SUSE 5637 Published by

SUSE recently pushed a batch of security patches for openSUSE systems that tackle dozens of vulnerabilities across several key packages. MozillaThunderbird and FreeRDP receive the most urgent attention, as their updates resolve severe memory corruption flaws and potential remote execution risks. Additional updates cover moderate and important vulnerabilities in Helm, Trivy, Xen, himmelblau, plus a necessary kernel refresh for Leap 15.6.

openSUSE-SU-2026:10660-1: moderate: xen-4.21.1_04-1.1 on GA media
openSUSE-SU-2026:20657-1: important: Security update for freerdp
openSUSE-SU-2026:20662-1: moderate: Security update for hauler
openSUSE-SU-2026:20664-1: important: Security update for MozillaThunderbird
openSUSE-SU-2026:20659-1: moderate: Security update for libspectre
openSUSE-SU-2026:20655-1: moderate: Security update for helm
openSUSE-SU-2026:20658-1: moderate: Security update for himmelblau
SUSE-SU-2026:1671-2: important: Security update for the Linux Kernel
openSUSE-SU-2026:0163-1: important: Security update for trivy




openSUSE-SU-2026:10660-1: moderate: xen-4.21.1_04-1.1 on GA media


# xen-4.21.1_04-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10660-1
Rating: moderate

Cross-References:

* CVE-2026-23557
* CVE-2026-23558

CVSS scores:

* CVE-2026-23557 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2026-23558 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-23558 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the xen-4.21.1_04-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* xen 4.21.1_04-1.1
* xen-devel 4.21.1_04-1.1
* xen-doc-html 4.21.1_04-1.1
* xen-libs 4.21.1_04-1.1
* xen-tools 4.21.1_04-1.1
* xen-tools-domU 4.21.1_04-1.1
* xen-tools-xendomains-wait-disk 4.21.1_04-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-23557.html
* https://www.suse.com/security/cve/CVE-2026-23558.html



openSUSE-SU-2026:20657-1: important: Security update for freerdp


openSUSE security update: security update for freerdp
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20657-1
Rating: important
References:

* bsc#1258919
* bsc#1258920
* bsc#1258921
* bsc#1258923
* bsc#1258924
* bsc#1258973
* bsc#1258976
* bsc#1258977
* bsc#1258979
* bsc#1258982
* bsc#1258985
* bsc#1259653
* bsc#1259679
* bsc#1259680
* bsc#1259684
* bsc#1259686
* bsc#1259689
* bsc#1259692
* bsc#1259693
* bsc#1261196
* bsc#1261198
* bsc#1261200
* bsc#1261211
* bsc#1261217
* bsc#1261222
* bsc#1261223
* bsc#1261226
* bsc#1261227

Cross-References:

* CVE-2026-25941
* CVE-2026-25942
* CVE-2026-25952
* CVE-2026-25953
* CVE-2026-25954
* CVE-2026-25955
* CVE-2026-25959
* CVE-2026-25997
* CVE-2026-26271
* CVE-2026-26955
* CVE-2026-26965
* CVE-2026-29774
* CVE-2026-29775
* CVE-2026-29776
* CVE-2026-31806
* CVE-2026-31883
* CVE-2026-31884
* CVE-2026-31885
* CVE-2026-31897
* CVE-2026-33952
* CVE-2026-33977
* CVE-2026-33982
* CVE-2026-33983
* CVE-2026-33984
* CVE-2026-33985
* CVE-2026-33986
* CVE-2026-33987
* CVE-2026-33995

CVSS scores:

* CVE-2026-25941 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-25941 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-25942 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25942 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25952 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25952 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25953 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25953 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25954 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25954 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25955 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-25955 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25959 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-25959 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25997 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-25997 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-26955 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-26955 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-26965 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-26965 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-29774 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-29774 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-29775 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-29775 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-29776 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-29776 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-31806 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-31806 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-31883 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-31883 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-31884 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-31884 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-31885 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
* CVE-2026-31885 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-31897 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-31897 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-33952 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-33952 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33977 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-33977 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2026-33983 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-33983 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33984 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-33984 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33985 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:L
* CVE-2026-33985 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-33986 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-33987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2026-33995 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 28 vulnerabilities and has 28 bug fixes can now be installed.

