SUSE-SU-2026:0810-1: low: Security update for wireshark
SUSE-SU-2026:0811-1: important: Security update for libsoup2
SUSE-SU-2026:0816-1: important: Security update for virtiofsd
SUSE-SU-2026:0813-1: moderate: Security update for mozilla-nss
SUSE-SU-2026:0821-1: moderate: Security update for python-Django
openSUSE-SU-2026:10286-1: moderate: ruby4.0-rubygem-rack-2.2-2.2.22-1.1 on GA media
openSUSE-SU-2026:10281-1: moderate: mchange-commons-0.4.0-1.1 on GA media
openSUSE-SU-2026:10287-1: moderate: sdbootutil-1+git20260303.90d816d-1.1 on GA media
openSUSE-SU-2026:10285-1: moderate: python311-pillow-heif-1.3.0-1.1 on GA media
openSUSE-SU-2026:10279-1: moderate: c3p0-0.12.0-1.1 on GA media
openSUSE-SU-2026:10283-1: moderate: python313-Django6-6.0.3-1.1 on GA media
openSUSE-SU-2026:10284-1: moderate: python311-PyPDF2-2.11.1-5.1 on GA media
openSUSE-SU-2026:10280-1: moderate: incus-6.22-1.1 on GA media
SUSE-SU-2026:0829-1: moderate: Security update for gnutls
SUSE-SU-2026:0830-1: important: Security update for ocaml
SUSE-SU-2026:0825-1: low: Security update for php-composer2
SUSE-SU-2026:0824-1: moderate: Security update for openCryptoki
SUSE-SU-2026:0826-1: moderate: Security update for expat
SUSE-SU-2026:0828-1: moderate: Security update for python-Authlib
SUSE-SU-2026:0831-1: important: Security update for openvpn
openSUSE-SU-2026:0071-1: important: Security update for roundcubemail
openSUSE-SU-2026:0070-1: important: Security update for roundcubemail
openSUSE-SU-2026:0069-1: important: Security update for python-nltk
openSUSE-SU-2026:20301-1: important: Security update for go1.25-openssl
openSUSE-SU-2026:20298-1: moderate: Security update for assertj-core
openSUSE-SU-2026:10282-1: moderate: python311-Django4-4.2.29-1.1 on GA media
openSUSE-SU-2026:10278-1: moderate: ImageMagick-7.1.2.15-2.1 on GA media
SUSE-SU-2026:0810-1: low: Security update for wireshark
# Security update for wireshark
Announcement ID: SUSE-SU-2026:0810-1
Release Date: 2026-03-04T19:33:44Z
Rating: low
References:
* bsc#1258907
Cross-References:
* CVE-2026-3201
CVSS scores:
* CVE-2026-3201 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-3201 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-3201 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-3201 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
An update that solves one vulnerability can now be installed.
## Description:
This update for wireshark fixes the following issue:
* CVE-2026-3201: USB HID protocol dissector memory exhaustion (bsc#1258907).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-810=1 openSUSE-SLE-15.6-2026-810=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libwireshark17-4.2.14-150600.18.38.1
* wireshark-debuginfo-4.2.14-150600.18.38.1
* libwiretap14-4.2.14-150600.18.38.1
* wireshark-ui-qt-debuginfo-4.2.14-150600.18.38.1
* libwsutil15-debuginfo-4.2.14-150600.18.38.1
* libwireshark17-debuginfo-4.2.14-150600.18.38.1
* libwiretap14-debuginfo-4.2.14-150600.18.38.1
* wireshark-devel-4.2.14-150600.18.38.1
* wireshark-ui-qt-4.2.14-150600.18.38.1
* wireshark-4.2.14-150600.18.38.1
* wireshark-debugsource-4.2.14-150600.18.38.1
* libwsutil15-4.2.14-150600.18.38.1
## References:
* https://www.suse.com/security/cve/CVE-2026-3201.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258907
SUSE-SU-2026:0811-1: important: Security update for libsoup2
# Security update for libsoup2
Announcement ID: SUSE-SU-2026:0811-1
Release Date: 2026-03-05T03:05:33Z
Rating: important
References:
* bsc#1257398
* bsc#1257441
* bsc#1257597
Cross-References:
* CVE-2026-1467
* CVE-2026-1539
* CVE-2026-1760
CVSS scores:
* CVE-2026-1467 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
* CVE-2026-1467 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-1467 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2026-1539 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N
* CVE-2026-1539 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
* CVE-2026-1539 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
* CVE-2026-1760 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2026-1760 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
* CVE-2026-1760 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves three vulnerabilities can now be installed.
## Description:
This update for libsoup2 fixes the following issues:
* CVE-2026-1467: lack of input sanitization can lead to unintended or
unauthorized HTTP requests (bsc#1257398).
* CVE-2026-1539: proxy authentication credentials leaked via the Proxy-
Authorization header when handling HTTP redirects (bsc#1257441).
