1
## Package List:
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_53-default-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-14-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_12-debugsource-14-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_53-default-14-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-14-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_12-debugsource-14-150600.2.1
## References:
* https://www.suse.com/security/cve/CVE-2025-39973.html
* https://www.suse.com/security/cve/CVE-2025-40018.html
* https://www.suse.com/security/cve/CVE-2025-40159.html
* https://www.suse.com/security/cve/CVE-2025-71120.html
* https://www.suse.com/security/cve/CVE-2026-22999.html
* https://www.suse.com/security/cve/CVE-2026-23074.html
* https://www.suse.com/security/cve/CVE-2026-23111.html
* https://www.suse.com/security/cve/CVE-2026-23209.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252036
* https://bugzilla.suse.com/show_bug.cgi?id=1252689
* https://bugzilla.suse.com/show_bug.cgi?id=1253404
* https://bugzilla.suse.com/show_bug.cgi?id=1256780
* https://bugzilla.suse.com/show_bug.cgi?id=1257238
* https://bugzilla.suse.com/show_bug.cgi?id=1258051
* https://bugzilla.suse.com/show_bug.cgi?id=1258183
* https://bugzilla.suse.com/show_bug.cgi?id=1258784
SUSE-SU-2026:1230-1: important: Security update for bind
# Security update for bind
Announcement ID: SUSE-SU-2026:1230-1
Release Date: 2026-04-09T08:58:39Z
Rating: important
References:
* bsc#1260805
Cross-References:
* CVE-2026-1519
CVSS scores:
* CVE-2026-1519 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-1519 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-1519 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for bind fixes the following issues:
* CVE-2026-1519: high CPU load during insecure delegation validation due to
excessive NSEC3 iterations (bsc#1260805).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-1230=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-1230=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1230=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1230=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1230=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1230=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* bind-debugsource-9.16.50-150500.8.35.1
* bind-utils-debuginfo-9.16.50-150500.8.35.1
* bind-9.16.50-150500.8.35.1
* bind-utils-9.16.50-150500.8.35.1
* bind-debuginfo-9.16.50-150500.8.35.1
* openSUSE Leap 15.5 (noarch)
* python3-bind-9.16.50-150500.8.35.1
* bind-doc-9.16.50-150500.8.35.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* bind-utils-9.16.50-150500.8.35.1
* bind-utils-debuginfo-9.16.50-150500.8.35.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* python3-bind-9.16.50-150500.8.35.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* bind-debugsource-9.16.50-150500.8.35.1
* bind-debuginfo-9.16.50-150500.8.35.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* bind-debugsource-9.16.50-150500.8.35.1
* bind-utils-debuginfo-9.16.50-150500.8.35.1
* bind-9.16.50-150500.8.35.1
* bind-utils-9.16.50-150500.8.35.1
* bind-debuginfo-9.16.50-150500.8.35.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* python3-bind-9.16.50-150500.8.35.1
* bind-doc-9.16.50-150500.8.35.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* bind-debugsource-9.16.50-150500.8.35.1
* bind-utils-debuginfo-9.16.50-150500.8.35.1
* bind-9.16.50-150500.8.35.1
* bind-utils-9.16.50-150500.8.35.1
* bind-debuginfo-9.16.50-150500.8.35.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* python3-bind-9.16.50-150500.8.35.1
* bind-doc-9.16.50-150500.8.35.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* bind-debugsource-9.16.50-150500.8.35.1
* bind-utils-debuginfo-9.16.50-150500.8.35.1
* bind-9.16.50-150500.8.35.1
* bind-utils-9.16.50-150500.8.35.1
* bind-debuginfo-9.16.50-150500.8.35.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* python3-bind-9.16.50-150500.8.35.1
* bind-doc-9.16.50-150500.8.35.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* bind-debugsource-9.16.50-150500.8.35.1
* bind-utils-debuginfo-9.16.50-150500.8.35.1
* bind-9.16.50-150500.8.35.1
* bind-utils-9.16.50-150500.8.35.1
* bind-debuginfo-9.16.50-150500.8.35.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* python3-bind-9.16.50-150500.8.35.1
* bind-doc-9.16.50-150500.8.35.1
## References:
* https://www.suse.com/security/cve/CVE-2026-1519.html
* https://bugzilla.suse.com/show_bug.cgi?id=1260805
SUSE-SU-2026:1231-1: important: Security update for the Linux Kernel (Live Patch 48 for SUSE Linux Enterprise 15 SP4)
# Security update for the Linux Kernel (Live Patch 48 for SUSE Linux Enterprise
15 SP4)
Announcement ID: SUSE-SU-2026:1231-1
Release Date: 2026-04-09T09:04:40Z
Rating: important
References:
* bsc#1258784
Cross-References:
* CVE-2026-23209
CVSS scores:
* CVE-2026-23209 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves one vulnerability can now be installed.