Description:

This update for freerdp fixes the following issues:

Update to version 3.24.2.

Security issues fixed:

- CVE-2026-25941: out-of-bounds read in the FreeRDP client RDPGFX channel (bsc#1258919).
- CVE-2026-25942: buffer overflow of global array in `xf_rail_server_execute_result` (bsc#1258920).
- CVE-2026-25952: heap use-after-free in `xf_SetWindowMinMaxInfo` (bsc#1258921).
- CVE-2026-25953: heap use-after-free in `xf_AppUpdateWindowFromSurface` (bsc#1258923).
- CVE-2026-25954: heap use-after-free in `xf_rail_server_local_move_size` (bsc#1258924).
- CVE-2026-25955: heap use-after-free in `xf_AppUpdateWindowFromSurface` (bsc#1258973).
- CVE-2026-25959: heap use-after-free in `xf_cliprdr_provide_data_` (bsc#1258976).
- CVE-2026-25997: heap use-after-free in `xf_clipboard_format_equal` (bsc#1258977).
- CVE-2026-26271: buffer overread in FreeRDP icon processing (bsc#1258979).
- CVE-2026-26955: out-of-bounds write in FreeRDP clients using the GDI surface pipeline (bsc#1258982).
- CVE-2026-26965: out-of-bounds write in FreeRDP client RLE planar decode path (bsc#1258985).
- CVE-2026-29774: heap buffer overflow in the FreeRDP client's AVC420/AVC444 YUV-to-RGB conversion path (bsc#1259689).
- CVE-2026-29775: out-of-bounds access in the FreeRDP client bitmap cache subsystem (bsc#1259684).
- CVE-2026-29776: integer underflow in `update_read_cache_bitmap_order` (bsc#1259692).
- CVE-2026-31806: heap buffer overflow in `nsc_process_message` (bsc#1259653).
- CVE-2026-31883: heap buffer overwrite due to a `size_t` underflow in the IMA-ADPCM and MS-ADPCM audio decoders
(bsc#1259679).
- CVE-2026-31884: division by zero in MS-ADPCM and IMA-ADPCM decoders (bsc#1259680).
- CVE-2026-31885: out-of-bounds read in MS-ADPCM and IMA-ADPCM decoders (bsc#1259686).
- CVE-2026-31897: out-of-bounds read in `freerdp_bitmap_decompress_planar` (bsc#1259693).
- CVE-2026-33952: client-side crash due to `WINPR_ASSERT()` failure in `rts_read_auth_verifier_no_checks()`
(bsc#1261196).
- CVE-2026-33977: client-side crash due to `WINPR_ASSERT()` failure in IMA ADPCM audio decoder (bsc#1261198).
- CVE-2026-33982: heap buffer overread in in `winpr_aligned_offset_recalloc` (bsc#1261222).
- CVE-2026-33983: undefined behavior and resource exhaustion via 80 billion iteration loop in
`progressive_decompress_tile_upgrade` (bsc#1261200).
- CVE-2026-33984: heap buffer overflow in ClearCodec `resize_vbar_entry` (bsc#1261211).
- CVE-2026-33985: heap out-of-bounds read in `clear_decompress_glyph_data` (bsc#1261217).
- CVE-2026-33986: heap out-of-bounds write due to H.264 YUV buffer dimension desync (bsc#1261223).
- CVE-2026-33987: heap out-of-bounds write due to persistent cache bmpSize desync (bsc#1261226).
- CVE-2026-33995: double-free vulnerability in `kerberos_AcceptSecurityContext` and
`kerberos_InitializeSecurityContextA` (bsc#1261227).