* CVE-2026-1760: improper handling of HTTP requests combining certain headers
by SoupServer can lead to HTTP request smuggling and potential DoS
(bsc#1257597).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-811=1 openSUSE-SLE-15.6-2026-811=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-811=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-811=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-811=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.30.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.30.1
* libsoup2-debugsource-2.74.3-150600.4.30.1
* libsoup-2_4-1-2.74.3-150600.4.30.1
* libsoup2-devel-2.74.3-150600.4.30.1
* openSUSE Leap 15.6 (x86_64)
* libsoup-2_4-1-32bit-2.74.3-150600.4.30.1
* libsoup2-devel-32bit-2.74.3-150600.4.30.1
* libsoup-2_4-1-32bit-debuginfo-2.74.3-150600.4.30.1
* openSUSE Leap 15.6 (noarch)
* libsoup2-lang-2.74.3-150600.4.30.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libsoup-2_4-1-64bit-debuginfo-2.74.3-150600.4.30.1
* libsoup2-devel-64bit-2.74.3-150600.4.30.1
* libsoup-2_4-1-64bit-2.74.3-150600.4.30.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.30.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.30.1
* libsoup2-debugsource-2.74.3-150600.4.30.1
* libsoup-2_4-1-2.74.3-150600.4.30.1
* libsoup2-devel-2.74.3-150600.4.30.1
* Basesystem Module 15-SP7 (noarch)
* libsoup2-lang-2.74.3-150600.4.30.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.30.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.30.1
* libsoup2-debugsource-2.74.3-150600.4.30.1
* libsoup-2_4-1-2.74.3-150600.4.30.1
* libsoup2-devel-2.74.3-150600.4.30.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* libsoup2-lang-2.74.3-150600.4.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.30.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.30.1
* libsoup2-debugsource-2.74.3-150600.4.30.1
* libsoup-2_4-1-2.74.3-150600.4.30.1
* libsoup2-devel-2.74.3-150600.4.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* libsoup2-lang-2.74.3-150600.4.30.1
## References:
* https://www.suse.com/security/cve/CVE-2026-1467.html
* https://www.suse.com/security/cve/CVE-2026-1539.html
* https://www.suse.com/security/cve/CVE-2026-1760.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257398
* https://bugzilla.suse.com/show_bug.cgi?id=1257441
* https://bugzilla.suse.com/show_bug.cgi?id=1257597
SUSE-SU-2026:0816-1: important: Security update for virtiofsd
# Security update for virtiofsd
Announcement ID: SUSE-SU-2026:0816-1
Release Date: 2026-03-05T09:51:05Z
Rating: important
References:
* bsc#1257912
Cross-References:
* CVE-2026-25727
CVSS scores:
* CVE-2026-25727 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25727 ( NVD ): 6.8
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-25727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for virtiofsd fixes the following issue:
* CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date
parser can lead to stack exhaustion (bsc#1257912).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-816=1 openSUSE-SLE-15.6-2026-816=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-816=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-816=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* virtiofsd-debugsource-1.10.1-150600.4.6.1
* virtiofsd-debuginfo-1.10.1-150600.4.6.1
* virtiofsd-1.10.1-150600.4.6.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* virtiofsd-debuginfo-1.10.1-150600.4.6.1
* virtiofsd-1.10.1-150600.4.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* virtiofsd-debuginfo-1.10.1-150600.4.6.1
* virtiofsd-1.10.1-150600.4.6.1
## References:
* https://www.suse.com/security/cve/CVE-2026-25727.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257912
SUSE-SU-2026:0813-1: moderate: Security update for mozilla-nss
# Security update for mozilla-nss
Announcement ID: SUSE-SU-2026:0813-1
Release Date: 2026-03-05T08:34:59Z
Rating: moderate
References:
* bsc#1258568
Cross-References:
* CVE-2026-2781
CVSS scores:
* CVE-2026-2781 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-2781 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-2781 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for mozilla-nss fixes the following issues:
Update to NSS 3.112.3:
* CVE-2026-2781: Avoid integer overflow in platform-independent ghash
(bsc#1258568)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-813=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-813=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-813=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-813=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-813=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-813=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-813=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-813=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-813=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-813=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-813=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-813=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-813=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-813=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-813=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-813=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-813=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-813=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* openSUSE Leap 15.4 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-32bit-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-32bit-debuginfo-3.112.3-150400.3.63.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* mozilla-nss-64bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-64bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-64bit-3.112.3-150400.3.63.1
* libfreebl3-64bit-3.112.3-150400.3.63.1
* mozilla-nss-64bit-3.112.3-150400.3.63.1
* libsoftokn3-64bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-64bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-64bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-64bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-64bit-3.112.3-150400.3.63.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* openSUSE Leap 15.6 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-32bit-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-32bit-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* Basesystem Module 15-SP7 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
## References:
* https://www.suse.com/security/cve/CVE-2026-2781.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258568
SUSE-SU-2026:0821-1: moderate: Security update for python-Django
# Security update for python-Django
Announcement ID: SUSE-SU-2026:0821-1
Release Date: 2026-03-05T11:43:16Z
Rating: moderate
References:
* bsc#1259142
Cross-References:
* CVE-2026-25674
CVSS scores:
* CVE-2026-25674 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-25674 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-25674 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for python-Django fixes the following issue:
* CVE-2026-25674: race condition can lead to potential incorrect permissions
on newly created file system objects (bsc#1259142).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-821=1 openSUSE-SLE-15.6-2026-821=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-821=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* python311-Django-4.2.11-150600.3.50.1
* SUSE Package Hub 15 15-SP7 (noarch)
* python311-Django-4.2.11-150600.3.50.1
## References:
* https://www.suse.com/security/cve/CVE-2026-25674.html
* https://bugzilla.suse.com/show_bug.cgi?id=1259142
openSUSE-SU-2026:10286-1: moderate: ruby4.0-rubygem-rack-2.2-2.2.22-1.1 on GA media
# ruby4.0-rubygem-rack-2.2-2.2.22-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10286-1
Rating: moderate
Cross-References:
* CVE-2013-0262
* CVE-2013-0263
* CVE-2015-3225
* CVE-2018-16471
* CVE-2019-16782
* CVE-2020-8184
* CVE-2022-30122
* CVE-2022-30123
* CVE-2022-44570
* CVE-2022-44571
* CVE-2022-44572
* CVE-2023-27530
* CVE-2023-27539
* CVE-2024-25126
* CVE-2024-26141
* CVE-2024-26146
* CVE-2025-25184
* CVE-2025-27111
* CVE-2025-27610
* CVE-2025-46727
* CVE-2025-59830
* CVE-2025-61770
* CVE-2025-61771
* CVE-2025-61772
* CVE-2025-61919
* CVE-2026-22860
* CVE-2026-25500
CVSS scores:
* CVE-2018-16471 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2019-16782 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2020-8184 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2022-30122 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-30123 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-44570 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-44571 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-44572 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-27530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-27539 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-25126 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26141 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26146 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-25184 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-25184 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-27111 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-27111 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-27610 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-27610 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-46727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-46727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-59830 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61770 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61770 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61771 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61771 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61772 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61772 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61919 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61919 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22860 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-22860 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-25500 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-25500 ( SUSE ): 4.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 27 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the ruby4.0-rubygem-rack-2.2-2.2.22-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* ruby4.0-rubygem-rack-2.2 2.2.22-1.1
## References:
* https://www.suse.com/security/cve/CVE-2013-0262.html
* https://www.suse.com/security/cve/CVE-2013-0263.html
* https://www.suse.com/security/cve/CVE-2015-3225.html
* https://www.suse.com/security/cve/CVE-2018-16471.html
* https://www.suse.com/security/cve/CVE-2019-16782.html
* https://www.suse.com/security/cve/CVE-2020-8184.html
* https://www.suse.com/security/cve/CVE-2022-30122.html
* https://www.suse.com/security/cve/CVE-2022-30123.html
* https://www.suse.com/security/cve/CVE-2022-44570.html
* https://www.suse.com/security/cve/CVE-2022-44571.html
* https://www.suse.com/security/cve/CVE-2022-44572.html
* https://www.suse.com/security/cve/CVE-2023-27530.html
* https://www.suse.com/security/cve/CVE-2023-27539.html
* https://www.suse.com/security/cve/CVE-2024-25126.html
* https://www.suse.com/security/cve/CVE-2024-26141.html
* https://www.suse.com/security/cve/CVE-2024-26146.html
* https://www.suse.com/security/cve/CVE-2025-25184.html
* https://www.suse.com/security/cve/CVE-2025-27111.html
* https://www.suse.com/security/cve/CVE-2025-27610.html
* https://www.suse.com/security/cve/CVE-2025-46727.html
* https://www.suse.com/security/cve/CVE-2025-59830.html
* https://www.suse.com/security/cve/CVE-2025-61770.html
* https://www.suse.com/security/cve/CVE-2025-61771.html
* https://www.suse.com/security/cve/CVE-2025-61772.html
* https://www.suse.com/security/cve/CVE-2025-61919.html
* https://www.suse.com/security/cve/CVE-2026-22860.html
* https://www.suse.com/security/cve/CVE-2026-25500.html
openSUSE-SU-2026:10281-1: moderate: mchange-commons-0.4.0-1.1 on GA media
# mchange-commons-0.4.0-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10281-1
Rating: moderate
Cross-References:
* CVE-2026-27727
CVSS scores:
* CVE-2026-27727 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-27727 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the mchange-commons-0.4.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* mchange-commons 0.4.0-1.1
* mchange-commons-javadoc 0.4.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-27727.html
openSUSE-SU-2026:10287-1: moderate: sdbootutil-1+git20260303.90d816d-1.1 on GA media
# sdbootutil-1+git20260303.90d816d-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10287-1
Rating: moderate
Cross-References:
* CVE-2026-25701
CVSS scores:
* CVE-2026-25701 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2026-25701 ( SUSE ): 7 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the sdbootutil-1+git20260303.90d816d-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* sdbootutil 1+git20260303.90d816d-1.1
* sdbootutil-bash-completion 1+git20260303.90d816d-1.1
* sdbootutil-dracut-measure-pcr 1+git20260303.90d816d-1.1
* sdbootutil-enroll 1+git20260303.90d816d-1.1
* sdbootutil-jeos-firstboot-enroll 1+git20260303.90d816d-1.1
* sdbootutil-kernel-install 1+git20260303.90d816d-1.1
* sdbootutil-snapper 1+git20260303.90d816d-1.1
* sdbootutil-tukit 1+git20260303.90d816d-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-25701.html
openSUSE-SU-2026:10285-1: moderate: python311-pillow-heif-1.3.0-1.1 on GA media
# python311-pillow-heif-1.3.0-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10285-1
Rating: moderate
Cross-References:
* CVE-2026-28231
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the python311-pillow-heif-1.3.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python311-pillow-heif 1.3.0-1.1
* python313-pillow-heif 1.3.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-28231.html
openSUSE-SU-2026:10279-1: moderate: c3p0-0.12.0-1.1 on GA media
# c3p0-0.12.0-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10279-1
Rating: moderate
Cross-References:
* CVE-2026-27727
CVSS scores:
* CVE-2026-27727 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-27727 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the c3p0-0.12.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* c3p0 0.12.0-1.1
* c3p0-javadoc 0.12.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-27727.html
openSUSE-SU-2026:10283-1: moderate: python313-Django6-6.0.3-1.1 on GA media
# python313-Django6-6.0.3-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10283-1
Rating: moderate
Cross-References:
* CVE-2026-25674
CVSS scores:
* CVE-2026-25674 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-25674 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the python313-Django6-6.0.3-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python313-Django6 6.0.3-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-25674.html
openSUSE-SU-2026:10284-1: moderate: python311-PyPDF2-2.11.1-5.1 on GA media
# python311-PyPDF2-2.11.1-5.1 on GA media
Announcement ID: openSUSE-SU-2026:10284-1
Rating: moderate
Cross-References:
* CVE-2026-27628
* CVE-2026-27888
CVSS scores:
* CVE-2026-27888 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-27888 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the python311-PyPDF2-2.11.1-5.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python311-PyPDF2 2.11.1-5.1
* python313-PyPDF2 2.11.1-5.1
## References:
* https://www.suse.com/security/cve/CVE-2026-27628.html
* https://www.suse.com/security/cve/CVE-2026-27888.html
openSUSE-SU-2026:10280-1: moderate: incus-6.22-1.1 on GA media
# incus-6.22-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10280-1
Rating: moderate
Cross-References:
* CVE-2026-23953
* CVE-2026-23954
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the incus-6.22-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* incus 6.22-1.1
* incus-bash-completion 6.22-1.1
* incus-fish-completion 6.22-1.1
* incus-tools 6.22-1.1
* incus-zsh-completion 6.22-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-23953.html
* https://www.suse.com/security/cve/CVE-2026-23954.html
SUSE-SU-2026:0829-1: moderate: Security update for gnutls
# Security update for gnutls
Announcement ID: SUSE-SU-2026:0829-1
Release Date: 2026-03-05T15:17:14Z
Rating: moderate
References:
* bsc#1257960
* bsc#1258083
* jsc#PED-15752
* jsc#PED-15753
Cross-References:
* CVE-2025-14831
CVSS scores:
* CVE-2025-14831 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-14831 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-14831 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability, contains two features and has one
security fix can now be installed.