## Description:
This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.194 fixes one
security issue
The following security issue was fixed:
* CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink()
(bsc#1258784).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1231=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-1231=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_194-default-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_48-debugsource-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_194-default-debuginfo-2-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_194-default-2-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_48-debugsource-2-150400.2.1
* kernel-livepatch-5_14_21-150400_24_194-default-debuginfo-2-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-23209.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258784
openSUSE-SU-2026:20477-1: important: Security update for aws-c-event-stream
openSUSE security update: security update for aws-c-event-stream
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20477-1
Rating: important
References:
* bsc#1261298
Cross-References:
* CVE-2026-5190
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for aws-c-event-stream fixes the following issues:
Changes in aws-c-event-stream:
- CVE-2026-5190: Fixed a out-of-bounds write caused by crafted event-stream messages (bsc#1261298)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-packagehub-191=1
Package List:
- openSUSE Leap 16.0:
aws-c-event-stream-devel-0.4.2-bp160.2.1
libaws-c-event-stream1-0.4.2-bp160.2.1
References:
* https://www.suse.com/security/cve/CVE-2026-5190.html
openSUSE-SU-2026:20465-1: important: Security update for tigervnc
openSUSE security update: security update for tigervnc
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20465-1
Rating: important
References:
* bsc#1260871
Cross-References:
* CVE-2026-34352
CVSS scores:
* CVE-2026-34352 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for tigervnc fixes the following issues:
- CVE-2026-34352: Fixed permissions to prevent other users from observing the screen, or modifying what is sent to the client. (bsc#1260871)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-479=1
Package List:
- openSUSE Leap 16.0:
libXvnc-devel-1.15.0-160000.3.1
libXvnc1-1.15.0-160000.3.1
tigervnc-1.15.0-160000.3.1
tigervnc-selinux-1.15.0-160000.3.1
tigervnc-x11vnc-1.15.0-160000.3.1
xorg-x11-Xvnc-1.15.0-160000.3.1
xorg-x11-Xvnc-java-1.15.0-160000.3.1
xorg-x11-Xvnc-module-1.15.0-160000.3.1
xorg-x11-Xvnc-novnc-1.15.0-160000.3.1
References:
* https://www.suse.com/security/cve/CVE-2026-34352.html
openSUSE-SU-2026:20476-1: moderate: Security update for mapserver
openSUSE security update: security update for mapserver
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20476-1
Rating: moderate
References:
* bsc#1260869
Cross-References:
* CVE-2026-33721
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for mapserver fixes the following issues:
Changes in mapserver:
- Update to release 8.6.1
* msSLDParseRasterSymbolizer: fix potential heap buffer overflow
[boo#1260869] [CVE-2026-33721]
* GetFeatureInfo with IDENTIFY CLASSAUTO: take into account
SYMBOL.ANCHORPOINT
* WCS 2.0: fix issue when input raster in a rotated pole lon/lat
CRS with lon_0?> 180
* UVRaster: fix WMS-Time support on layers with TILEINDEX
pointing to a shapefile
* WMS GetCapabilities response: use group title and abstract when
using wms_layer_group instead of GROUP
- Update to release 8.6.0
* Add `CONNECTIONTYPE RASTERLABEL`
* Set `MS_LEGEND_KEYSIZE_MAX` to 1000
* Add 4 new `COMPOSITE.COMPOP` blending operations
* Allow encryption key files to use paths relative to a mapfile
* Allow `use_default_extent_for_getfeature` to be used for OGC
Features API and PostGIS
* Allow append of additional query parameters for OGCAPI
* New MapServer index page
* WMS `GetFeatureInfo`: add options to precisely identify points
through their symbols
* Add `FALLBACK` parameter for the `CLASS` object, to be applied
if none of the previously defined classes has been applied
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-packagehub-190=1
Package List:
- openSUSE Leap 16.0:
libjavamapscript-8.6.1-bp160.1.1
libmapserver2-8.6.1-bp160.1.1
mapserver-8.6.1-bp160.1.1
mapserver-devel-8.6.1-bp160.1.1
perl-mapscript-8.6.1-bp160.1.1
php-mapscriptng-8.6.1-bp160.1.1
python313-mapserver-8.6.1-bp160.1.1
References:
* https://www.suse.com/security/cve/CVE-2026-33721.html
openSUSE-SU-2026:20464-1: important: Security update for cockpit-repos
openSUSE security update: security update for cockpit-repos
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20464-1
Rating: important
References:
* bsc#1258637
Cross-References:
* CVE-2026-26996
CVSS scores:
* CVE-2026-26996 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-26996 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for cockpit-repos fixes the following issue:
- CVE-2026-26996: minimatch: ReDoS when glob pattern contains many consecutive wildcards followed by a literal character
that doesn't appear in the test string (bsc#1258637).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-478=1
Package List:
- openSUSE Leap 16.0:
cockpit-repos-4.7-160000.2.1
References:
* https://www.suse.com/security/cve/CVE-2026-26996.html
openSUSE-SU-2026:20466-1: important: Security update for libpng16
openSUSE security update: security update for libpng16
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20466-1
Rating: important
References:
* bsc#1260754
* bsc#1260755
Cross-References:
* CVE-2026-33416
* CVE-2026-33636
CVSS scores:
* CVE-2026-33416 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33416 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33636 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-33636 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 2 vulnerabilities and has 2 bug fixes can now be installed.
