SUSE 5579 Published by

Several security updates have been released for SUSE Linux, addressing vulnerabilities in various packages such as wireshark, libsoup2, and virtiofsd. The updates also include patches for mozilla-nss, python-Django, ruby4.0-rubygem-rack, mchange-commons, sdbootutil, and other packages. Some of the security fixes are considered low-risk, while others are rated as moderate or important, requiring immediate attention from system administrators.

SUSE-SU-2026:0810-1: low: Security update for wireshark
SUSE-SU-2026:0811-1: important: Security update for libsoup2
SUSE-SU-2026:0816-1: important: Security update for virtiofsd
SUSE-SU-2026:0813-1: moderate: Security update for mozilla-nss
SUSE-SU-2026:0821-1: moderate: Security update for python-Django
openSUSE-SU-2026:10286-1: moderate: ruby4.0-rubygem-rack-2.2-2.2.22-1.1 on GA media
openSUSE-SU-2026:10281-1: moderate: mchange-commons-0.4.0-1.1 on GA media
openSUSE-SU-2026:10287-1: moderate: sdbootutil-1+git20260303.90d816d-1.1 on GA media
openSUSE-SU-2026:10285-1: moderate: python311-pillow-heif-1.3.0-1.1 on GA media
openSUSE-SU-2026:10279-1: moderate: c3p0-0.12.0-1.1 on GA media
openSUSE-SU-2026:10283-1: moderate: python313-Django6-6.0.3-1.1 on GA media
openSUSE-SU-2026:10284-1: moderate: python311-PyPDF2-2.11.1-5.1 on GA media
openSUSE-SU-2026:10280-1: moderate: incus-6.22-1.1 on GA media
SUSE-SU-2026:0829-1: moderate: Security update for gnutls
SUSE-SU-2026:0830-1: important: Security update for ocaml
SUSE-SU-2026:0825-1: low: Security update for php-composer2
SUSE-SU-2026:0824-1: moderate: Security update for openCryptoki
SUSE-SU-2026:0826-1: moderate: Security update for expat
SUSE-SU-2026:0828-1: moderate: Security update for python-Authlib
SUSE-SU-2026:0831-1: important: Security update for openvpn
openSUSE-SU-2026:0071-1: important: Security update for roundcubemail
openSUSE-SU-2026:0070-1: important: Security update for roundcubemail
openSUSE-SU-2026:0069-1: important: Security update for python-nltk
openSUSE-SU-2026:20301-1: important: Security update for go1.25-openssl
openSUSE-SU-2026:20298-1: moderate: Security update for assertj-core
openSUSE-SU-2026:10282-1: moderate: python311-Django4-4.2.29-1.1 on GA media
openSUSE-SU-2026:10278-1: moderate: ImageMagick-7.1.2.15-2.1 on GA media




SUSE-SU-2026:0810-1: low: Security update for wireshark


# Security update for wireshark

Announcement ID: SUSE-SU-2026:0810-1
Release Date: 2026-03-04T19:33:44Z
Rating: low
References:

* bsc#1258907

Cross-References:

* CVE-2026-3201

CVSS scores:

* CVE-2026-3201 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-3201 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-3201 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-3201 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6

An update that solves one vulnerability can now be installed.

## Description:

This update for wireshark fixes the following issue:

* CVE-2026-3201: USB HID protocol dissector memory exhaustion (bsc#1258907).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-810=1 openSUSE-SLE-15.6-2026-810=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libwireshark17-4.2.14-150600.18.38.1
* wireshark-debuginfo-4.2.14-150600.18.38.1
* libwiretap14-4.2.14-150600.18.38.1
* wireshark-ui-qt-debuginfo-4.2.14-150600.18.38.1
* libwsutil15-debuginfo-4.2.14-150600.18.38.1
* libwireshark17-debuginfo-4.2.14-150600.18.38.1
* libwiretap14-debuginfo-4.2.14-150600.18.38.1
* wireshark-devel-4.2.14-150600.18.38.1
* wireshark-ui-qt-4.2.14-150600.18.38.1
* wireshark-4.2.14-150600.18.38.1
* wireshark-debugsource-4.2.14-150600.18.38.1
* libwsutil15-4.2.14-150600.18.38.1

## References:

* https://www.suse.com/security/cve/CVE-2026-3201.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258907



SUSE-SU-2026:0811-1: important: Security update for libsoup2


# Security update for libsoup2

Announcement ID: SUSE-SU-2026:0811-1
Release Date: 2026-03-05T03:05:33Z
Rating: important
References:

* bsc#1257398
* bsc#1257441
* bsc#1257597

Cross-References:

* CVE-2026-1467
* CVE-2026-1539
* CVE-2026-1760

CVSS scores:

* CVE-2026-1467 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
* CVE-2026-1467 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-1467 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2026-1539 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N
* CVE-2026-1539 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
* CVE-2026-1539 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
* CVE-2026-1760 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2026-1760 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
* CVE-2026-1760 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves three vulnerabilities can now be installed.

## Description:

This update for libsoup2 fixes the following issues:

* CVE-2026-1467: lack of input sanitization can lead to unintended or
unauthorized HTTP requests (bsc#1257398).
* CVE-2026-1539: proxy authentication credentials leaked via the Proxy-
Authorization header when handling HTTP redirects (bsc#1257441).
* CVE-2026-1760: improper handling of HTTP requests combining certain headers
by SoupServer can lead to HTTP request smuggling and potential DoS
(bsc#1257597).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-811=1 openSUSE-SLE-15.6-2026-811=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-811=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-811=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-811=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.30.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.30.1
* libsoup2-debugsource-2.74.3-150600.4.30.1
* libsoup-2_4-1-2.74.3-150600.4.30.1
* libsoup2-devel-2.74.3-150600.4.30.1
* openSUSE Leap 15.6 (x86_64)
* libsoup-2_4-1-32bit-2.74.3-150600.4.30.1
* libsoup2-devel-32bit-2.74.3-150600.4.30.1
* libsoup-2_4-1-32bit-debuginfo-2.74.3-150600.4.30.1
* openSUSE Leap 15.6 (noarch)
* libsoup2-lang-2.74.3-150600.4.30.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libsoup-2_4-1-64bit-debuginfo-2.74.3-150600.4.30.1
* libsoup2-devel-64bit-2.74.3-150600.4.30.1
* libsoup-2_4-1-64bit-2.74.3-150600.4.30.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.30.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.30.1
* libsoup2-debugsource-2.74.3-150600.4.30.1
* libsoup-2_4-1-2.74.3-150600.4.30.1
* libsoup2-devel-2.74.3-150600.4.30.1
* Basesystem Module 15-SP7 (noarch)
* libsoup2-lang-2.74.3-150600.4.30.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.30.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.30.1
* libsoup2-debugsource-2.74.3-150600.4.30.1
* libsoup-2_4-1-2.74.3-150600.4.30.1
* libsoup2-devel-2.74.3-150600.4.30.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* libsoup2-lang-2.74.3-150600.4.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.30.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.30.1
* libsoup2-debugsource-2.74.3-150600.4.30.1
* libsoup-2_4-1-2.74.3-150600.4.30.1
* libsoup2-devel-2.74.3-150600.4.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* libsoup2-lang-2.74.3-150600.4.30.1

## References:

* https://www.suse.com/security/cve/CVE-2026-1467.html
* https://www.suse.com/security/cve/CVE-2026-1539.html
* https://www.suse.com/security/cve/CVE-2026-1760.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257398
* https://bugzilla.suse.com/show_bug.cgi?id=1257441
* https://bugzilla.suse.com/show_bug.cgi?id=1257597



SUSE-SU-2026:0816-1: important: Security update for virtiofsd


# Security update for virtiofsd

Announcement ID: SUSE-SU-2026:0816-1
Release Date: 2026-03-05T09:51:05Z
Rating: important
References:

* bsc#1257912

Cross-References:

* CVE-2026-25727

CVSS scores:

* CVE-2026-25727 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25727 ( NVD ): 6.8
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-25727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for virtiofsd fixes the following issue:

* CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date
parser can lead to stack exhaustion (bsc#1257912).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-816=1 openSUSE-SLE-15.6-2026-816=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-816=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-816=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* virtiofsd-debugsource-1.10.1-150600.4.6.1
* virtiofsd-debuginfo-1.10.1-150600.4.6.1
* virtiofsd-1.10.1-150600.4.6.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* virtiofsd-debuginfo-1.10.1-150600.4.6.1
* virtiofsd-1.10.1-150600.4.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* virtiofsd-debuginfo-1.10.1-150600.4.6.1
* virtiofsd-1.10.1-150600.4.6.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25727.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257912



SUSE-SU-2026:0813-1: moderate: Security update for mozilla-nss


# Security update for mozilla-nss

Announcement ID: SUSE-SU-2026:0813-1
Release Date: 2026-03-05T08:34:59Z
Rating: moderate
References:

* bsc#1258568

Cross-References:

* CVE-2026-2781

CVSS scores:

* CVE-2026-2781 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-2781 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-2781 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for mozilla-nss fixes the following issues:

Update to NSS 3.112.3:

* CVE-2026-2781: Avoid integer overflow in platform-independent ghash
(bsc#1258568)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-813=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-813=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-813=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-813=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-813=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-813=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-813=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-813=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-813=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-813=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-813=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-813=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-813=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-813=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-813=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-813=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-813=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-813=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* openSUSE Leap 15.4 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-32bit-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-32bit-debuginfo-3.112.3-150400.3.63.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* mozilla-nss-64bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-64bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-64bit-3.112.3-150400.3.63.1
* libfreebl3-64bit-3.112.3-150400.3.63.1
* mozilla-nss-64bit-3.112.3-150400.3.63.1
* libsoftokn3-64bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-64bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-64bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-64bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-64bit-3.112.3-150400.3.63.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* openSUSE Leap 15.6 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-32bit-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-32bit-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* Basesystem Module 15-SP7 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libfreebl3-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-debugsource-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-3.112.3-150400.3.63.1
* mozilla-nss-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-3.112.3-150400.3.63.1
* libsoftokn3-3.112.3-150400.3.63.1
* mozilla-nss-tools-3.112.3-150400.3.63.1
* mozilla-nss-devel-3.112.3-150400.3.63.1
* mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-3.112.3-150400.3.63.1
* libfreebl3-3.112.3-150400.3.63.1
* libsoftokn3-debuginfo-3.112.3-150400.3.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1
* libfreebl3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-32bit-3.112.3-150400.3.63.1
* libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1
* libsoftokn3-32bit-3.112.3-150400.3.63.1
* mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1
* mozilla-nss-certs-32bit-3.112.3-150400.3.63.1

## References:

* https://www.suse.com/security/cve/CVE-2026-2781.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258568



SUSE-SU-2026:0821-1: moderate: Security update for python-Django


# Security update for python-Django

Announcement ID: SUSE-SU-2026:0821-1
Release Date: 2026-03-05T11:43:16Z
Rating: moderate
References:

* bsc#1259142

Cross-References:

* CVE-2026-25674

CVSS scores:

* CVE-2026-25674 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2026-25674 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-25674 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for python-Django fixes the following issue:

* CVE-2026-25674: race condition can lead to potential incorrect permissions
on newly created file system objects (bsc#1259142).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-821=1 openSUSE-SLE-15.6-2026-821=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-821=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* python311-Django-4.2.11-150600.3.50.1
* SUSE Package Hub 15 15-SP7 (noarch)
* python311-Django-4.2.11-150600.3.50.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25674.html
* https://bugzilla.suse.com/show_bug.cgi?id=1259142



openSUSE-SU-2026:10286-1: moderate: ruby4.0-rubygem-rack-2.2-2.2.22-1.1 on GA media


# ruby4.0-rubygem-rack-2.2-2.2.22-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10286-1
Rating: moderate

Cross-References:

* CVE-2013-0262
* CVE-2013-0263
* CVE-2015-3225
* CVE-2018-16471
* CVE-2019-16782
* CVE-2020-8184
* CVE-2022-30122
* CVE-2022-30123
* CVE-2022-44570
* CVE-2022-44571
* CVE-2022-44572
* CVE-2023-27530
* CVE-2023-27539
* CVE-2024-25126
* CVE-2024-26141
* CVE-2024-26146
* CVE-2025-25184
* CVE-2025-27111
* CVE-2025-27610
* CVE-2025-46727
* CVE-2025-59830
* CVE-2025-61770
* CVE-2025-61771
* CVE-2025-61772
* CVE-2025-61919
* CVE-2026-22860
* CVE-2026-25500

CVSS scores:

* CVE-2018-16471 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2019-16782 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2020-8184 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2022-30122 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-30123 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-44570 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-44571 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-44572 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-27530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-27539 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-25126 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26141 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26146 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-25184 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-25184 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-27111 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-27111 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-27610 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-27610 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-46727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-46727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-59830 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61770 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61770 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61771 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61771 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61772 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61772 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61919 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61919 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22860 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-22860 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-25500 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-25500 ( SUSE ): 4.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 27 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the ruby4.0-rubygem-rack-2.2-2.2.22-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* ruby4.0-rubygem-rack-2.2 2.2.22-1.1

## References:

* https://www.suse.com/security/cve/CVE-2013-0262.html
* https://www.suse.com/security/cve/CVE-2013-0263.html
* https://www.suse.com/security/cve/CVE-2015-3225.html
* https://www.suse.com/security/cve/CVE-2018-16471.html
* https://www.suse.com/security/cve/CVE-2019-16782.html
* https://www.suse.com/security/cve/CVE-2020-8184.html
* https://www.suse.com/security/cve/CVE-2022-30122.html
* https://www.suse.com/security/cve/CVE-2022-30123.html
* https://www.suse.com/security/cve/CVE-2022-44570.html
* https://www.suse.com/security/cve/CVE-2022-44571.html
* https://www.suse.com/security/cve/CVE-2022-44572.html
* https://www.suse.com/security/cve/CVE-2023-27530.html
* https://www.suse.com/security/cve/CVE-2023-27539.html
* https://www.suse.com/security/cve/CVE-2024-25126.html
* https://www.suse.com/security/cve/CVE-2024-26141.html
* https://www.suse.com/security/cve/CVE-2024-26146.html
* https://www.suse.com/security/cve/CVE-2025-25184.html
* https://www.suse.com/security/cve/CVE-2025-27111.html
* https://www.suse.com/security/cve/CVE-2025-27610.html
* https://www.suse.com/security/cve/CVE-2025-46727.html
* https://www.suse.com/security/cve/CVE-2025-59830.html
* https://www.suse.com/security/cve/CVE-2025-61770.html
* https://www.suse.com/security/cve/CVE-2025-61771.html
* https://www.suse.com/security/cve/CVE-2025-61772.html
* https://www.suse.com/security/cve/CVE-2025-61919.html
* https://www.suse.com/security/cve/CVE-2026-22860.html
* https://www.suse.com/security/cve/CVE-2026-25500.html



openSUSE-SU-2026:10281-1: moderate: mchange-commons-0.4.0-1.1 on GA media


# mchange-commons-0.4.0-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10281-1
Rating: moderate

Cross-References:

* CVE-2026-27727

CVSS scores:

* CVE-2026-27727 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-27727 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the mchange-commons-0.4.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* mchange-commons 0.4.0-1.1
* mchange-commons-javadoc 0.4.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-27727.html



openSUSE-SU-2026:10287-1: moderate: sdbootutil-1+git20260303.90d816d-1.1 on GA media


# sdbootutil-1+git20260303.90d816d-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10287-1
Rating: moderate

Cross-References:

* CVE-2026-25701

CVSS scores:

* CVE-2026-25701 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2026-25701 ( SUSE ): 7 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the sdbootutil-1+git20260303.90d816d-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* sdbootutil 1+git20260303.90d816d-1.1
* sdbootutil-bash-completion 1+git20260303.90d816d-1.1
* sdbootutil-dracut-measure-pcr 1+git20260303.90d816d-1.1
* sdbootutil-enroll 1+git20260303.90d816d-1.1
* sdbootutil-jeos-firstboot-enroll 1+git20260303.90d816d-1.1
* sdbootutil-kernel-install 1+git20260303.90d816d-1.1
* sdbootutil-snapper 1+git20260303.90d816d-1.1
* sdbootutil-tukit 1+git20260303.90d816d-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25701.html



openSUSE-SU-2026:10285-1: moderate: python311-pillow-heif-1.3.0-1.1 on GA media


# python311-pillow-heif-1.3.0-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10285-1
Rating: moderate

Cross-References:

* CVE-2026-28231

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python311-pillow-heif-1.3.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311-pillow-heif 1.3.0-1.1
* python313-pillow-heif 1.3.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-28231.html



openSUSE-SU-2026:10279-1: moderate: c3p0-0.12.0-1.1 on GA media


# c3p0-0.12.0-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10279-1
Rating: moderate

Cross-References:

* CVE-2026-27727

CVSS scores:

* CVE-2026-27727 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-27727 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the c3p0-0.12.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* c3p0 0.12.0-1.1
* c3p0-javadoc 0.12.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-27727.html



openSUSE-SU-2026:10283-1: moderate: python313-Django6-6.0.3-1.1 on GA media


# python313-Django6-6.0.3-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10283-1
Rating: moderate

Cross-References:

* CVE-2026-25674

CVSS scores:

* CVE-2026-25674 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-25674 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python313-Django6-6.0.3-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python313-Django6 6.0.3-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25674.html



openSUSE-SU-2026:10284-1: moderate: python311-PyPDF2-2.11.1-5.1 on GA media


# python311-PyPDF2-2.11.1-5.1 on GA media

Announcement ID: openSUSE-SU-2026:10284-1
Rating: moderate

Cross-References:

* CVE-2026-27628
* CVE-2026-27888

CVSS scores:

* CVE-2026-27888 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-27888 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the python311-PyPDF2-2.11.1-5.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311-PyPDF2 2.11.1-5.1
* python313-PyPDF2 2.11.1-5.1

## References:

* https://www.suse.com/security/cve/CVE-2026-27628.html
* https://www.suse.com/security/cve/CVE-2026-27888.html



openSUSE-SU-2026:10280-1: moderate: incus-6.22-1.1 on GA media


# incus-6.22-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10280-1
Rating: moderate

Cross-References:

* CVE-2026-23953
* CVE-2026-23954

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the incus-6.22-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* incus 6.22-1.1
* incus-bash-completion 6.22-1.1
* incus-fish-completion 6.22-1.1
* incus-tools 6.22-1.1
* incus-zsh-completion 6.22-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-23953.html
* https://www.suse.com/security/cve/CVE-2026-23954.html



SUSE-SU-2026:0829-1: moderate: Security update for gnutls


# Security update for gnutls

Announcement ID: SUSE-SU-2026:0829-1
Release Date: 2026-03-05T15:17:14Z
Rating: moderate
References:

* bsc#1257960
* bsc#1258083
* jsc#PED-15752
* jsc#PED-15753

Cross-References:

* CVE-2025-14831

CVSS scores:

* CVE-2025-14831 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-14831 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-14831 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability, contains two features and has one
security fix can now be installed.

## Description:

This update for gnutls fixes the following issues:

Security issue:

* CVE-2025-14831: excessive resource consumption when verifying specially
crafted malicious certificates containing a large number of name constraints
and subject alternative names (bsc#1257960).

Other updates and bugfixes:

* update libgnutls package to avoid binder getting calculated with SHA256
(bsc#1258083, jsc#PED-15752, jsc#PED-15753).
* lib/psk: Add gnutls_psk_allocate_{client,server}_credentials2
* tests/psk-file: Add testing for _credentials2 functions
* lib/psk: add null check for binder algo
* pre_shared_key: fix memleak when retrying with different binder algo
* pre_shared_key: add null check on pskcred

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-829=1 openSUSE-SLE-15.6-2026-829=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-829=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libgnutlsxx-devel-3.8.3-150600.4.17.1
* libgnutlsxx30-3.8.3-150600.4.17.1
* libgnutlsxx30-debuginfo-3.8.3-150600.4.17.1
* gnutls-3.8.3-150600.4.17.1
* gnutls-debugsource-3.8.3-150600.4.17.1
* libgnutls-devel-3.8.3-150600.4.17.1
* libgnutls30-debuginfo-3.8.3-150600.4.17.1
* gnutls-debuginfo-3.8.3-150600.4.17.1
* libgnutls30-3.8.3-150600.4.17.1
* openSUSE Leap 15.6 (x86_64)
* libgnutls30-32bit-3.8.3-150600.4.17.1
* libgnutls-devel-32bit-3.8.3-150600.4.17.1
* libgnutls30-32bit-debuginfo-3.8.3-150600.4.17.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libgnutls30-64bit-3.8.3-150600.4.17.1
* libgnutls-devel-64bit-3.8.3-150600.4.17.1
* libgnutls30-64bit-debuginfo-3.8.3-150600.4.17.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libgnutlsxx-devel-3.8.3-150600.4.17.1
* libgnutlsxx30-3.8.3-150600.4.17.1
* libgnutlsxx30-debuginfo-3.8.3-150600.4.17.1
* gnutls-3.8.3-150600.4.17.1
* gnutls-debugsource-3.8.3-150600.4.17.1
* libgnutls-devel-3.8.3-150600.4.17.1
* libgnutls30-debuginfo-3.8.3-150600.4.17.1
* gnutls-debuginfo-3.8.3-150600.4.17.1
* libgnutls30-3.8.3-150600.4.17.1
* Basesystem Module 15-SP7 (x86_64)
* libgnutls30-32bit-3.8.3-150600.4.17.1
* libgnutls30-32bit-debuginfo-3.8.3-150600.4.17.1

## References:

* https://www.suse.com/security/cve/CVE-2025-14831.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257960
* https://bugzilla.suse.com/show_bug.cgi?id=1258083
* https://jira.suse.com/browse/PED-15752
* https://jira.suse.com/browse/PED-15753



SUSE-SU-2026:0830-1: important: Security update for ocaml


# Security update for ocaml

Announcement ID: SUSE-SU-2026:0830-1
Release Date: 2026-03-05T15:17:46Z
Rating: important
References:

* bsc#1258992

Cross-References:

* CVE-2026-28364

CVSS scores:

* CVE-2026-28364 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-28364 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-28364 ( NVD ): 7.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N

Affected Products:

* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for ocaml fixes the following issues:

* CVE-2026-28364: missing bounds validation in readblock() can lead to
arbitrary code execution (bsc#1258992).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-830=1 SUSE-2026-830=1

* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-830=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-830=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-830=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* ocaml-debugsource-4.14.2-150600.3.3.1
* ocaml-4.14.2-150600.3.3.1
* ocaml-runtime-debuginfo-4.14.2-150600.3.3.1
* ocaml-debuginfo-4.14.2-150600.3.3.1
* ocaml-ocamldoc-4.14.2-150600.3.3.1
* ocaml-source-4.14.2-150600.3.3.1
* ocaml-ocamldoc-debuginfo-4.14.2-150600.3.3.1
* ocaml-compiler-libs-4.14.2-150600.3.3.1
* ocaml-compiler-libs-devel-4.14.2-150600.3.3.1
* ocaml-runtime-4.14.2-150600.3.3.1
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* ocaml-debugsource-4.14.2-150600.3.3.1
* ocaml-4.14.2-150600.3.3.1
* ocaml-runtime-debuginfo-4.14.2-150600.3.3.1
* ocaml-debuginfo-4.14.2-150600.3.3.1
* ocaml-ocamldoc-4.14.2-150600.3.3.1
* ocaml-ocamldoc-debuginfo-4.14.2-150600.3.3.1
* ocaml-compiler-libs-4.14.2-150600.3.3.1
* ocaml-compiler-libs-devel-4.14.2-150600.3.3.1
* ocaml-runtime-4.14.2-150600.3.3.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* ocaml-debugsource-4.14.2-150600.3.3.1
* ocaml-4.14.2-150600.3.3.1
* ocaml-runtime-debuginfo-4.14.2-150600.3.3.1
* ocaml-debuginfo-4.14.2-150600.3.3.1
* ocaml-ocamldoc-4.14.2-150600.3.3.1
* ocaml-ocamldoc-debuginfo-4.14.2-150600.3.3.1
* ocaml-compiler-libs-4.14.2-150600.3.3.1
* ocaml-compiler-libs-devel-4.14.2-150600.3.3.1
* ocaml-runtime-4.14.2-150600.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* ocaml-debugsource-4.14.2-150600.3.3.1
* ocaml-4.14.2-150600.3.3.1
* ocaml-runtime-debuginfo-4.14.2-150600.3.3.1
* ocaml-debuginfo-4.14.2-150600.3.3.1
* ocaml-ocamldoc-4.14.2-150600.3.3.1
* ocaml-ocamldoc-debuginfo-4.14.2-150600.3.3.1
* ocaml-compiler-libs-4.14.2-150600.3.3.1
* ocaml-compiler-libs-devel-4.14.2-150600.3.3.1
* ocaml-runtime-4.14.2-150600.3.3.1