## Description:
This update for gnutls fixes the following issues:
Security issue:
* CVE-2025-14831: excessive resource consumption when verifying specially
crafted malicious certificates containing a large number of name constraints
and subject alternative names (bsc#1257960).
Other updates and bugfixes:
* update libgnutls package to avoid binder getting calculated with SHA256
(bsc#1258083, jsc#PED-15752, jsc#PED-15753).
* lib/psk: Add gnutls_psk_allocate_{client,server}_credentials2
* tests/psk-file: Add testing for _credentials2 functions
* lib/psk: add null check for binder algo
* pre_shared_key: fix memleak when retrying with different binder algo
* pre_shared_key: add null check on pskcred
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-829=1 openSUSE-SLE-15.6-2026-829=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-829=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libgnutlsxx-devel-3.8.3-150600.4.17.1
* libgnutlsxx30-3.8.3-150600.4.17.1
* libgnutlsxx30-debuginfo-3.8.3-150600.4.17.1
* gnutls-3.8.3-150600.4.17.1
* gnutls-debugsource-3.8.3-150600.4.17.1
* libgnutls-devel-3.8.3-150600.4.17.1
* libgnutls30-debuginfo-3.8.3-150600.4.17.1
* gnutls-debuginfo-3.8.3-150600.4.17.1
* libgnutls30-3.8.3-150600.4.17.1
* openSUSE Leap 15.6 (x86_64)
* libgnutls30-32bit-3.8.3-150600.4.17.1
* libgnutls-devel-32bit-3.8.3-150600.4.17.1
* libgnutls30-32bit-debuginfo-3.8.3-150600.4.17.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libgnutls30-64bit-3.8.3-150600.4.17.1
* libgnutls-devel-64bit-3.8.3-150600.4.17.1
* libgnutls30-64bit-debuginfo-3.8.3-150600.4.17.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libgnutlsxx-devel-3.8.3-150600.4.17.1
* libgnutlsxx30-3.8.3-150600.4.17.1
* libgnutlsxx30-debuginfo-3.8.3-150600.4.17.1
* gnutls-3.8.3-150600.4.17.1
* gnutls-debugsource-3.8.3-150600.4.17.1
* libgnutls-devel-3.8.3-150600.4.17.1
* libgnutls30-debuginfo-3.8.3-150600.4.17.1
* gnutls-debuginfo-3.8.3-150600.4.17.1
* libgnutls30-3.8.3-150600.4.17.1
* Basesystem Module 15-SP7 (x86_64)
* libgnutls30-32bit-3.8.3-150600.4.17.1
* libgnutls30-32bit-debuginfo-3.8.3-150600.4.17.1
## References:
* https://www.suse.com/security/cve/CVE-2025-14831.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257960
* https://bugzilla.suse.com/show_bug.cgi?id=1258083
* https://jira.suse.com/browse/PED-15752
* https://jira.suse.com/browse/PED-15753
SUSE-SU-2026:0830-1: important: Security update for ocaml
# Security update for ocaml
Announcement ID: SUSE-SU-2026:0830-1
Release Date: 2026-03-05T15:17:46Z
Rating: important
References:
* bsc#1258992
Cross-References:
* CVE-2026-28364
CVSS scores:
* CVE-2026-28364 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28364 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-28364 ( NVD ): 7.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Affected Products:
* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for ocaml fixes the following issues:
* CVE-2026-28364: missing bounds validation in readblock() can lead to
arbitrary code execution (bsc#1258992).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-830=1 SUSE-2026-830=1
* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-830=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-830=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-830=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* ocaml-debugsource-4.14.2-150600.3.3.1
* ocaml-4.14.2-150600.3.3.1
* ocaml-runtime-debuginfo-4.14.2-150600.3.3.1
* ocaml-debuginfo-4.14.2-150600.3.3.1
* ocaml-ocamldoc-4.14.2-150600.3.3.1
* ocaml-source-4.14.2-150600.3.3.1
* ocaml-ocamldoc-debuginfo-4.14.2-150600.3.3.1
* ocaml-compiler-libs-4.14.2-150600.3.3.1
* ocaml-compiler-libs-devel-4.14.2-150600.3.3.1
* ocaml-runtime-4.14.2-150600.3.3.1
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* ocaml-debugsource-4.14.2-150600.3.3.1
* ocaml-4.14.2-150600.3.3.1
* ocaml-runtime-debuginfo-4.14.2-150600.3.3.1
* ocaml-debuginfo-4.14.2-150600.3.3.1
* ocaml-ocamldoc-4.14.2-150600.3.3.1
* ocaml-ocamldoc-debuginfo-4.14.2-150600.3.3.1
* ocaml-compiler-libs-4.14.2-150600.3.3.1
* ocaml-compiler-libs-devel-4.14.2-150600.3.3.1
* ocaml-runtime-4.14.2-150600.3.3.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* ocaml-debugsource-4.14.2-150600.3.3.1
* ocaml-4.14.2-150600.3.3.1
* ocaml-runtime-debuginfo-4.14.2-150600.3.3.1
* ocaml-debuginfo-4.14.2-150600.3.3.1
* ocaml-ocamldoc-4.14.2-150600.3.3.1
* ocaml-ocamldoc-debuginfo-4.14.2-150600.3.3.1
* ocaml-compiler-libs-4.14.2-150600.3.3.1
* ocaml-compiler-libs-devel-4.14.2-150600.3.3.1
* ocaml-runtime-4.14.2-150600.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* ocaml-debugsource-4.14.2-150600.3.3.1
* ocaml-4.14.2-150600.3.3.1
* ocaml-runtime-debuginfo-4.14.2-150600.3.3.1
* ocaml-debuginfo-4.14.2-150600.3.3.1
* ocaml-ocamldoc-4.14.2-150600.3.3.1
* ocaml-ocamldoc-debuginfo-4.14.2-150600.3.3.1
* ocaml-compiler-libs-4.14.2-150600.3.3.1
* ocaml-compiler-libs-devel-4.14.2-150600.3.3.1
* ocaml-runtime-4.14.2-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2026-28364.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258992
SUSE-SU-2026:0825-1: low: Security update for php-composer2
# Security update for php-composer2
Announcement ID: SUSE-SU-2026:0825-1
Release Date: 2026-03-05T15:16:19Z
Rating: low
References:
* bsc#1255768
Cross-References:
* CVE-2025-67746
CVSS scores:
* CVE-2025-67746 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-67746 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-67746 ( NVD ): 1.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-67746 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* Web and Scripting Module 15-SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for php-composer2 fixes the following issues:
CVE-2025-67746: Fixed ANSI control characters injection in the terminal output
of various Composer commands via attacker controlled remote sources.
