SUSE 5606 Published by

A batch of new security advisories has been released for both SUSE Linux and openSUSE distributions specifically designed to patch identified vulnerabilities across various packages used by administrators daily. Critical tools such as freerdp and webkit2gtk3 face important updates requiring immediate attention from administrators managing the systems. Moderate fixes appear alongside these for software like Mozilla Thunderbird or bind libraries found on GA media channels. Apply these patches promptly to protect your infrastructure against potential security exploits now.

SUSE-SU-2026:1150-1: important: Security update for webkit2gtk3
openSUSE-SU-2026:10449-1: moderate: gsl-2.8-5.1 on GA media
openSUSE-SU-2026:10447-1: moderate: MozillaThunderbird-140.9.0-1.1 on GA media
openSUSE-SU-2026:10456-1: moderate: tailscale-1.96.4-1.1 on GA media
openSUSE-SU-2026:10452-1: moderate: libjavamapscript-8.6.1-1.1 on GA media
openSUSE-SU-2026:10455-1: moderate: python311-requests-2.33.0-1.1 on GA media
openSUSE-SU-2026:10448-1: moderate: bind-9.20.21-1.1 on GA media
openSUSE-SU-2026:10450-1: moderate: incus-6.23-1.1 on GA media
openSUSE-SU-2026:10453-1: moderate: libpolkit-agent-1-0-127-3.1 on GA media
openSUSE-SU-2026:10451-1: moderate: libpng16-16-1.6.56-1.1 on GA media
SUSE-SU-2026:1153-1: important: Security update for perl-XML-Parser
openSUSE-SU-2026:0111-1: important: Security update for tinyproxy
SUSE-SU-2026:1160-1: important: Security update for freerdp




SUSE-SU-2026:1150-1: important: Security update for webkit2gtk3


# Security update for webkit2gtk3

Announcement ID: SUSE-SU-2026:1150-1
Release Date: 2026-03-30T17:34:56Z
Rating: important
References:

* bsc#1259934
* bsc#1259935
* bsc#1259936
* bsc#1259937
* bsc#1259938
* bsc#1259939
* bsc#1259940
* bsc#1259941
* bsc#1259942
* bsc#1259943
* bsc#1259944
* bsc#1259945
* bsc#1259946
* bsc#1259947
* bsc#1259948
* bsc#1259949
* bsc#1259950

Cross-References:

* CVE-2023-42843
* CVE-2023-43010
* CVE-2024-54658
* CVE-2025-13502
* CVE-2025-31223
* CVE-2025-31277
* CVE-2025-43213
* CVE-2025-43214
* CVE-2025-43368
* CVE-2025-43419
* CVE-2025-43433
* CVE-2025-43434
* CVE-2025-43438
* CVE-2025-43440
* CVE-2025-43441
* CVE-2025-43443
* CVE-2025-43457
* CVE-2025-43511
* CVE-2025-46299
* CVE-2026-20608
* CVE-2026-20635
* CVE-2026-20636
* CVE-2026-20644
* CVE-2026-20652
* CVE-2026-20676

CVSS scores:

* CVE-2023-42843 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2023-42843 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-42843 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2023-43010 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-43010 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-43010 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-54658 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54658 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-54658 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-54658 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-13502 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-13502 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-13502 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-31223 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-31223 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-31223 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-31277 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-31277 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-31277 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-43213 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-43213 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-43214 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-43214 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-43214 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-43368 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-43368 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-43419 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-43419 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-43419 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-43433 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-43433 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-43433 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-43434 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-43434 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-43434 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-43438 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-43438 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-43438 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-43440 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-43440 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-43440 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-43441 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-43441 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-43441 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-43443 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-43443 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-43443 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-43457 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-43457 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-43457 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-43511 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-43511 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-43511 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-46299 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-46299 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2025-46299 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-20608 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20608 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-20608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-20635 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20635 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-20635 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-20636 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20636 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-20636 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-20644 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20644 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-20644 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-20652 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-20652 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-20652 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-20652 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-20676 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-20676 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-20676 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-20676 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves 25 vulnerabilities can now be installed.