## References:

* https://www.suse.com/security/cve/CVE-2026-28364.html
* https://bugzilla.suse.com/show_bug.cgi?id=1258992



SUSE-SU-2026:0825-1: low: Security update for php-composer2


# Security update for php-composer2

Announcement ID: SUSE-SU-2026:0825-1
Release Date: 2026-03-05T15:16:19Z
Rating: low
References:

* bsc#1255768

Cross-References:

* CVE-2025-67746

CVSS scores:

* CVE-2025-67746 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-67746 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-67746 ( NVD ): 1.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-67746 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* Web and Scripting Module 15-SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for php-composer2 fixes the following issues:

CVE-2025-67746: Fixed ANSI control characters injection in the terminal output
of various Composer commands via attacker controlled remote sources.
(bsc#1255768)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-825=1 openSUSE-SLE-15.6-2026-825=1

* Web and Scripting Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2026-825=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* php-composer2-2.6.4-150600.3.6.1
* Web and Scripting Module 15-SP7 (noarch)
* php-composer2-2.6.4-150600.3.6.1

## References:

* https://www.suse.com/security/cve/CVE-2025-67746.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255768



SUSE-SU-2026:0824-1: moderate: Security update for openCryptoki


# Security update for openCryptoki

Announcement ID: SUSE-SU-2026:0824-1
Release Date: 2026-03-05T15:16:08Z
Rating: moderate
References:

* bsc#1257116

Cross-References:

* CVE-2026-23893

CVSS scores:

* CVE-2026-23893 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
* CVE-2026-23893 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.4

An update that solves one vulnerability can now be installed.

## Description:

This update for openCryptoki fixes the following issues:

* CVE-2026-23893: Fixed privilege escalation or data exposure via symlink
following (bsc#1257116)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-824=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-824=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-824=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* openCryptoki-devel-3.17.0-150400.4.11.1
* openCryptoki-debugsource-3.17.0-150400.4.11.1
* openCryptoki-3.17.0-150400.4.11.1
* openCryptoki-debuginfo-3.17.0-150400.4.11.1
* openSUSE Leap 15.4 (i586)
* openCryptoki-32bit-debuginfo-3.17.0-150400.4.11.1
* openCryptoki-32bit-3.17.0-150400.4.11.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* openCryptoki-64bit-debuginfo-3.17.0-150400.4.11.1
* openCryptoki-64bit-3.17.0-150400.4.11.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (s390x)
* openCryptoki-debugsource-3.17.0-150400.4.11.1
* openCryptoki-3.17.0-150400.4.11.1
* openCryptoki-debuginfo-3.17.0-150400.4.11.1
* SUSE Linux Enterprise Micro 5.4 (s390x)
* openCryptoki-debugsource-3.17.0-150400.4.11.1
* openCryptoki-3.17.0-150400.4.11.1
* openCryptoki-debuginfo-3.17.0-150400.4.11.1

## References:

* https://www.suse.com/security/cve/CVE-2026-23893.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257116



SUSE-SU-2026:0826-1: moderate: Security update for expat


# Security update for expat

Announcement ID: SUSE-SU-2026:0826-1
Release Date: 2026-03-05T15:16:41Z
Rating: moderate
References:

* bsc#1257144
* bsc#1257496

Cross-References:

* CVE-2026-24515
* CVE-2026-25210

CVSS scores:

* CVE-2026-24515 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-24515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-24515 ( NVD ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-24515 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25210 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25210 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
* CVE-2026-25210 ( NVD ): 6.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4

An update that solves two vulnerabilities can now be installed.

## Description:

This update for expat fixes the following issues:

* CVE-2026-24515: Fixed a null dereference in XML_ExternalEntityParserCreate.
(bsc#1257144)
* CVE-2026-25210: Fixed an integer overflow in doContent. (bsc#1257496)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-826=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-826=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-826=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-826=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-826=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-826=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-826=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libexpat1-debuginfo-2.7.1-150400.3.34.1
* expat-debuginfo-2.7.1-150400.3.34.1
* libexpat-devel-2.7.1-150400.3.34.1
* expat-debugsource-2.7.1-150400.3.34.1
* libexpat1-2.7.1-150400.3.34.1
* expat-2.7.1-150400.3.34.1
* openSUSE Leap 15.4 (x86_64)
* libexpat-devel-32bit-2.7.1-150400.3.34.1
* expat-32bit-debuginfo-2.7.1-150400.3.34.1
* libexpat1-32bit-debuginfo-2.7.1-150400.3.34.1
* libexpat1-32bit-2.7.1-150400.3.34.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libexpat-devel-64bit-2.7.1-150400.3.34.1
* libexpat1-64bit-2.7.1-150400.3.34.1
* expat-64bit-debuginfo-2.7.1-150400.3.34.1
* libexpat1-64bit-debuginfo-2.7.1-150400.3.34.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libexpat1-debuginfo-2.7.1-150400.3.34.1
* expat-debuginfo-2.7.1-150400.3.34.1
* libexpat-devel-2.7.1-150400.3.34.1
* expat-debugsource-2.7.1-150400.3.34.1
* libexpat1-2.7.1-150400.3.34.1
* expat-2.7.1-150400.3.34.1
* openSUSE Leap 15.6 (x86_64)
* libexpat-devel-32bit-2.7.1-150400.3.34.1
* expat-32bit-debuginfo-2.7.1-150400.3.34.1
* libexpat1-32bit-debuginfo-2.7.1-150400.3.34.1
* libexpat1-32bit-2.7.1-150400.3.34.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libexpat1-debuginfo-2.7.1-150400.3.34.1
* expat-debugsource-2.7.1-150400.3.34.1
* expat-debuginfo-2.7.1-150400.3.34.1
* libexpat1-2.7.1-150400.3.34.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libexpat1-debuginfo-2.7.1-150400.3.34.1
* expat-debugsource-2.7.1-150400.3.34.1
* expat-debuginfo-2.7.1-150400.3.34.1
* libexpat1-2.7.1-150400.3.34.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libexpat1-debuginfo-2.7.1-150400.3.34.1
* expat-debugsource-2.7.1-150400.3.34.1
* expat-debuginfo-2.7.1-150400.3.34.1
* libexpat1-2.7.1-150400.3.34.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libexpat1-debuginfo-2.7.1-150400.3.34.1
* expat-debugsource-2.7.1-150400.3.34.1
* expat-debuginfo-2.7.1-150400.3.34.1
* libexpat1-2.7.1-150400.3.34.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libexpat1-debuginfo-2.7.1-150400.3.34.1
* expat-debugsource-2.7.1-150400.3.34.1
* expat-debuginfo-2.7.1-150400.3.34.1
* libexpat1-2.7.1-150400.3.34.1