(bsc#1255768)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-825=1 openSUSE-SLE-15.6-2026-825=1
* Web and Scripting Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2026-825=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* php-composer2-2.6.4-150600.3.6.1
* Web and Scripting Module 15-SP7 (noarch)
* php-composer2-2.6.4-150600.3.6.1
## References:
* https://www.suse.com/security/cve/CVE-2025-67746.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255768
SUSE-SU-2026:0824-1: moderate: Security update for openCryptoki
# Security update for openCryptoki
Announcement ID: SUSE-SU-2026:0824-1
Release Date: 2026-03-05T15:16:08Z
Rating: moderate
References:
* bsc#1257116
Cross-References:
* CVE-2026-23893
CVSS scores:
* CVE-2026-23893 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
* CVE-2026-23893 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.4
An update that solves one vulnerability can now be installed.
## Description:
This update for openCryptoki fixes the following issues:
* CVE-2026-23893: Fixed privilege escalation or data exposure via symlink
following (bsc#1257116)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-824=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-824=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-824=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* openCryptoki-devel-3.17.0-150400.4.11.1
* openCryptoki-debugsource-3.17.0-150400.4.11.1
* openCryptoki-3.17.0-150400.4.11.1
* openCryptoki-debuginfo-3.17.0-150400.4.11.1
* openSUSE Leap 15.4 (i586)
* openCryptoki-32bit-debuginfo-3.17.0-150400.4.11.1
* openCryptoki-32bit-3.17.0-150400.4.11.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* openCryptoki-64bit-debuginfo-3.17.0-150400.4.11.1
* openCryptoki-64bit-3.17.0-150400.4.11.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (s390x)
* openCryptoki-debugsource-3.17.0-150400.4.11.1
* openCryptoki-3.17.0-150400.4.11.1
* openCryptoki-debuginfo-3.17.0-150400.4.11.1
* SUSE Linux Enterprise Micro 5.4 (s390x)
* openCryptoki-debugsource-3.17.0-150400.4.11.1
* openCryptoki-3.17.0-150400.4.11.1
* openCryptoki-debuginfo-3.17.0-150400.4.11.1
## References:
* https://www.suse.com/security/cve/CVE-2026-23893.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257116
SUSE-SU-2026:0826-1: moderate: Security update for expat
# Security update for expat
Announcement ID: SUSE-SU-2026:0826-1
Release Date: 2026-03-05T15:16:41Z
Rating: moderate
References:
* bsc#1257144
* bsc#1257496
Cross-References:
* CVE-2026-24515
* CVE-2026-25210
CVSS scores:
* CVE-2026-24515 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-24515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-24515 ( NVD ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-24515 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25210 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25210 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
* CVE-2026-25210 ( NVD ): 6.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for expat fixes the following issues:
* CVE-2026-24515: Fixed a null dereference in XML_ExternalEntityParserCreate.
(bsc#1257144)
* CVE-2026-25210: Fixed an integer overflow in doContent. (bsc#1257496)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-826=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-826=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-826=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-826=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-826=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-826=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-826=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libexpat1-debuginfo-2.7.1-150400.3.34.1
* expat-debuginfo-2.7.1-150400.3.34.1
* libexpat-devel-2.7.1-150400.3.34.1
* expat-debugsource-2.7.1-150400.3.34.1
* libexpat1-2.7.1-150400.3.34.1
* expat-2.7.1-150400.3.34.1
* openSUSE Leap 15.4 (x86_64)
* libexpat-devel-32bit-2.7.1-150400.3.34.1
* expat-32bit-debuginfo-2.7.1-150400.3.34.1
* libexpat1-32bit-debuginfo-2.7.1-150400.3.34.1
* libexpat1-32bit-2.7.1-150400.3.34.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libexpat-devel-64bit-2.7.1-150400.3.34.1
* libexpat1-64bit-2.7.1-150400.3.34.1
* expat-64bit-debuginfo-2.7.1-150400.3.34.1
* libexpat1-64bit-debuginfo-2.7.1-150400.3.34.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libexpat1-debuginfo-2.7.1-150400.3.34.1
* expat-debuginfo-2.7.1-150400.3.34.1
* libexpat-devel-2.7.1-150400.3.34.1
* expat-debugsource-2.7.1-150400.3.34.1
* libexpat1-2.7.1-150400.3.34.1
* expat-2.7.1-150400.3.34.1
* openSUSE Leap 15.6 (x86_64)
* libexpat-devel-32bit-2.7.1-150400.3.34.1
* expat-32bit-debuginfo-2.7.1-150400.3.34.1
* libexpat1-32bit-debuginfo-2.7.1-150400.3.34.1
* libexpat1-32bit-2.7.1-150400.3.34.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libexpat1-debuginfo-2.7.1-150400.3.34.1
* expat-debugsource-2.7.1-150400.3.34.1
* expat-debuginfo-2.7.1-150400.3.34.1
* libexpat1-2.7.1-150400.3.34.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libexpat1-debuginfo-2.7.1-150400.3.34.1
* expat-debugsource-2.7.1-150400.3.34.1
* expat-debuginfo-2.7.1-150400.3.34.1
* libexpat1-2.7.1-150400.3.34.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libexpat1-debuginfo-2.7.1-150400.3.34.1
* expat-debugsource-2.7.1-150400.3.34.1
* expat-debuginfo-2.7.1-150400.3.34.1
* libexpat1-2.7.1-150400.3.34.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libexpat1-debuginfo-2.7.1-150400.3.34.1
* expat-debugsource-2.7.1-150400.3.34.1
* expat-debuginfo-2.7.1-150400.3.34.1