## Description:

This update for webkit2gtk3 fixes the following issues:

Update to version 2.52.0:

* CVE-2023-43010: processing maliciously crafted web content may lead to
memory corruption (bsc#1259950).
* CVE-2025-31223: processing maliciously crafted web content may lead to
memory corruption (bsc#1259949).
* CVE-2025-31277: processing maliciously crafted web content may lead to
memory corruption (bsc#1259948).
* CVE-2025-43213: processing maliciously crafted web content may lead to an
unexpected crash (bsc#1259947).
* CVE-2025-43214: processing maliciously crafted web content may lead to an
unexpected crash (bsc#1259946).
* CVE-2025-43433: processing maliciously crafted web content may lead to
memory corruption (bsc#1259945).
* CVE-2025-43438: processing maliciously crafted web content may lead to an
unexpected crash (bsc#1259944).
* CVE-2025-43441: processing maliciously crafted web content may lead to an
unexpected process crash (bsc#1259943).
* CVE-2025-43457: processing maliciously crafted web content may lead to an
unexpected crash (bsc#1259942).
* CVE-2025-43511: processing maliciously crafted web content may lead to an
unexpected process crash (bsc#1259941).
* CVE-2025-46299: processing maliciously crafted web content may disclose
internal states of an app (bsc#1259940).
* CVE-2026-20608: processing maliciously crafted web content may lead to an
unexpected process crash (bsc#1259939).
* CVE-2026-20635: processing maliciously crafted web content may lead to an
unexpected process crash (bsc#1259938).
* CVE-2026-20636: processing maliciously crafted web content may lead to an
unexpected process crash (bsc#1259937).
* CVE-2026-20644: processing maliciously crafted web content may lead to an
unexpected process crash (bsc#1259936).
* CVE-2026-20652: a remote attacker may be able to cause a denial-of-service
(bsc#1259935).
* CVE-2026-20676: a website may be able to track users through web extensions
(bsc#1259934).

Changelog:

* Make scrolling with touch input smoother for small movements.
* Fix estimated load progress of downloads when Content-Length value is wrong.
* Ensure that "scrollend" events are correctly emitted after scroll
animations.
* Fix several crashes and rendering issues.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-1150=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1150=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1150=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1150=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1150=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1150=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1150=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1150=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1150=1