Other updates and bugfixes:

- Version 3.24.2:
* [channels,video] fix wrong cast (#12511)
* [codec,openh264] reject encoder ABI mismatch on runtime-loaded library (#12510)
* [client,sdl] create a copy of rdpPointer (#12512)
* [codec,video] properly pass intermediate format (#12518)
* [utils, signal] lazily initialize Windows CRITICAL_SECTION to match POSIX static mutex behavior (#12520) winpr:
improve libunwind backtraces (#12530)
* [server,shadow] remember selected caps (#12528)
* Zero credential data before free in NLA and NTLM context (#12532)
* [server,proxy] ignore missing client in input channel (#12536)
* [server,proxy] ignore rdpdr messages (#12537)
* [winpr,sspi] improve kerberos logging (#12538)
* Codec fixes (#12542)

- Version 3.24.1:
* [warnings] fix various sign and cast warnings (#12480)
* [client,x11] start with xfc->remote_app = TRUE; (#12491)
* Sam file read regression fix (#12484)
* [ncrypt,smartcardlogon] support ECC keys in PKCS#11 smartcard enumeration (#12490)
* Fix: memory leak in rdp_client_establish_keys() (#12494)
* Fix memory leak in freerdp_settings_int_buffer_copy() on error paths (libfreerdp/core/settings.c) (#12486)
* Code Cleanups (#12493)
* Fix: memory leak in PCSC_SCardListReadersW() (#12495)
* [channels,telemetry] use dynamic logging (#12496)
* [channel,gfx] use generic plugin log (@12498, #12499)
* [channels,audin] set error when audio_format_read fails (#12500)
* [channels,video] unify error handling (#12502)
* Fastpath fine grained lock (#12503)
* [core,update] make the PlaySound callback non-mandatory (#12504)
* Refinements: RPM build updates, FIPS improvements (#12506)

- Version 3.24.0:
* Completed the [[nodiscard]] marking of the API to warn about problematic
* unchecked use of functions
* Added full C23 support (default stays at C11) to allow new compilers
* to do stricter checking
* Improved X11 and SDL3 clients
* Improved smartcard support
* proxy now supports RFX graphics mode
* Attribute nodiscard related chanes (#12325, #12360, #12395, #12406, #12421, #12426, #12177, #12403, #12405, #12407,
#12409, #12408, #12412, #12413)
* c23 related improvements (#12368, #12371, #12379, #12381, #12383, #12385, #12386, #12387, #12384)
* Generic code cleanups (#12382, #12439, #12455, #12462, #12399, #12473) [core,utils] ignore NULL values in
remove_rdpdr_type (#12372)
* [codec,fdk] revert use of WinPR types (#12373)
* [core,gateway] ignore incomplete rpc header (#12375, #12376)
* [warnings] make function declaration names consistent (#12377)
* [libfreerdp] Add new define for logon error info (#12380)
* [client,x11] improve rails window locking (#12392)
* Reload fix missing null checks (#12396)
* Bounds checks (#12400)
* [server,proxy] check for nullptr before using scard_call_context (#12404)
* [uwac] fix rectangular glitch around surface damage regions (#12410)
* Address various error handling inconsistencies (#12411)
* [core,server] Improve WTS API locking (#12414)
* Address some GCC compile issues (#12415, #12420)
* Winpr atexit (#12416)
* [winpr,smartcard] fix function pointer casts (#12422)
* Xf timer fix (#12423)
* [client,sdl] workaround for wlroots compositors (#12425)
* [client,sdl] fix SdlWindow::query (#12378)
* [winpr,smartcard] fix PCSC_ReleaseCardContext (#12427)
* [client,x11] eliminate obsolete compile flags (#12428)
* [client,common] skip sending input events when not connected (#12429)
* Input connected checks (#12430)
* Floatbar and display channel improvements (#12431)
* [winpr,platform] fix WINPR_ATTR_NODISCARD definition (#12432)
* [client] Fix writing of gatewayusagemethod to .rdp files (#12433)
* Nodiscard finetune (#12435)
* [core] fix missing gateway credential sync (#12436)
* [client,sdl3] limit FREERDP_WLROOTS_HACK (#12441)
* [core,settings] Allow FreeRDP_instance in setter (#12442)
* [codec,h264] make log message trace (#12444)
* X11 rails improve (#12440)
* [codec,nsc] limit copy area in nsc_process_message (#12448)
* Proxy support RFX and NSC settings (#12449)
* [client,common] display a shortened help on parsing issues (#12450)
* [winpr,smartcard] refine locking for pcsc layer (#12451)
* [codec,swscale] allow runtime loading of swscale (#12452)
* Swscale fallback (#12454)
* Sdl multi scaling support (#12456)
* [packaging,flatpak] update runtime and dependencies (#12457)
* [codec,video] add doxygen version details (#12458)
* [github,templates] update templates (#12460)
* [client,sdl] allow FREERDP_WLROOTS_HACK for all sessions (#12461)
* [warnings,nodiscard] add log messages for failures (#12463)
* [gdi,gdi] ignore empty rectangles (#12467)
* Smartcard fix smartcard-login, pass rdpContext for abort (#12466)
* [winpr,smartcard] fix compiler warnings (#12469)
* [winpr,timezone] fix search for transition dates (#12468)
* [client,common] improve /p help (#12471)
* Scard logging refactored (#12472)
* [emu,scard] fix smartcard emulation (#12475)
* Sdl null cursor (#12474)