## References:

* https://www.suse.com/security/cve/CVE-2026-24515.html
* https://www.suse.com/security/cve/CVE-2026-25210.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257144
* https://bugzilla.suse.com/show_bug.cgi?id=1257496



SUSE-SU-2026:0828-1: moderate: Security update for python-Authlib


# Security update for python-Authlib

Announcement ID: SUSE-SU-2026:0828-1
Release Date: 2026-03-05T15:17:02Z
Rating: moderate
References:

* bsc#1256414

Cross-References:

* CVE-2025-68158

CVSS scores:

* CVE-2025-68158 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68158 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
* CVE-2025-68158 ( NVD ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
* CVE-2025-68158 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for python-Authlib fixes the following issues:

* CVE-2025-68158: Fixed 1-click account takeover in applications that use the
Authlib library (bsc#1256414)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-828=1 openSUSE-SLE-15.6-2026-828=1

* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-828=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* python311-Authlib-1.3.1-150600.3.14.1
* Python 3 Module 15-SP7 (noarch)
* python311-Authlib-1.3.1-150600.3.14.1

## References:

* https://www.suse.com/security/cve/CVE-2025-68158.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256414



SUSE-SU-2026:0831-1: important: Security update for openvpn


# Security update for openvpn

Announcement ID: SUSE-SU-2026:0831-1
Release Date: 2026-03-05T15:18:18Z
Rating: important
References:

* bsc#1254486

Cross-References:

* CVE-2025-13086

CVSS scores:

* CVE-2025-13086 ( SUSE ): 4.6
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13086 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-13086 ( NVD ): 4.6
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13086 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for openvpn fixes the following issues:

* Updated to version 2.6.10 that fixes:
* CVE-2025-13086: improper validation of IP addresses that can cause denial of
service (bsc#1254486)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-831=1 openSUSE-SLE-15.6-2026-831=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-831=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-831=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-831=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* openvpn-dco-devel-2.6.10-150600.3.20.1
* openvpn-devel-2.6.10-150600.3.20.1
* openvpn-2.6.10-150600.3.20.1
* openvpn-debugsource-2.6.10-150600.3.20.1
* openvpn-down-root-plugin-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-2.6.10-150600.3.20.1
* openvpn-dco-debuginfo-2.6.10-150600.3.20.1
* openvpn-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-2.6.10-150600.3.20.1
* openvpn-down-root-plugin-debuginfo-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-debugsource-2.6.10-150600.3.20.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* openvpn-dco-devel-2.6.10-150600.3.20.1
* openvpn-devel-2.6.10-150600.3.20.1
* openvpn-2.6.10-150600.3.20.1
* openvpn-debugsource-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-2.6.10-150600.3.20.1
* openvpn-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-debugsource-2.6.10-150600.3.20.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* openvpn-dco-devel-2.6.10-150600.3.20.1
* openvpn-devel-2.6.10-150600.3.20.1
* openvpn-2.6.10-150600.3.20.1
* openvpn-debugsource-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-2.6.10-150600.3.20.1
* openvpn-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-debugsource-2.6.10-150600.3.20.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* openvpn-dco-devel-2.6.10-150600.3.20.1
* openvpn-devel-2.6.10-150600.3.20.1
* openvpn-2.6.10-150600.3.20.1
* openvpn-debugsource-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-2.6.10-150600.3.20.1
* openvpn-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-2.6.10-150600.3.20.1
* openvpn-auth-pam-plugin-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-debuginfo-2.6.10-150600.3.20.1
* openvpn-dco-debugsource-2.6.10-150600.3.20.1

## References:

* https://www.suse.com/security/cve/CVE-2025-13086.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254486



openSUSE-SU-2026:0071-1: important: Security update for roundcubemail


openSUSE Security Update: Security update for roundcubemail
_______________________________

Announcement ID: openSUSE-SU-2026:0071-1
Rating: important
References: #1255306 #1255308 #1257909 #1258052
Cross-References: CVE-2025-68460 CVE-2025-68461 CVE-2026-25916
CVE-2026-26079
CVSS scores:
CVE-2026-26079 (SUSE): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for roundcubemail fixes the following issues:

- update to 1.6.13 This is a security update to the stable version 1.6 of
Roundcube Webmail. It provides fixes to recently reported security
vulnerabilities:
+ Fix CSS injection vulnerability reported by CERT Polska (boo#1258052,
CVE-2026-26079).
+ Fix remote image blocking bypass via SVG content reported by
nullcathedral (boo#1257909, CVE-2026-25916). This version is
considered stable and we recommend to update all productive
installations of Roundcube 1.6.x with it. Please do backup your data
before updating! CHANGELOG
+ Managesieve: Fix handling of string-list format values for date tests
in Out of Office (#10075)
+ Fix CSS injection vulnerability reported by CERT Polska.
+ Fix remote image blocking bypass via SVG content reported by
nullcathedral.