* libexpat1-2.7.1-150400.3.34.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libexpat1-debuginfo-2.7.1-150400.3.34.1
* expat-debugsource-2.7.1-150400.3.34.1
* expat-debuginfo-2.7.1-150400.3.34.1
* libexpat1-2.7.1-150400.3.34.1
## References:
* https://www.suse.com/security/cve/CVE-2026-24515.html
* https://www.suse.com/security/cve/CVE-2026-25210.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257144
* https://bugzilla.suse.com/show_bug.cgi?id=1257496
SUSE-SU-2026:0828-1: moderate: Security update for python-Authlib
# Security update for python-Authlib
Announcement ID: SUSE-SU-2026:0828-1
Release Date: 2026-03-05T15:17:02Z
Rating: moderate
References:
* bsc#1256414
Cross-References:
* CVE-2025-68158
CVSS scores:
* CVE-2025-68158 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68158 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
* CVE-2025-68158 ( NVD ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
* CVE-2025-68158 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for python-Authlib fixes the following issues:
* CVE-2025-68158: Fixed 1-click account takeover in applications that use the
Authlib library (bsc#1256414)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-828=1 openSUSE-SLE-15.6-2026-828=1
* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-828=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* python311-Authlib-1.3.1-150600.3.14.1
* Python 3 Module 15-SP7 (noarch)
* python311-Authlib-1.3.1-150600.3.14.1
## References:
* https://www.suse.com/security/cve/CVE-2025-68158.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256414
SUSE-SU-2026:0831-1: important: Security update for openvpn
# Security update for openvpn
Announcement ID: SUSE-SU-2026:0831-1
Release Date: 2026-03-05T15:18:18Z
Rating: important
References:
* bsc#1254486
Cross-References:
* CVE-2025-13086
CVSS scores:
* CVE-2025-13086 ( SUSE ): 4.6
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13086 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-13086 ( NVD ): 4.6
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13086 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for openvpn fixes the following issues:
* Updated to version 2.6.10 that fixes:
* CVE-2025-13086: improper validation of IP addresses that can cause denial of
service (bsc#1254486)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-831=1 openSUSE-SLE-15.6-2026-831=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-831=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-831=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-831=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* openvpn-dco-devel-2.6.10-150600.3.20.1
* openvpn-devel-2.6.10-150600.3.20.1
* openvpn-2.6.10-150600.3.20.1
* openvpn-debugsource-2.6.10-150600.3.20.1
* openvpn-down-root-plugin-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-2.6.10-150600.3.20.1
* openvpn-dco-debuginfo-2.6.10-150600.3.20.1
* openvpn-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-2.6.10-150600.3.20.1
* openvpn-down-root-plugin-debuginfo-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-debugsource-2.6.10-150600.3.20.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* openvpn-dco-devel-2.6.10-150600.3.20.1
* openvpn-devel-2.6.10-150600.3.20.1
* openvpn-2.6.10-150600.3.20.1
* openvpn-debugsource-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-2.6.10-150600.3.20.1
* openvpn-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-debugsource-2.6.10-150600.3.20.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* openvpn-dco-devel-2.6.10-150600.3.20.1
* openvpn-devel-2.6.10-150600.3.20.1
* openvpn-2.6.10-150600.3.20.1
* openvpn-debugsource-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-2.6.10-150600.3.20.1
* openvpn-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-debugsource-2.6.10-150600.3.20.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* openvpn-dco-devel-2.6.10-150600.3.20.1
* openvpn-devel-2.6.10-150600.3.20.1
* openvpn-2.6.10-150600.3.20.1
* openvpn-debugsource-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-2.6.10-150600.3.20.1
* openvpn-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-debugsource-2.6.10-150600.3.20.1
## References:
* https://www.suse.com/security/cve/CVE-2025-13086.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254486
openSUSE-SU-2026:0071-1: important: Security update for roundcubemail
openSUSE Security Update: Security update for roundcubemail
_______________________________
Announcement ID: openSUSE-SU-2026:0071-1
Rating: important
References: #1255306 #1255308 #1257909 #1258052
Cross-References: CVE-2025-68460 CVE-2025-68461 CVE-2026-25916
CVE-2026-26079
CVSS scores:
CVE-2026-26079 (SUSE): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for roundcubemail fixes the following issues:
- update to 1.6.13 This is a security update to the stable version 1.6 of
Roundcube Webmail. It provides fixes to recently reported security
vulnerabilities:
+ Fix CSS injection vulnerability reported by CERT Polska (boo#1258052,
CVE-2026-26079).
+ Fix remote image blocking bypass via SVG content reported by
nullcathedral (boo#1257909, CVE-2026-25916). This version is
considered stable and we recommend to update all productive
installations of Roundcube 1.6.x with it. Please do backup your data
before updating! CHANGELOG
+ Managesieve: Fix handling of string-list format values for date tests
in Out of Office (#10075)
+ Fix CSS injection vulnerability reported by CERT Polska.
+ Fix remote image blocking bypass via SVG content reported by
nullcathedral.