- Version 3.23.0:
* Sdl cleanup (#12202)
* [client,sdl] do not apply window offset (#12205)
* [client,sdl] add SDL_Error to exceptions (#12214)
* Rdp monitor log (#12215)
* [winpr,smartcard] implement some attributes (#12213)
* [client,windows] Fix return value checks for mouse event functions (#12279)
* [channels,rdpecam] fix sws context checks (#12272)
* [client,windows] Enhance error handling and context validation (#12264)
* [client,windows] Add window handle validation in RDP_EVENT_TYPE_WINDOW_NEW (#12261)
* [client,sdl] fix multimon/fullscreen on wayland (#12248)
* Vendor by app (#12207)
* [core,gateway] relax TSG parsing (#12283)
* [winpr,smartcard] simplify PCSC_ReadDeviceSystemName (#12273)
* [client,windows] Implement complete keyboard indicator synchronization (#12268)
* Fixes more more more (#12286)
* Use application details for names (#12285)
* warning cleanups (#12289)
* Warning cleanup (#12291)
* [client,windows] Enhance memory safety with NULL checks and resource protection (#12271)
* [client,x11] apply /size:xx% only once (#12293)
* Freerdp config test (#12295)
* [winpr,smartcard] fix returned attribute length (#12296)
* [client,SDL3] Fix properly handle smart-sizing with fullscreen (#12298)
* [core,test] fix use after free (#12299)
* Sign warnings (#12300)
* [cmake,compiler] disable -Wjump-misses-init (#12301)
* [codec,color] fix input length checks (#12302)
* [client,sdl] improve cursor updates, fix surface sizes (#12303)
* Sdl fullscreen (#12217)
* [client,sdl] fix move constructor of SdlWindow (#12305)
* [utils,smartcard] check stream length on padding (#12306)
* [android] Fix invert scrolling default value mismatch (#12309)
* Clear fix bounds checks (#12310)
* Winpr attr nodiscard fkt ptr (#12311)
* [codec,planar] fix missing destination bounds checks (#12312)
* [codec,clear] fix destination checks (#12315)
* NSC Codec fixes (#12317)
* Freerdp api nodiscard (#12313)
* [allocations] fix growth of preallocated buffers (#12319)
* Rdpdr simplify (#12320)
* Resource fix (#12323)
* [winpr,utils] ensure message queue capacity (#12322)
* [server,shadow] fix return and parameter checks (#12330)
* Shadow fixes (#12331)
* [rdtk,nodiscard] mark rdtk API nodiscard (#12329)
* [client,x11] fix XGetWindowProperty return handling (#12334)
* Win32 signal (#12335)
* [channel,usb] fix message parsing and creation (#12336)
* [cmake] Define WINPR_DEFINE_ATTR_NODISCARD (#12338)
* Proxy config fix (#12345)
* [codec,progressive] refine progressive decoding (#12347)
* [client,sdl] fix sdl_Pointer_New (#12350)
* [core,gateway] parse [MS-TSGU] 2.2.10.5 HTTP_CHANNEL_RESPONSE_OPTIONAL (#12353)
* X11 kbd sym (#12354)
* Windows compile warning fixes (#12357,#12358,#12359)