## Package List:

* openSUSE Leap 15.4 (noarch)
* WebKitGTK-4.1-lang-2.52.0-150400.4.137.3
* WebKitGTK-4.0-lang-2.52.0-150400.4.137.3
* WebKitGTK-6.0-lang-2.52.0-150400.4.137.3
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* webkitgtk-6_0-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* webkit-jsc-4-debuginfo-2.52.0-150400.4.137.3
* typelib-1_0-JavaScriptCore-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-2.52.0-150400.4.137.3
* webkit-jsc-6.0-2.52.0-150400.4.137.3
* typelib-1_0-JavaScriptCore-4_1-2.52.0-150400.4.137.3
* typelib-1_0-JavaScriptCore-6_0-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* webkit-jsc-6.0-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_1-2.52.0-150400.4.137.3
* webkit2gtk3-minibrowser-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk4-debugsource-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-debuginfo-2.52.0-150400.4.137.3
* typelib-1_0-WebKitWebProcessExtension-6_0-2.52.0-150400.4.137.3
* webkit-jsc-4.1-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-devel-2.52.0-150400.4.137.3
* webkit2gtk3-minibrowser-2.52.0-150400.4.137.3
* webkit2gtk4-minibrowser-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-2.52.0-150400.4.137.3
* webkit2gtk4-minibrowser-debuginfo-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-2.52.0-150400.4.137.3
* webkit-jsc-4-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-minibrowser-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk3-debugsource-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-minibrowser-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_1-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_0-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* typelib-1_0-WebKit-6_0-2.52.0-150400.4.137.3
* webkit-jsc-4.1-2.52.0-150400.4.137.3
* webkit2gtk4-devel-2.52.0-150400.4.137.3
* webkitgtk-6_0-injected-bundles-2.52.0-150400.4.137.3
* webkit2gtk3-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* openSUSE Leap 15.4 (x86_64)
* libjavascriptcoregtk-4_1-0-32bit-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-32bit-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-32bit-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-32bit-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-32bit-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-32bit-2.52.0-150400.4.137.3
* openSUSE Leap 15.4 (aarch64_ilp32)
* libwebkit2gtk-4_1-0-64bit-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-64bit-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-64bit-debuginfo-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-64bit-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-64bit-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-64bit-2.52.0-150400.4.137.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* WebKitGTK-4.1-lang-2.52.0-150400.4.137.3
* WebKitGTK-4.0-lang-2.52.0-150400.4.137.3
* WebKitGTK-6.0-lang-2.52.0-150400.4.137.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* typelib-1_0-JavaScriptCore-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-2.52.0-150400.4.137.3
* typelib-1_0-JavaScriptCore-4_1-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_1-2.52.0-150400.4.137.3
* webkit2gtk4-debugsource-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-2.52.0-150400.4.137.3
* webkit2gtk3-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_1-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-debuginfo-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_0-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* webkitgtk-6_0-injected-bundles-2.52.0-150400.4.137.3
* webkit2gtk3-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* WebKitGTK-4.1-lang-2.52.0-150400.4.137.3
* WebKitGTK-4.0-lang-2.52.0-150400.4.137.3
* WebKitGTK-6.0-lang-2.52.0-150400.4.137.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* typelib-1_0-JavaScriptCore-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-2.52.0-150400.4.137.3
* typelib-1_0-JavaScriptCore-4_1-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_1-2.52.0-150400.4.137.3
* webkit2gtk4-debugsource-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-2.52.0-150400.4.137.3
* webkit2gtk3-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_1-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-debuginfo-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_0-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* webkitgtk-6_0-injected-bundles-2.52.0-150400.4.137.3
* webkit2gtk3-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* WebKitGTK-4.1-lang-2.52.0-150400.4.137.3
* WebKitGTK-4.0-lang-2.52.0-150400.4.137.3
* WebKitGTK-6.0-lang-2.52.0-150400.4.137.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* typelib-1_0-JavaScriptCore-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-2.52.0-150400.4.137.3
* typelib-1_0-JavaScriptCore-4_1-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_1-2.52.0-150400.4.137.3
* webkit2gtk4-debugsource-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-2.52.0-150400.4.137.3
* webkit2gtk3-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_1-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-debuginfo-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_0-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* webkitgtk-6_0-injected-bundles-2.52.0-150400.4.137.3
* webkit2gtk3-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* WebKitGTK-4.1-lang-2.52.0-150400.4.137.3
* WebKitGTK-4.0-lang-2.52.0-150400.4.137.3
* WebKitGTK-6.0-lang-2.52.0-150400.4.137.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* typelib-1_0-JavaScriptCore-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-2.52.0-150400.4.137.3
* typelib-1_0-JavaScriptCore-4_1-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_1-2.52.0-150400.4.137.3
* webkit2gtk4-debugsource-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-2.52.0-150400.4.137.3
* webkit2gtk3-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_1-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-debuginfo-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_0-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* webkitgtk-6_0-injected-bundles-2.52.0-150400.4.137.3
* webkit2gtk3-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* WebKitGTK-4.1-lang-2.52.0-150400.4.137.3
* WebKitGTK-4.0-lang-2.52.0-150400.4.137.3
* WebKitGTK-6.0-lang-2.52.0-150400.4.137.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* typelib-1_0-JavaScriptCore-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-2.52.0-150400.4.137.3
* typelib-1_0-JavaScriptCore-4_1-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_1-2.52.0-150400.4.137.3
* webkit2gtk4-debugsource-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-2.52.0-150400.4.137.3
* webkit2gtk3-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_1-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-debuginfo-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_0-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* webkitgtk-6_0-injected-bundles-2.52.0-150400.4.137.3
* webkit2gtk3-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* WebKitGTK-4.1-lang-2.52.0-150400.4.137.3
* WebKitGTK-4.0-lang-2.52.0-150400.4.137.3
* WebKitGTK-6.0-lang-2.52.0-150400.4.137.3
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* typelib-1_0-JavaScriptCore-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-2.52.0-150400.4.137.3
* typelib-1_0-JavaScriptCore-4_1-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_1-2.52.0-150400.4.137.3
* webkit2gtk4-debugsource-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-2.52.0-150400.4.137.3
* webkit2gtk3-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_1-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-debuginfo-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_0-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* webkitgtk-6_0-injected-bundles-2.52.0-150400.4.137.3
* webkit2gtk3-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* WebKitGTK-4.1-lang-2.52.0-150400.4.137.3
* WebKitGTK-4.0-lang-2.52.0-150400.4.137.3
* WebKitGTK-6.0-lang-2.52.0-150400.4.137.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* typelib-1_0-JavaScriptCore-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-2.52.0-150400.4.137.3
* typelib-1_0-JavaScriptCore-4_1-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_1-2.52.0-150400.4.137.3
* webkit2gtk4-debugsource-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-2.52.0-150400.4.137.3
* webkit2gtk3-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_1-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-debuginfo-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_0-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* webkitgtk-6_0-injected-bundles-2.52.0-150400.4.137.3
* webkit2gtk3-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* WebKitGTK-4.1-lang-2.52.0-150400.4.137.3
* WebKitGTK-4.0-lang-2.52.0-150400.4.137.3
* WebKitGTK-6.0-lang-2.52.0-150400.4.137.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* typelib-1_0-JavaScriptCore-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-2.52.0-150400.4.137.3
* typelib-1_0-JavaScriptCore-4_1-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-6_0-1-debuginfo-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_1-2.52.0-150400.4.137.3
* webkit2gtk4-debugsource-2.52.0-150400.4.137.3
* libwebkit2gtk-4_0-37-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-2.52.0-150400.4.137.3
* libwebkit2gtk-4_1-0-2.52.0-150400.4.137.3
* webkit2gtk3-soup2-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2WebExtension-4_0-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_0-18-debuginfo-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-2.52.0-150400.4.137.3
* libjavascriptcoregtk-4_1-0-debuginfo-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-2.52.0-150400.4.137.3
* webkit2gtk3-debugsource-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_1-2.52.0-150400.4.137.3
* libwebkitgtk-6_0-4-debuginfo-2.52.0-150400.4.137.3
* typelib-1_0-WebKit2-4_0-2.52.0-150400.4.137.3
* webkit2gtk-4_0-injected-bundles-debuginfo-2.52.0-150400.4.137.3
* webkitgtk-6_0-injected-bundles-2.52.0-150400.4.137.3
* webkit2gtk3-devel-2.52.0-150400.4.137.3
* webkit2gtk-4_1-injected-bundles-debuginfo-2.52.0-150400.4.137.3