- update to 1.6.12 This is a security update to the stable version 1.6 of
Roundcube Webmail. It provides fixes to recently reported security
vulnerabilities:
+ Fix Cross-Site-Scripting vulnerability via SVG's animate tag reported
by Valentin T., CrowdStrike (boo#1255308, CVE-2025-68461).
+ Fix Information Disclosure vulnerability in the HTML style sanitizer
reported by somerandomdev (boo#1255306, CVE-2025-68460). This version
is considered stable and we recommend to update all productive
installations of Roundcube 1.6.x with it.
+ Support IPv6 in database DSN (#9937)
+ Don't force specific error_reporting setting
+ Fix compatibility with PHP 8.5 regarding array_first()
+ Remove X-XSS-Protection example from .htaccess file (#9875)
+ Fix "Assign to group" action state after creation of a first group
(#9889)
+ Fix bug where contacts search would fail if contactlist_fields
contained vcard fields (#9850)
+ Fix bug where an mbox export file could include inconsistent message
delimiters (#9879)
+ Fix parsing of inline styles that aren't well-formatted (#9948)
+ Fix Cross-Site-Scripting vulnerability via SVG's animate tag
+ Fix Information Disclosure vulnerability in the HTML style sanitizer
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2026-71=1
Package List:
- openSUSE Backports SLE-15-SP6 (noarch):
roundcubemail-1.6.13-bp156.2.12.1
References:
https://www.suse.com/security/cve/CVE-2025-68460.html
https://www.suse.com/security/cve/CVE-2025-68461.html
https://www.suse.com/security/cve/CVE-2026-25916.html
https://www.suse.com/security/cve/CVE-2026-26079.html
https://bugzilla.suse.com/1255306
https://bugzilla.suse.com/1255308
https://bugzilla.suse.com/1257909
https://bugzilla.suse.com/1258052
openSUSE-SU-2026:0070-1: important: Security update for roundcubemail
openSUSE Security Update: Security update for roundcubemail
_______________________________
Announcement ID: openSUSE-SU-2026:0070-1
Rating: important
References: #1255306 #1255308 #1257909 #1258052
Cross-References: CVE-2025-68460 CVE-2025-68461 CVE-2026-25916
CVE-2026-26079
CVSS scores:
CVE-2026-26079 (SUSE): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for roundcubemail fixes the following issues:
- update to 1.6.13 This is a security update to the stable version 1.6 of
Roundcube Webmail. It provides fixes to recently reported security
vulnerabilities:
+ Fix CSS injection vulnerability reported by CERT Polska (boo#1258052,
CVE-2026-26079).
+ Fix remote image blocking bypass via SVG content reported by
nullcathedral (boo#1257909, CVE-2026-25916). This version is
considered stable and we recommend to update all productive
installations of Roundcube 1.6.x with it. Please do backup your data
before updating! CHANGELOG
+ Managesieve: Fix handling of string-list format values for date tests
in Out of Office (#10075)
+ Fix CSS injection vulnerability reported by CERT Polska.
+ Fix remote image blocking bypass via SVG content reported by
nullcathedral.
- update to 1.6.12 This is a security update to the stable version 1.6 of
Roundcube Webmail. It provides fixes to recently reported security
vulnerabilities:
+ Fix Cross-Site-Scripting vulnerability via SVG's animate tag reported
by Valentin T., CrowdStrike (boo#1255308, CVE-2025-68461).
+ Fix Information Disclosure vulnerability in the HTML style sanitizer
reported by somerandomdev (boo#1255306, CVE-2025-68460). This version
is considered stable and we recommend to update all productive
installations of Roundcube 1.6.x with it.
+ Support IPv6 in database DSN (#9937)
+ Don't force specific error_reporting setting
+ Fix compatibility with PHP 8.5 regarding array_first()
+ Remove X-XSS-Protection example from .htaccess file (#9875)
+ Fix "Assign to group" action state after creation of a first group
(#9889)
+ Fix bug where contacts search would fail if contactlist_fields
contained vcard fields (#9850)
+ Fix bug where an mbox export file could include inconsistent message
delimiters (#9879)
+ Fix parsing of inline styles that aren't well-formatted (#9948)
+ Fix Cross-Site-Scripting vulnerability via SVG's animate tag
+ Fix Information Disclosure vulnerability in the HTML style sanitizer
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-70=1
Package List:
- openSUSE Backports SLE-15-SP7 (noarch):
roundcubemail-1.6.13-bp157.2.6.1
References:
https://www.suse.com/security/cve/CVE-2025-68460.html
https://www.suse.com/security/cve/CVE-2025-68461.html
https://www.suse.com/security/cve/CVE-2026-25916.html
https://www.suse.com/security/cve/CVE-2026-26079.html
https://bugzilla.suse.com/1255306
https://bugzilla.suse.com/1255308
https://bugzilla.suse.com/1257909
https://bugzilla.suse.com/1258052
openSUSE-SU-2026:0069-1: important: Security update for python-nltk
openSUSE Security Update: Security update for python-nltk
_______________________________
Announcement ID: openSUSE-SU-2026:0069-1
Rating: important
References: #1259232
Cross-References: CVE-2026-0847
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that fixes one vulnerability is now available.