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-663=1

Package List:

- openSUSE Leap 16.0:

freerdp-3.24.2-160000.1.1
freerdp-devel-3.24.2-160000.1.1
freerdp-proxy-3.24.2-160000.1.1
freerdp-proxy-plugins-3.24.2-160000.1.1
freerdp-sdl-3.24.2-160000.1.1
freerdp-server-3.24.2-160000.1.1
freerdp-wayland-3.24.2-160000.1.1
libfreerdp-server-proxy3-3-3.24.2-160000.1.1
libfreerdp3-3-3.24.2-160000.1.1
librdtk0-0-3.24.2-160000.1.1
libuwac0-0-3.24.2-160000.1.1
libwinpr3-3-3.24.2-160000.1.1
rdtk0-devel-3.24.2-160000.1.1
uwac0-devel-3.24.2-160000.1.1
winpr-devel-3.24.2-160000.1.1

References:

* https://www.suse.com/security/cve/CVE-2026-25941.html
* https://www.suse.com/security/cve/CVE-2026-25942.html
* https://www.suse.com/security/cve/CVE-2026-25952.html
* https://www.suse.com/security/cve/CVE-2026-25953.html
* https://www.suse.com/security/cve/CVE-2026-25954.html
* https://www.suse.com/security/cve/CVE-2026-25955.html
* https://www.suse.com/security/cve/CVE-2026-25959.html
* https://www.suse.com/security/cve/CVE-2026-25997.html
* https://www.suse.com/security/cve/CVE-2026-26271.html
* https://www.suse.com/security/cve/CVE-2026-26955.html
* https://www.suse.com/security/cve/CVE-2026-26965.html
* https://www.suse.com/security/cve/CVE-2026-29774.html
* https://www.suse.com/security/cve/CVE-2026-29775.html
* https://www.suse.com/security/cve/CVE-2026-29776.html
* https://www.suse.com/security/cve/CVE-2026-31806.html
* https://www.suse.com/security/cve/CVE-2026-31883.html
* https://www.suse.com/security/cve/CVE-2026-31884.html
* https://www.suse.com/security/cve/CVE-2026-31885.html
* https://www.suse.com/security/cve/CVE-2026-31897.html
* https://www.suse.com/security/cve/CVE-2026-33952.html
* https://www.suse.com/security/cve/CVE-2026-33977.html
* https://www.suse.com/security/cve/CVE-2026-33982.html
* https://www.suse.com/security/cve/CVE-2026-33983.html
* https://www.suse.com/security/cve/CVE-2026-33984.html
* https://www.suse.com/security/cve/CVE-2026-33985.html
* https://www.suse.com/security/cve/CVE-2026-33986.html
* https://www.suse.com/security/cve/CVE-2026-33987.html
* https://www.suse.com/security/cve/CVE-2026-33995.html



openSUSE-SU-2026:20662-1: moderate: Security update for hauler


openSUSE security update: security update for hauler
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20662-1
Rating: moderate
References:

* bsc#1258614

Cross-References:

* CVE-2026-24122

CVSS scores:

* CVE-2026-24122 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-24122 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for hauler fixes the following issues:

Changes in hauler:

- update to 1.4.2 (bsc#1258614, CVE-2026-24122):
* Bump github.com/theupdateframework/go-tuf/v2 from 2.3.0 to
2.3.1 in the go_modules group across 1 directory
* fix for new helm chart features
* Bump github.com/sigstore/rekor from 1.4.3 to 1.5.0 in the
go_modules group across 1 directory
* Bump github.com/sigstore/sigstore from 1.10.3 to 1.10.4 in
the go_modules group across 1 directory
* Bump github.com/theupdateframework/go-tuf/v2 from 2.3.1 to
2.4.1 in the go_modules group across 1 directory
* update cosign fork to 3.0.4 plus dep tidy
* fix: Fix file:// dependency chart path resolution
* update github.com/olekukonko/tablewriter to v1.1.2
* keep registry on image rewrite if not specified
* Bump github.com/theupdateframework/go-tuf/v2 from 2.3.1 to
2.4.1 in the go_modules group across 1 directory
* fix: handling of file referenced dependencies without
repository field
* Bump go.opentelemetry.io/otel/sdk from 1.39.0 to 1.40.0 in
the go_modules group across 1 directory
* dev.md file
* smaller changes and updates for v1.4.2 release

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-packagehub-228=1

Package List:

- openSUSE Leap 16.0:

hauler-1.4.2-bp160.1.1

References:

* https://www.suse.com/security/cve/CVE-2026-24122.html



openSUSE-SU-2026:20664-1: important: Security update for MozillaThunderbird


openSUSE security update: security update for mozillathunderbird
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20664-1
Rating: important
References:

* bsc#1260083
* bsc#1262230

Cross-References:

* CVE-2025-59375
* CVE-2026-3889
* CVE-2026-4371
* CVE-2026-4684
* CVE-2026-4685
* CVE-2026-4686
* CVE-2026-4687
* CVE-2026-4688
* CVE-2026-4689
* CVE-2026-4690
* CVE-2026-4691
* CVE-2026-4692
* CVE-2026-4693
* CVE-2026-4694
* CVE-2026-4695
* CVE-2026-4696
* CVE-2026-4697
* CVE-2026-4698
* CVE-2026-4699
* CVE-2026-4700
* CVE-2026-4701
* CVE-2026-4702
* CVE-2026-4704
* CVE-2026-4705
* CVE-2026-4706
* CVE-2026-4707
* CVE-2026-4708
* CVE-2026-4709
* CVE-2026-4710
* CVE-2026-4711
* CVE-2026-4712
* CVE-2026-4713
* CVE-2026-4714
* CVE-2026-4715
* CVE-2026-4716
* CVE-2026-4717
* CVE-2026-4718
* CVE-2026-4719
* CVE-2026-4720
* CVE-2026-4721
* CVE-2026-5731
* CVE-2026-5732
* CVE-2026-5734
* CVE-2026-6746
* CVE-2026-6747
* CVE-2026-6748
* CVE-2026-6749
* CVE-2026-6750
* CVE-2026-6751
* CVE-2026-6752
* CVE-2026-6753
* CVE-2026-6754
* CVE-2026-6757
* CVE-2026-6759
* CVE-2026-6761
* CVE-2026-6762
* CVE-2026-6763
* CVE-2026-6764
* CVE-2026-6765
* CVE-2026-6766
* CVE-2026-6767
* CVE-2026-6769
* CVE-2026-6770
* CVE-2026-6771
* CVE-2026-6772
* CVE-2026-6776
* CVE-2026-6785
* CVE-2026-6786

CVSS scores:

* CVE-2025-59375 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59375 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-3889 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2026-4371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-4684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4685 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4686 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4687 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-4688 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-4689 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-4690 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-4691 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4692 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-4693 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4694 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4695 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4696 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4697 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4698 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4699 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4700 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2026-4701 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4702 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4704 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-4705 ( SUSE ): 5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4706 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4707 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4708 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4709 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4710 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4711 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4712 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2026-4713 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4714 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4715 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4716 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4717 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4718 ( SUSE ): 5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4719 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2026-4720 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-4721 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-5731 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-5732 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-5734 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 68 vulnerabilities and has 2 bug fixes can now be installed.