- update to 1.6.12 This is a security update to the stable version 1.6 of
Roundcube Webmail. It provides fixes to recently reported security
vulnerabilities:

+ Fix Cross-Site-Scripting vulnerability via SVG's animate tag reported
by Valentin T., CrowdStrike (boo#1255308, CVE-2025-68461).
+ Fix Information Disclosure vulnerability in the HTML style sanitizer
reported by somerandomdev (boo#1255306, CVE-2025-68460). This version
is considered stable and we recommend to update all productive
installations of Roundcube 1.6.x with it.
+ Support IPv6 in database DSN (#9937)
+ Don't force specific error_reporting setting
+ Fix compatibility with PHP 8.5 regarding array_first()
+ Remove X-XSS-Protection example from .htaccess file (#9875)
+ Fix "Assign to group" action state after creation of a first group
(#9889)
+ Fix bug where contacts search would fail if contactlist_fields
contained vcard fields (#9850)
+ Fix bug where an mbox export file could include inconsistent message
delimiters (#9879)
+ Fix parsing of inline styles that aren't well-formatted (#9948)
+ Fix Cross-Site-Scripting vulnerability via SVG's animate tag
+ Fix Information Disclosure vulnerability in the HTML style sanitizer

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2026-71=1

Package List:

- openSUSE Backports SLE-15-SP6 (noarch):

roundcubemail-1.6.13-bp156.2.12.1

References:

https://www.suse.com/security/cve/CVE-2025-68460.html
https://www.suse.com/security/cve/CVE-2025-68461.html
https://www.suse.com/security/cve/CVE-2026-25916.html
https://www.suse.com/security/cve/CVE-2026-26079.html
https://bugzilla.suse.com/1255306
https://bugzilla.suse.com/1255308
https://bugzilla.suse.com/1257909
https://bugzilla.suse.com/1258052



openSUSE-SU-2026:0070-1: important: Security update for roundcubemail


openSUSE Security Update: Security update for roundcubemail
_______________________________

Announcement ID: openSUSE-SU-2026:0070-1
Rating: important
References: #1255306 #1255308 #1257909 #1258052
Cross-References: CVE-2025-68460 CVE-2025-68461 CVE-2026-25916
CVE-2026-26079
CVSS scores:
CVE-2026-26079 (SUSE): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for roundcubemail fixes the following issues:

- update to 1.6.13 This is a security update to the stable version 1.6 of
Roundcube Webmail. It provides fixes to recently reported security
vulnerabilities:
+ Fix CSS injection vulnerability reported by CERT Polska (boo#1258052,
CVE-2026-26079).
+ Fix remote image blocking bypass via SVG content reported by
nullcathedral (boo#1257909, CVE-2026-25916). This version is
considered stable and we recommend to update all productive
installations of Roundcube 1.6.x with it. Please do backup your data
before updating! CHANGELOG
+ Managesieve: Fix handling of string-list format values for date tests
in Out of Office (#10075)
+ Fix CSS injection vulnerability reported by CERT Polska.
+ Fix remote image blocking bypass via SVG content reported by
nullcathedral.

- update to 1.6.12 This is a security update to the stable version 1.6 of
Roundcube Webmail. It provides fixes to recently reported security
vulnerabilities:

+ Fix Cross-Site-Scripting vulnerability via SVG's animate tag reported
by Valentin T., CrowdStrike (boo#1255308, CVE-2025-68461).
+ Fix Information Disclosure vulnerability in the HTML style sanitizer
reported by somerandomdev (boo#1255306, CVE-2025-68460). This version
is considered stable and we recommend to update all productive
installations of Roundcube 1.6.x with it.
+ Support IPv6 in database DSN (#9937)
+ Don't force specific error_reporting setting
+ Fix compatibility with PHP 8.5 regarding array_first()
+ Remove X-XSS-Protection example from .htaccess file (#9875)
+ Fix "Assign to group" action state after creation of a first group
(#9889)
+ Fix bug where contacts search would fail if contactlist_fields
contained vcard fields (#9850)
+ Fix bug where an mbox export file could include inconsistent message
delimiters (#9879)
+ Fix parsing of inline styles that aren't well-formatted (#9948)
+ Fix Cross-Site-Scripting vulnerability via SVG's animate tag
+ Fix Information Disclosure vulnerability in the HTML style sanitizer

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP7:

zypper in -t patch openSUSE-2026-70=1

Package List:

- openSUSE Backports SLE-15-SP7 (noarch):

roundcubemail-1.6.13-bp157.2.6.1

References:

https://www.suse.com/security/cve/CVE-2025-68460.html
https://www.suse.com/security/cve/CVE-2025-68461.html
https://www.suse.com/security/cve/CVE-2026-25916.html
https://www.suse.com/security/cve/CVE-2026-26079.html
https://bugzilla.suse.com/1255306
https://bugzilla.suse.com/1255308
https://bugzilla.suse.com/1257909
https://bugzilla.suse.com/1258052



openSUSE-SU-2026:0069-1: important: Security update for python-nltk


openSUSE Security Update: Security update for python-nltk
_______________________________

Announcement ID: openSUSE-SU-2026:0069-1
Rating: important
References: #1259232
Cross-References: CVE-2026-0847
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________

An update that fixes one vulnerability is now available.