## References:

* https://www.suse.com/security/cve/CVE-2023-42843.html
* https://www.suse.com/security/cve/CVE-2023-43010.html
* https://www.suse.com/security/cve/CVE-2024-54658.html
* https://www.suse.com/security/cve/CVE-2025-13502.html
* https://www.suse.com/security/cve/CVE-2025-31223.html
* https://www.suse.com/security/cve/CVE-2025-31277.html
* https://www.suse.com/security/cve/CVE-2025-43213.html
* https://www.suse.com/security/cve/CVE-2025-43214.html
* https://www.suse.com/security/cve/CVE-2025-43368.html
* https://www.suse.com/security/cve/CVE-2025-43419.html
* https://www.suse.com/security/cve/CVE-2025-43433.html
* https://www.suse.com/security/cve/CVE-2025-43434.html
* https://www.suse.com/security/cve/CVE-2025-43438.html
* https://www.suse.com/security/cve/CVE-2025-43440.html
* https://www.suse.com/security/cve/CVE-2025-43441.html
* https://www.suse.com/security/cve/CVE-2025-43443.html
* https://www.suse.com/security/cve/CVE-2025-43457.html
* https://www.suse.com/security/cve/CVE-2025-43511.html
* https://www.suse.com/security/cve/CVE-2025-46299.html
* https://www.suse.com/security/cve/CVE-2026-20608.html
* https://www.suse.com/security/cve/CVE-2026-20635.html
* https://www.suse.com/security/cve/CVE-2026-20636.html
* https://www.suse.com/security/cve/CVE-2026-20644.html
* https://www.suse.com/security/cve/CVE-2026-20652.html
* https://www.suse.com/security/cve/CVE-2026-20676.html
* https://bugzilla.suse.com/show_bug.cgi?id=1259934
* https://bugzilla.suse.com/show_bug.cgi?id=1259935
* https://bugzilla.suse.com/show_bug.cgi?id=1259936
* https://bugzilla.suse.com/show_bug.cgi?id=1259937
* https://bugzilla.suse.com/show_bug.cgi?id=1259938
* https://bugzilla.suse.com/show_bug.cgi?id=1259939
* https://bugzilla.suse.com/show_bug.cgi?id=1259940
* https://bugzilla.suse.com/show_bug.cgi?id=1259941
* https://bugzilla.suse.com/show_bug.cgi?id=1259942
* https://bugzilla.suse.com/show_bug.cgi?id=1259943
* https://bugzilla.suse.com/show_bug.cgi?id=1259944
* https://bugzilla.suse.com/show_bug.cgi?id=1259945
* https://bugzilla.suse.com/show_bug.cgi?id=1259946
* https://bugzilla.suse.com/show_bug.cgi?id=1259947
* https://bugzilla.suse.com/show_bug.cgi?id=1259948
* https://bugzilla.suse.com/show_bug.cgi?id=1259949
* https://bugzilla.suse.com/show_bug.cgi?id=1259950



openSUSE-SU-2026:10449-1: moderate: gsl-2.8-5.1 on GA media


# gsl-2.8-5.1 on GA media

Announcement ID: openSUSE-SU-2026:10449-1
Rating: moderate

Cross-References:

* CVE-2024-50610

CVSS scores:

* CVE-2024-50610 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50610 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the gsl-2.8-5.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* gsl 2.8-5.1
* gsl-devel 2.8-5.1
* gsl-doc 2.8-5.1
* gsl-examples 2.8-5.1
* libgsl28 2.8-5.1
* libgslcblas0 2.8-5.1

## References:

* https://www.suse.com/security/cve/CVE-2024-50610.html



openSUSE-SU-2026:10447-1: moderate: MozillaThunderbird-140.9.0-1.1 on GA media


# MozillaThunderbird-140.9.0-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10447-1
Rating: moderate

Cross-References:

* CVE-2025-59375
* CVE-2026-3889
* CVE-2026-4371
* CVE-2026-4684
* CVE-2026-4685
* CVE-2026-4686
* CVE-2026-4687
* CVE-2026-4688
* CVE-2026-4689
* CVE-2026-4690
* CVE-2026-4691
* CVE-2026-4692
* CVE-2026-4693
* CVE-2026-4694
* CVE-2026-4695
* CVE-2026-4696
* CVE-2026-4697
* CVE-2026-4698
* CVE-2026-4699
* CVE-2026-4700
* CVE-2026-4701
* CVE-2026-4702
* CVE-2026-4704
* CVE-2026-4705
* CVE-2026-4706
* CVE-2026-4707
* CVE-2026-4708
* CVE-2026-4709
* CVE-2026-4710
* CVE-2026-4711
* CVE-2026-4712
* CVE-2026-4713
* CVE-2026-4714
* CVE-2026-4715
* CVE-2026-4716
* CVE-2026-4717
* CVE-2026-4718
* CVE-2026-4719
* CVE-2026-4720
* CVE-2026-4721

CVSS scores:

* CVE-2025-59375 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59375 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-3889 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2026-4371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-4684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4685 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4686 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4687 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-4688 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-4689 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-4690 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-4691 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4692 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-4693 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4694 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4695 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4696 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4697 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4698 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4699 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4700 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2026-4701 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4702 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4704 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-4705 ( SUSE ): 5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4706 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4707 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4708 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4709 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4710 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4711 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4712 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2026-4713 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4714 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4715 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4716 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4717 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4718 ( SUSE ): 5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4719 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4720 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4721 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Tumbleweed

An update that solves 40 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the MozillaThunderbird-140.9.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* MozillaThunderbird 140.9.0-1.1
* MozillaThunderbird-openpgp-librnp 140.9.0-1.1
* MozillaThunderbird-translations-common 140.9.0-1.1
* MozillaThunderbird-translations-other 140.9.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-59375.html
* https://www.suse.com/security/cve/CVE-2026-3889.html
* https://www.suse.com/security/cve/CVE-2026-4371.html
* https://www.suse.com/security/cve/CVE-2026-4684.html
* https://www.suse.com/security/cve/CVE-2026-4685.html
* https://www.suse.com/security/cve/CVE-2026-4686.html
* https://www.suse.com/security/cve/CVE-2026-4687.html
* https://www.suse.com/security/cve/CVE-2026-4688.html
* https://www.suse.com/security/cve/CVE-2026-4689.html
* https://www.suse.com/security/cve/CVE-2026-4690.html
* https://www.suse.com/security/cve/CVE-2026-4691.html
* https://www.suse.com/security/cve/CVE-2026-4692.html
* https://www.suse.com/security/cve/CVE-2026-4693.html
* https://www.suse.com/security/cve/CVE-2026-4694.html
* https://www.suse.com/security/cve/CVE-2026-4695.html
* https://www.suse.com/security/cve/CVE-2026-4696.html
* https://www.suse.com/security/cve/CVE-2026-4697.html
* https://www.suse.com/security/cve/CVE-2026-4698.html
* https://www.suse.com/security/cve/CVE-2026-4699.html
* https://www.suse.com/security/cve/CVE-2026-4700.html
* https://www.suse.com/security/cve/CVE-2026-4701.html
* https://www.suse.com/security/cve/CVE-2026-4702.html
* https://www.suse.com/security/cve/CVE-2026-4704.html
* https://www.suse.com/security/cve/CVE-2026-4705.html
* https://www.suse.com/security/cve/CVE-2026-4706.html
* https://www.suse.com/security/cve/CVE-2026-4707.html
* https://www.suse.com/security/cve/CVE-2026-4708.html
* https://www.suse.com/security/cve/CVE-2026-4709.html
* https://www.suse.com/security/cve/CVE-2026-4710.html
* https://www.suse.com/security/cve/CVE-2026-4711.html
* https://www.suse.com/security/cve/CVE-2026-4712.html
* https://www.suse.com/security/cve/CVE-2026-4713.html
* https://www.suse.com/security/cve/CVE-2026-4714.html
* https://www.suse.com/security/cve/CVE-2026-4715.html
* https://www.suse.com/security/cve/CVE-2026-4716.html
* https://www.suse.com/security/cve/CVE-2026-4717.html
* https://www.suse.com/security/cve/CVE-2026-4718.html
* https://www.suse.com/security/cve/CVE-2026-4719.html
* https://www.suse.com/security/cve/CVE-2026-4720.html
* https://www.suse.com/security/cve/CVE-2026-4721.html



openSUSE-SU-2026:10456-1: moderate: tailscale-1.96.4-1.1 on GA media


# tailscale-1.96.4-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10456-1
Rating: moderate

Cross-References:

* CVE-2026-33747

CVSS scores:

* CVE-2026-33747 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33747 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the tailscale-1.96.4-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* tailscale 1.96.4-1.1
* tailscale-bash-completion 1.96.4-1.1
* tailscale-fish-completion 1.96.4-1.1
* tailscale-zsh-completion 1.96.4-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-33747.html



openSUSE-SU-2026:10452-1: moderate: libjavamapscript-8.6.1-1.1 on GA media


# libjavamapscript-8.6.1-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10452-1
Rating: moderate

Cross-References:

* CVE-2026-33721

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the libjavamapscript-8.6.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libjavamapscript 8.6.1-1.1
* libmapserver2 8.6.1-1.1
* mapserver 8.6.1-1.1
* mapserver-devel 8.6.1-1.1
* perl-mapscript 8.6.1-1.1
* php-mapscriptng 8.6.1-1.1
* python311-mapserver 8.6.1-1.1
* python313-mapserver 8.6.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-33721.html



openSUSE-SU-2026:10455-1: moderate: python311-requests-2.33.0-1.1 on GA media


# python311-requests-2.33.0-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10455-1
Rating: moderate

Cross-References:

* CVE-2026-25645

CVSS scores:

* CVE-2026-25645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-25645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python311-requests-2.33.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311-requests 2.33.0-1.1
* python313-requests 2.33.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25645.html



openSUSE-SU-2026:10448-1: moderate: bind-9.20.21-1.1 on GA media


# bind-9.20.21-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10448-1
Rating: moderate

Cross-References:

* CVE-2026-1519
* CVE-2026-3104
* CVE-2026-3119
* CVE-2026-3591

CVSS scores:

* CVE-2026-1519 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-1519 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-3104 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-3104 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-3119 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-3119 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-3591 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-3591 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 4 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the bind-9.20.21-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* bind 9.20.21-1.1
* bind-doc 9.20.21-1.1
* bind-modules-bdbhpt 9.20.21-1.1
* bind-modules-generic 9.20.21-1.1
* bind-modules-ldap 9.20.21-1.1
* bind-modules-mysql 9.20.21-1.1
* bind-modules-perl 9.20.21-1.1
* bind-modules-sqlite3 9.20.21-1.1
* bind-utils 9.20.21-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-1519.html
* https://www.suse.com/security/cve/CVE-2026-3104.html
* https://www.suse.com/security/cve/CVE-2026-3119.html
* https://www.suse.com/security/cve/CVE-2026-3591.html



openSUSE-SU-2026:10450-1: moderate: incus-6.23-1.1 on GA media


# incus-6.23-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10450-1
Rating: moderate

Cross-References:

* CVE-2026-33542
* CVE-2026-33711
* CVE-2026-33743
* CVE-2026-33897
* CVE-2026-33898
* CVE-2026-33945

CVSS scores:

* CVE-2026-33542 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:N
* CVE-2026-33897 ( SUSE ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-33945 ( SUSE ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Affected Products:

* openSUSE Tumbleweed

An update that solves 6 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the incus-6.23-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* incus 6.23-1.1
* incus-bash-completion 6.23-1.1
* incus-fish-completion 6.23-1.1
* incus-tools 6.23-1.1
* incus-zsh-completion 6.23-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-33542.html
* https://www.suse.com/security/cve/CVE-2026-33711.html
* https://www.suse.com/security/cve/CVE-2026-33743.html
* https://www.suse.com/security/cve/CVE-2026-33897.html
* https://www.suse.com/security/cve/CVE-2026-33898.html
* https://www.suse.com/security/cve/CVE-2026-33945.html



openSUSE-SU-2026:10453-1: moderate: libpolkit-agent-1-0-127-3.1 on GA media


# libpolkit-agent-1-0-127-3.1 on GA media

Announcement ID: openSUSE-SU-2026:10453-1
Rating: moderate

Cross-References:

* CVE-2025-7519
* CVE-2026-4897

CVSS scores:

* CVE-2025-7519 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-7519 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-4897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-4897 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the libpolkit-agent-1-0-127-3.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libpolkit-agent-1-0 127-3.1
* libpolkit-agent-1-0-32bit 127-3.1
* libpolkit-gobject-1-0 127-3.1
* libpolkit-gobject-1-0-32bit 127-3.1
* pkexec 127-3.1
* polkit 127-3.1
* polkit-devel 127-3.1
* polkit-doc 127-3.1
* typelib-1_0-Polkit-1_0 127-3.1

## References:

* https://www.suse.com/security/cve/CVE-2025-7519.html
* https://www.suse.com/security/cve/CVE-2026-4897.html



openSUSE-SU-2026:10451-1: moderate: libpng16-16-1.6.56-1.1 on GA media


# libpng16-16-1.6.56-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10451-1
Rating: moderate

Cross-References:

* CVE-2026-33416
* CVE-2026-33636

CVSS scores:

* CVE-2026-33416 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33416 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33636 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-33636 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the libpng16-16-1.6.56-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libpng16-16 1.6.56-1.1
* libpng16-16-32bit 1.6.56-1.1
* libpng16-16-x86-64-v3 1.6.56-1.1
* libpng16-compat-devel 1.6.56-1.1
* libpng16-compat-devel-32bit 1.6.56-1.1
* libpng16-compat-devel-x86-64-v3 1.6.56-1.1
* libpng16-devel 1.6.56-1.1
* libpng16-devel-32bit 1.6.56-1.1
* libpng16-devel-x86-64-v3 1.6.56-1.1
* libpng16-tools 1.6.56-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-33416.html
* https://www.suse.com/security/cve/CVE-2026-33636.html



SUSE-SU-2026:1153-1: important: Security update for perl-XML-Parser


# Security update for perl-XML-Parser

Announcement ID: SUSE-SU-2026:1153-1
Release Date: 2026-03-31T08:40:45Z
Rating: important
References:

* bsc#1259901
* bsc#1259902

Cross-References:

* CVE-2006-10002
* CVE-2006-10003

CVSS scores:

* CVE-2006-10002 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2006-10002 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2006-10002 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2006-10002 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2006-10003 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2006-10003 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2006-10003 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2006-10003 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves two vulnerabilities can now be installed.

## Description:

This update for perl-XML-Parser fixes the following issues:

* CVE-2006-10002: heap buffer overflow in `parse_stream` when processing UTF-8
input streams (bsc#1259901).
* CVE-2006-10003: off-by-one heap buffer overflow in `st_serial_stack`
(bsc#1259902).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1153=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1153=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1153=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1153=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1153=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1153=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1153=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1153=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1153=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1153=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1153=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1153=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* perl-XML-Parser-debuginfo-2.44-150000.3.3.1
* perl-XML-Parser-debugsource-2.44-150000.3.3.1
* perl-XML-Parser-2.44-150000.3.3.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* perl-XML-Parser-debuginfo-2.44-150000.3.3.1
* perl-XML-Parser-debugsource-2.44-150000.3.3.1
* perl-XML-Parser-2.44-150000.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* perl-XML-Parser-debuginfo-2.44-150000.3.3.1
* perl-XML-Parser-debugsource-2.44-150000.3.3.1
* perl-XML-Parser-2.44-150000.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* perl-XML-Parser-debuginfo-2.44-150000.3.3.1
* perl-XML-Parser-debugsource-2.44-150000.3.3.1
* perl-XML-Parser-2.44-150000.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* perl-XML-Parser-debuginfo-2.44-150000.3.3.1
* perl-XML-Parser-debugsource-2.44-150000.3.3.1
* perl-XML-Parser-2.44-150000.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* perl-XML-Parser-debuginfo-2.44-150000.3.3.1
* perl-XML-Parser-debugsource-2.44-150000.3.3.1
* perl-XML-Parser-2.44-150000.3.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* perl-XML-Parser-debuginfo-2.44-150000.3.3.1
* perl-XML-Parser-debugsource-2.44-150000.3.3.1
* perl-XML-Parser-2.44-150000.3.3.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* perl-XML-Parser-debuginfo-2.44-150000.3.3.1
* perl-XML-Parser-debugsource-2.44-150000.3.3.1
* perl-XML-Parser-2.44-150000.3.3.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* perl-XML-Parser-debuginfo-2.44-150000.3.3.1
* perl-XML-Parser-debugsource-2.44-150000.3.3.1
* perl-XML-Parser-2.44-150000.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* perl-XML-Parser-debuginfo-2.44-150000.3.3.1
* perl-XML-Parser-debugsource-2.44-150000.3.3.1
* perl-XML-Parser-2.44-150000.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* perl-XML-Parser-debuginfo-2.44-150000.3.3.1
* perl-XML-Parser-debugsource-2.44-150000.3.3.1
* perl-XML-Parser-2.44-150000.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* perl-XML-Parser-debuginfo-2.44-150000.3.3.1
* perl-XML-Parser-debugsource-2.44-150000.3.3.1
* perl-XML-Parser-2.44-150000.3.3.1

## References:

* https://www.suse.com/security/cve/CVE-2006-10002.html
* https://www.suse.com/security/cve/CVE-2006-10003.html
* https://bugzilla.suse.com/show_bug.cgi?id=1259901
* https://bugzilla.suse.com/show_bug.cgi?id=1259902



openSUSE-SU-2026:0111-1: important: Security update for tinyproxy


openSUSE Security Update: Security update for tinyproxy
_______________________________

Announcement ID: openSUSE-SU-2026:0111-1
Rating: important
References: #1261024
Cross-References: CVE-2026-3945
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________

An update that fixes one vulnerability is now available.