Description:
This update for libpng16 fixes the following issues:
- CVE-2026-33416: use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE` can lead to arbitrary code
execution (bsc#1260754).
- CVE-2026-33636: out-of-bounds read/write in the palette expansion on ARM Neon can lead to information leak and
crashes (bsc#1260755).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-480=1
Package List:
- openSUSE Leap 16.0:
libpng16-16-1.6.44-160000.6.1
libpng16-16-x86-64-v3-1.6.44-160000.6.1
libpng16-compat-devel-1.6.44-160000.6.1
libpng16-compat-devel-x86-64-v3-1.6.44-160000.6.1
libpng16-devel-1.6.44-160000.6.1
libpng16-devel-x86-64-v3-1.6.44-160000.6.1
libpng16-tools-1.6.44-160000.6.1
References:
* https://www.suse.com/security/cve/CVE-2026-33416.html
* https://www.suse.com/security/cve/CVE-2026-33636.html
openSUSE-SU-2026:10507-1: moderate: python311-lupa-2.7-1.1 on GA media
# python311-lupa-2.7-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10507-1
Rating: moderate
Cross-References:
* CVE-2026-34444
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the python311-lupa-2.7-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python311-lupa 2.7-1.1
* python313-lupa 2.7-1.1
* python314-lupa 2.7-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-34444.html
openSUSE-SU-2026:10501-1: moderate: MozillaThunderbird-140.9.1-1.1 on GA media
# MozillaThunderbird-140.9.1-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10501-1
Rating: moderate
Cross-References:
* CVE-2026-5731
* CVE-2026-5732
* CVE-2026-5734
Affected Products:
* openSUSE Tumbleweed
An update that solves 3 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the MozillaThunderbird-140.9.1-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* MozillaThunderbird 140.9.1-1.1
* MozillaThunderbird-openpgp-librnp 140.9.1-1.1
* MozillaThunderbird-translations-common 140.9.1-1.1
* MozillaThunderbird-translations-other 140.9.1-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-5731.html
* https://www.suse.com/security/cve/CVE-2026-5732.html
* https://www.suse.com/security/cve/CVE-2026-5734.html
openSUSE-SU-2026:10505-1: moderate: libIex-3_4-33-3.4.9-1.1 on GA media
# libIex-3_4-33-3.4.9-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10505-1
Rating: moderate
Cross-References:
* CVE-2026-34378
* CVE-2026-34379
* CVE-2026-34380
* CVE-2026-34543
* CVE-2026-34544
* CVE-2026-34545
* CVE-2026-34588
* CVE-2026-34589
CVSS scores:
* CVE-2026-34378 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-34378 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34379 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
* CVE-2026-34379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34380 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
* CVE-2026-34380 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2026-34543 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-34544 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-34544 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-34545 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-34545 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34588 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-34588 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-34589 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-34589 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 8 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the libIex-3_4-33-3.4.9-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libIex-3_4-33 3.4.9-1.1
* libIex-3_4-33-32bit 3.4.9-1.1
* libIex-3_4-33-x86-64-v3 3.4.9-1.1
* libIlmThread-3_4-33 3.4.9-1.1
* libIlmThread-3_4-33-32bit 3.4.9-1.1
* libIlmThread-3_4-33-x86-64-v3 3.4.9-1.1
* libOpenEXR-3_4-33 3.4.9-1.1
* libOpenEXR-3_4-33-32bit 3.4.9-1.1
* libOpenEXR-3_4-33-x86-64-v3 3.4.9-1.1
* libOpenEXRCore-3_4-33 3.4.9-1.1
* libOpenEXRCore-3_4-33-32bit 3.4.9-1.1
* libOpenEXRCore-3_4-33-x86-64-v3 3.4.9-1.1
* libOpenEXRUtil-3_4-33 3.4.9-1.1
* libOpenEXRUtil-3_4-33-32bit 3.4.9-1.1
* libOpenEXRUtil-3_4-33-x86-64-v3 3.4.9-1.1
* openexr 3.4.9-1.1
* openexr-devel 3.4.9-1.1
* openexr-doc 3.4.9-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-34378.html
* https://www.suse.com/security/cve/CVE-2026-34379.html
* https://www.suse.com/security/cve/CVE-2026-34380.html
* https://www.suse.com/security/cve/CVE-2026-34543.html
* https://www.suse.com/security/cve/CVE-2026-34544.html
* https://www.suse.com/security/cve/CVE-2026-34545.html
* https://www.suse.com/security/cve/CVE-2026-34588.html