Description:
This update for python-nltk fixes the following issues:
- CVE-2026-0847: Fixed an issue where improper sanitization of file paths
could lead to path traversal (boo#1259232)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-69=1
Package List:
- openSUSE Backports SLE-15-SP7 (noarch):
python3-nltk-3.7-bp157.3.6.1
References:
https://www.suse.com/security/cve/CVE-2026-0847.html
https://bugzilla.suse.com/1259232
openSUSE-SU-2026:20301-1: important: Security update for go1.25-openssl
openSUSE security update: security update for go1.25-openssl
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20301-1
Rating: important
References:
* bsc#1244485
* bsc#1245878
* bsc#1249985
* bsc#1251253
* bsc#1251254
* bsc#1251255
* bsc#1251256
* bsc#1251257
* bsc#1251258
* bsc#1251259
* bsc#1251260
* bsc#1251261
* bsc#1251262
* bsc#1254227
* bsc#1254430
* bsc#1254431
* bsc#1256816
* bsc#1256817
* bsc#1256818
* bsc#1256819
* bsc#1256820
* bsc#1256821
* bsc#1257486
Cross-References:
* CVE-2025-47912
* CVE-2025-58183
* CVE-2025-58185
* CVE-2025-58186
* CVE-2025-58187
* CVE-2025-58188
* CVE-2025-58189
* CVE-2025-61723
* CVE-2025-61724
* CVE-2025-61725
* CVE-2025-61726
* CVE-2025-61727
* CVE-2025-61728
* CVE-2025-61729
* CVE-2025-61730
* CVE-2025-61731
* CVE-2025-68119
* CVE-2025-68121
CVSS scores:
* CVE-2025-47912 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-47912 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-58183 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-58183 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58185 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58185 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58186 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58186 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58187 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58187 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58188 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-58188 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-58189 ( SUSE ): 4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2025-58189 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
* CVE-2025-61723 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-61723 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-61724 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-61724 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-61725 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61725 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61726 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61726 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61727 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61728 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61729 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61729 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61730 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-61730 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-61731 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-61731 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68119 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68119 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-68121 ( SUSE ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 18 vulnerabilities and has 23 bug fixes can now be installed.
Description:
This update for go1.25-openssl fixes the following issues:
- Update to version 1.25.7 (jsc#SLE-18320)
- CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821)
- CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820)
- CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819)
- CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817)
- CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816)
- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818)
- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431)
- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SA (bsc#1254430)
- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255)
- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253)
- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260)
- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258)
- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259)
- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256)
- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261)
- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257)
- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254)
- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-339=1
Package List:
- openSUSE Leap 16.0:
go1.25-openssl-1.25.7-160000.1.1
go1.25-openssl-doc-1.25.7-160000.1.1
go1.25-openssl-race-1.25.7-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2025-47912.html
* https://www.suse.com/security/cve/CVE-2025-58183.html
* https://www.suse.com/security/cve/CVE-2025-58185.html
* https://www.suse.com/security/cve/CVE-2025-58186.html
* https://www.suse.com/security/cve/CVE-2025-58187.html
* https://www.suse.com/security/cve/CVE-2025-58188.html
* https://www.suse.com/security/cve/CVE-2025-58189.html
* https://www.suse.com/security/cve/CVE-2025-61723.html
* https://www.suse.com/security/cve/CVE-2025-61724.html
* https://www.suse.com/security/cve/CVE-2025-61725.html
* https://www.suse.com/security/cve/CVE-2025-61726.html
* https://www.suse.com/security/cve/CVE-2025-61727.html
* https://www.suse.com/security/cve/CVE-2025-61728.html
* https://www.suse.com/security/cve/CVE-2025-61729.html
* https://www.suse.com/security/cve/CVE-2025-61730.html
* https://www.suse.com/security/cve/CVE-2025-61731.html
* https://www.suse.com/security/cve/CVE-2025-68119.html
* https://www.suse.com/security/cve/CVE-2025-68121.html
openSUSE-SU-2026:20298-1: moderate: Security update for assertj-core
openSUSE security update: security update for assertj-core
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2026:20298-1
Rating: moderate
References:
* bsc#1257293
Cross-References:
* CVE-2026-24400
CVSS scores:
* CVE-2026-24400 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2026-24400 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves one vulnerability and has one bug fix can now be installed.
Description:
This update for assertj-core fixes the following issues:
Upgrade to version 3.27.7:
- CVE-2026-24400: Fix XXE vulnerability in isXmlEqualTo assertion (bsc#1257293).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-336=1
Package List:
- openSUSE Leap 16.0:
assertj-core-3.27.7-160000.1.1
assertj-core-javadoc-3.27.7-160000.1.1
References:
* https://www.suse.com/security/cve/CVE-2026-24400.html
openSUSE-SU-2026:10282-1: moderate: python311-Django4-4.2.29-1.1 on GA media
# python311-Django4-4.2.29-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10282-1
Rating: moderate
Cross-References:
* CVE-2026-25674
CVSS scores:
* CVE-2026-25674 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-25674 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the python311-Django4-4.2.29-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python311-Django4 4.2.29-1.1
* python313-Django4 4.2.29-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-25674.html
openSUSE-SU-2026:10278-1: moderate: ImageMagick-7.1.2.15-2.1 on GA media
# ImageMagick-7.1.2.15-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10278-1
Rating: moderate
Cross-References:
* CVE-2026-24484
* CVE-2026-27798
CVSS scores:
* CVE-2026-24484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-27798 ( SUSE ): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-27798 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the ImageMagick-7.1.2.15-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* ImageMagick 7.1.2.15-2.1
* ImageMagick-config-7-SUSE 7.1.2.15-2.1
* ImageMagick-devel 7.1.2.15-2.1
* ImageMagick-devel-32bit 7.1.2.15-2.1
* ImageMagick-doc 7.1.2.15-2.1
* ImageMagick-extra 7.1.2.15-2.1
* libMagick++-7_Q16HDRI5 7.1.2.15-2.1
* libMagick++-7_Q16HDRI5-32bit 7.1.2.15-2.1
* libMagick++-devel 7.1.2.15-2.1
* libMagick++-devel-32bit 7.1.2.15-2.1
* libMagickCore-7_Q16HDRI10 7.1.2.15-2.1
* libMagickCore-7_Q16HDRI10-32bit 7.1.2.15-2.1
* libMagickWand-7_Q16HDRI10 7.1.2.15-2.1
* libMagickWand-7_Q16HDRI10-32bit 7.1.2.15-2.1
* perl-PerlMagick 7.1.2.15-2.1
## References:
* https://www.suse.com/security/cve/CVE-2026-24484.html
* https://www.suse.com/security/cve/CVE-2026-27798.html