Description:

This update for python-nltk fixes the following issues:

- CVE-2026-0847: Fixed an issue where improper sanitization of file paths
could lead to path traversal (boo#1259232)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP7:

zypper in -t patch openSUSE-2026-69=1

Package List:

- openSUSE Backports SLE-15-SP7 (noarch):

python3-nltk-3.7-bp157.3.6.1

References:

https://www.suse.com/security/cve/CVE-2026-0847.html
https://bugzilla.suse.com/1259232



openSUSE-SU-2026:20301-1: important: Security update for go1.25-openssl


openSUSE security update: security update for go1.25-openssl
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20301-1
Rating: important
References:

* bsc#1244485
* bsc#1245878
* bsc#1249985
* bsc#1251253
* bsc#1251254
* bsc#1251255
* bsc#1251256
* bsc#1251257
* bsc#1251258
* bsc#1251259
* bsc#1251260
* bsc#1251261
* bsc#1251262
* bsc#1254227
* bsc#1254430
* bsc#1254431
* bsc#1256816
* bsc#1256817
* bsc#1256818
* bsc#1256819
* bsc#1256820
* bsc#1256821
* bsc#1257486

Cross-References:

* CVE-2025-47912
* CVE-2025-58183
* CVE-2025-58185
* CVE-2025-58186
* CVE-2025-58187
* CVE-2025-58188
* CVE-2025-58189
* CVE-2025-61723
* CVE-2025-61724
* CVE-2025-61725
* CVE-2025-61726
* CVE-2025-61727
* CVE-2025-61728
* CVE-2025-61729
* CVE-2025-61730
* CVE-2025-61731
* CVE-2025-68119
* CVE-2025-68121

CVSS scores:

* CVE-2025-47912 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-47912 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-58183 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-58183 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58185 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58185 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58186 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58186 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58187 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58187 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58188 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-58188 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-58189 ( SUSE ): 4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2025-58189 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
* CVE-2025-61723 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-61723 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-61724 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-61724 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-61725 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61725 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61726 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61726 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61727 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61728 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61729 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61729 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61730 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-61730 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-61731 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-61731 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68119 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68119 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-68121 ( SUSE ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 18 vulnerabilities and has 23 bug fixes can now be installed.

Description:

This update for go1.25-openssl fixes the following issues:

- Update to version 1.25.7 (jsc#SLE-18320)
- CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821)
- CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820)
- CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819)
- CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817)
- CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816)
- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818)
- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431)
- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SA (bsc#1254430)
- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255)
- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253)
- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260)
- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258)
- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259)
- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256)
- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261)
- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257)
- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254)
- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262)

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-339=1

Package List:

- openSUSE Leap 16.0:

go1.25-openssl-1.25.7-160000.1.1
go1.25-openssl-doc-1.25.7-160000.1.1
go1.25-openssl-race-1.25.7-160000.1.1

References:

* https://www.suse.com/security/cve/CVE-2025-47912.html
* https://www.suse.com/security/cve/CVE-2025-58183.html
* https://www.suse.com/security/cve/CVE-2025-58185.html
* https://www.suse.com/security/cve/CVE-2025-58186.html
* https://www.suse.com/security/cve/CVE-2025-58187.html
* https://www.suse.com/security/cve/CVE-2025-58188.html
* https://www.suse.com/security/cve/CVE-2025-58189.html
* https://www.suse.com/security/cve/CVE-2025-61723.html
* https://www.suse.com/security/cve/CVE-2025-61724.html
* https://www.suse.com/security/cve/CVE-2025-61725.html
* https://www.suse.com/security/cve/CVE-2025-61726.html
* https://www.suse.com/security/cve/CVE-2025-61727.html
* https://www.suse.com/security/cve/CVE-2025-61728.html
* https://www.suse.com/security/cve/CVE-2025-61729.html
* https://www.suse.com/security/cve/CVE-2025-61730.html
* https://www.suse.com/security/cve/CVE-2025-61731.html
* https://www.suse.com/security/cve/CVE-2025-68119.html
* https://www.suse.com/security/cve/CVE-2025-68121.html



openSUSE-SU-2026:20298-1: moderate: Security update for assertj-core


openSUSE security update: security update for assertj-core
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20298-1
Rating: moderate
References:

* bsc#1257293

Cross-References:

* CVE-2026-24400

CVSS scores:

* CVE-2026-24400 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2026-24400 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for assertj-core fixes the following issues:

Upgrade to version 3.27.7:

- CVE-2026-24400: Fix XXE vulnerability in isXmlEqualTo assertion (bsc#1257293).

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-336=1

Package List:

- openSUSE Leap 16.0:

assertj-core-3.27.7-160000.1.1
assertj-core-javadoc-3.27.7-160000.1.1

References:

* https://www.suse.com/security/cve/CVE-2026-24400.html



openSUSE-SU-2026:10282-1: moderate: python311-Django4-4.2.29-1.1 on GA media


# python311-Django4-4.2.29-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10282-1
Rating: moderate

Cross-References:

* CVE-2026-25674

CVSS scores:

* CVE-2026-25674 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-25674 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python311-Django4-4.2.29-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311-Django4 4.2.29-1.1
* python313-Django4 4.2.29-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25674.html



openSUSE-SU-2026:10278-1: moderate: ImageMagick-7.1.2.15-2.1 on GA media


# ImageMagick-7.1.2.15-2.1 on GA media

Announcement ID: openSUSE-SU-2026:10278-1
Rating: moderate

Cross-References:

* CVE-2026-24484
* CVE-2026-27798

CVSS scores:

* CVE-2026-24484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-27798 ( SUSE ): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-27798 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the ImageMagick-7.1.2.15-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* ImageMagick 7.1.2.15-2.1
* ImageMagick-config-7-SUSE 7.1.2.15-2.1
* ImageMagick-devel 7.1.2.15-2.1
* ImageMagick-devel-32bit 7.1.2.15-2.1
* ImageMagick-doc 7.1.2.15-2.1
* ImageMagick-extra 7.1.2.15-2.1
* libMagick++-7_Q16HDRI5 7.1.2.15-2.1
* libMagick++-7_Q16HDRI5-32bit 7.1.2.15-2.1
* libMagick++-devel 7.1.2.15-2.1
* libMagick++-devel-32bit 7.1.2.15-2.1
* libMagickCore-7_Q16HDRI10 7.1.2.15-2.1
* libMagickCore-7_Q16HDRI10-32bit 7.1.2.15-2.1
* libMagickWand-7_Q16HDRI10 7.1.2.15-2.1
* libMagickWand-7_Q16HDRI10-32bit 7.1.2.15-2.1
* perl-PerlMagick 7.1.2.15-2.1

## References:

* https://www.suse.com/security/cve/CVE-2026-24484.html
* https://www.suse.com/security/cve/CVE-2026-27798.html