* https://www.suse.com/security/cve/CVE-2026-34589.html
openSUSE-SU-2026:10504-1: moderate: corepack24-24.14.1-1.1 on GA media
# corepack24-24.14.1-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10504-1
Rating: moderate
Cross-References:
* CVE-2026-21710
* CVE-2026-21712
* CVE-2026-21713
* CVE-2026-21714
* CVE-2026-21715
* CVE-2026-21716
* CVE-2026-21717
CVSS scores:
* CVE-2026-21710 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-21710 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21712 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-21712 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21713 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-21713 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-21714 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-21714 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-21715 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-21715 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-21716 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-21716 ( SUSE ): 2 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-21717 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-21717 ( SUSE ): 7.2 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 7 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the corepack24-24.14.1-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* corepack24 24.14.1-1.1
* nodejs24 24.14.1-1.1
* nodejs24-devel 24.14.1-1.1
* nodejs24-docs 24.14.1-1.1
* npm24 24.14.1-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-21710.html
* https://www.suse.com/security/cve/CVE-2026-21712.html
* https://www.suse.com/security/cve/CVE-2026-21713.html
* https://www.suse.com/security/cve/CVE-2026-21714.html
* https://www.suse.com/security/cve/CVE-2026-21715.html
* https://www.suse.com/security/cve/CVE-2026-21716.html
* https://www.suse.com/security/cve/CVE-2026-21717.html
openSUSE-SU-2026:10502-1: moderate: dcmtk-3.7.0-2.1 on GA media
# dcmtk-3.7.0-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10502-1
Rating: moderate
Cross-References:
* CVE-2026-5663
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the dcmtk-3.7.0-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* dcmtk 3.7.0-2.1
* dcmtk-devel 3.7.0-2.1
* libdcmtk20 3.7.0-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-5663.html
openSUSE-SU-2026:10503-1: moderate: firefox-esr-140.9.1-1.1 on GA media
# firefox-esr-140.9.1-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10503-1
Rating: moderate
Cross-References:
* CVE-2026-5731
* CVE-2026-5732
* CVE-2026-5734
Affected Products:
* openSUSE Tumbleweed
An update that solves 3 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the firefox-esr-140.9.1-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* firefox-esr 140.9.1-1.1
* firefox-esr-branding-upstream 140.9.1-1.1
* firefox-esr-translations-common 140.9.1-1.1
* firefox-esr-translations-other 140.9.1-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-5731.html
* https://www.suse.com/security/cve/CVE-2026-5732.html
* https://www.suse.com/security/cve/CVE-2026-5734.html
openSUSE-SU-2026:10506-1: moderate: jupyter-jupyterlab-templates-0.5.3-1.1 on GA media
# jupyter-jupyterlab-templates-0.5.3-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10506-1
Rating: moderate
Cross-References:
* CVE-2026-34601
CVSS scores:
* CVE-2026-34601 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-34601 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the jupyter-jupyterlab-templates-0.5.3-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* jupyter-jupyterlab-templates 0.5.3-1.1
* python311-jupyterlab-templates 0.5.3-1.1
* python313-jupyterlab-templates 0.5.3-1.1
* python314-jupyterlab-templates 0.5.3-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-34601.html
openSUSE-SU-2026:10500-1: moderate: 389-ds-3.1.4+e2562f589-1.1 on GA media
# 389-ds-3.1.4+e2562f589-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10500-1
Rating: moderate
Cross-References:
* CVE-2025-14905
CVSS scores:
* CVE-2025-14905 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-14905 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the 389-ds-3.1.4+e2562f589-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* 389-ds 3.1.4+e2562f589-1.1
* 389-ds-devel 3.1.4+e2562f589-1.1
* 389-ds-snmp 3.1.4+e2562f589-1.1
* lib389 3.1.4+e2562f589-1.1
* libsvrcore0 3.1.4+e2562f589-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-14905.html