Description:

This update for tinyproxy fixes the following issues:

- CVE-2026-3945: Fixed denial of service by unauthenticated remote
attacker (boo#1261024)

- Update to release 1.11.3
* conf: add BasicAuthRealm feature
* basic auth: fix error status 401 vs 407
* tinyproxy.conf.5: explain what a site_spec looks like
* tinyproxy.conf.5: add an IPv6 example to allow/deny section
* reqs: fix integer overflow in port number processing

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP7:

zypper in -t patch openSUSE-2026-111=1

Package List:

- openSUSE Backports SLE-15-SP7 (aarch64 i586 ppc64le s390x x86_64):

tinyproxy-1.11.3-bp157.2.6.1

References:

https://www.suse.com/security/cve/CVE-2026-3945.html
https://bugzilla.suse.com/1261024



SUSE-SU-2026:1160-1: important: Security update for freerdp


# Security update for freerdp

Announcement ID: SUSE-SU-2026:1160-1
Release Date: 2026-03-31T15:04:04Z
Rating: important
References:

* bsc#1258979
* bsc#1258982
* bsc#1258985
* bsc#1259653
* bsc#1259679
* bsc#1259686

Cross-References:

* CVE-2026-26271
* CVE-2026-26955
* CVE-2026-26965
* CVE-2026-31806
* CVE-2026-31883
* CVE-2026-31885

CVSS scores:

* CVE-2026-26271 ( NVD ): 5.5
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-26271 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-26955 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-26955 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-26955 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-26965 ( SUSE ): 8.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-26965 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-26965 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-31806 ( SUSE ): 7.5
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31806 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-31806 ( NVD ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-31806 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31883 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-31883 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-31883 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31883 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-31885 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-31885 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
* CVE-2026-31885 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2026-31885 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves six vulnerabilities can now be installed.

## Description:

This update for freerdp fixes the following issues:

* CVE-2026-26271: Buffer Overread in FreeRDP Icon Processing (bsc#1258979).
* CVE-2026-26955: Out-of-bounds Write in freerdp (bsc#1258982).
* CVE-2026-26965: Out-of-bounds Write in freerdp (bsc#1258985).
* CVE-2026-31806: improper validation of server messages can lead to a heap
buffer overflow and arbitrary code execution (bsc#1259653).
* CVE-2026-31883: crafted RDPSND audio format and wave data can cause a heap
buffer overflow write (bsc#1259679).
* CVE-2026-31885: unchecked predictor can lead to an out-of-bounds read
(bsc#1259686).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1160=1 openSUSE-SLE-15.6-2026-1160=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-1160=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* freerdp-proxy-2.11.2-150600.4.18.1
* freerdp-devel-2.11.2-150600.4.18.1
* freerdp-server-debuginfo-2.11.2-150600.4.18.1
* freerdp-wayland-2.11.2-150600.4.18.1
* uwac0-0-devel-2.11.2-150600.4.18.1
* freerdp-wayland-debuginfo-2.11.2-150600.4.18.1
* libwinpr2-2-2.11.2-150600.4.18.1
* libwinpr2-2-debuginfo-2.11.2-150600.4.18.1
* libuwac0-0-2.11.2-150600.4.18.1
* freerdp-proxy-debuginfo-2.11.2-150600.4.18.1
* winpr-devel-2.11.2-150600.4.18.1
* libuwac0-0-debuginfo-2.11.2-150600.4.18.1
* freerdp-debuginfo-2.11.2-150600.4.18.1
* freerdp-debugsource-2.11.2-150600.4.18.1
* libfreerdp2-2-2.11.2-150600.4.18.1
* freerdp-2.11.2-150600.4.18.1
* freerdp-server-2.11.2-150600.4.18.1
* libfreerdp2-2-debuginfo-2.11.2-150600.4.18.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
* uwac0-0-devel-2.11.2-150600.4.18.1
* freerdp-debuginfo-2.11.2-150600.4.18.1
* freerdp-debugsource-2.11.2-150600.4.18.1

## References:

* https://www.suse.com/security/cve/CVE-2026-26271.html
* https://www.suse.com/security/cve/CVE-2026-26955.html
* https://www.suse.com/security/cve/CVE-2026-26965.html
* https://www.suse.com/security/cve/CVE-2026-31806.html
* https://www.suse.com/security/cve/CVE-2026-31883.html
* https://www.suse.com/security/cve/CVE-2026-31885.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258979
* https://bugzilla.suse.com/show_bug.cgi?id=1258982
* https://bugzilla.suse.com/show_bug.cgi?id=1258985
* https://bugzilla.suse.com/show_bug.cgi?id=1259653
* https://bugzilla.suse.com/show_bug.cgi?id=1259679
* https://bugzilla.suse.com/show_bug.cgi?id=1259686