Description:

This update for MozillaThunderbird fixes the following issues:

Changes in MozillaThunderbird:

- Mozilla Thunderbird 140.10.0 ESR
* Newly translated strings were not available in Thunderbird
MFSA 2026-34 (bsc#1262230)
* CVE-2026-6746 Use-after-free in the DOM: Core & HTML component
* CVE-2026-6747 Use-after-free in the WebRTC component
* CVE-2026-6748 Uninitialized memory in the Audio/Video: Web Codecs component
* CVE-2026-6749 Information disclosure due to uninitialized memory in the Graphics: Canvas2D component
* CVE-2026-6750 Privilege escalation in the Graphics: WebRender component
* CVE-2026-6751 Uninitialized memory in the Audio/Video: Web Codecs component
* CVE-2026-6752 Incorrect boundary conditions in the WebRTC component
* CVE-2026-6753 Incorrect boundary conditions in the WebRTC component
* CVE-2026-6754 Use-after-free in the JavaScript Engine component
* CVE-2026-6757 Invalid pointer in the JavaScript: WebAssembly component
* CVE-2026-6759 Use-after-free in the Widget: Cocoa component
* CVE-2026-6761 Privilege escalation in the Networking component
* CVE-2026-6762 Spoofing issue in the DOM: Core & HTML component
* CVE-2026-6763 Mitigation bypass in the File Handling component
* CVE-2026-6764 Incorrect boundary conditions in the DOM: Device Interfaces component
* CVE-2026-6765 Information disclosure in the Form Autofill component
* CVE-2026-6766 Incorrect boundary conditions in the Libraries component in NSS
* CVE-2026-6767 Other issue in the Libraries component in NSS
* CVE-2026-6769 Privilege escalation in the Debugger component
* CVE-2026-6770 Other issue in the Storage: IndexedDB component
* CVE-2026-6771 Mitigation bypass in the DOM: Security component
* CVE-2026-6772 Incorrect boundary conditions in the Libraries component in NSS
* CVE-2026-6776 Incorrect boundary conditions in the WebRTC: Networking component
* CVE-2026-6785 Memory safety bugs fixed in Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150
* CVE-2026-6786 Memory safety bugs fixed in Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150

- Mozilla Thunderbird 140.9.1 ESR
MFSA 2026-29
* CVE-2026-5732 Incorrect boundary conditions, integer overflow in the Graphics: Text component
* CVE-2026-5731 Memory safety bugs fixed in Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2
* CVE-2026-5734 Memory safety bugs fixed in Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2

- Mozilla Thunderbird 140.9.0 ESR
MFSA 2026-24 (bsc#1260083)
* CVE-2026-3889 Spoofing issue in Thunderbird
* CVE-2026-4371 Out of bounds read in IMAP parsing
* CVE-2026-4684 Race condition, use-after-free in the Graphics: WebRender component
* CVE-2026-4685 Incorrect boundary conditions in the Graphics: Canvas2D component
* CVE-2026-4686 Incorrect boundary conditions in the Graphics: Canvas2D component
* CVE-2026-4687 Sandbox escape due to incorrect boundary conditions in the Telemetry component
* CVE-2026-4688 Sandbox escape due to use-after-free in the Disability Access APIs component
* CVE-2026-4689 Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component
* CVE-2026-4690 Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component
* CVE-2026-4691 Use-after-free in the CSS Parsing and Computation component
* CVE-2026-4692 Sandbox escape in the Responsive Design Mode component
* CVE-2026-4693 Incorrect boundary conditions in the Audio/Video: Playback component
* CVE-2026-4694 Incorrect boundary conditions, integer overflow in the Graphics component
* CVE-2026-4695 Incorrect boundary conditions in the Audio/Video: Web Codecs component
* CVE-2026-4696 Use-after-free in the Layout: Text and Fonts component
* CVE-2026-4697 Incorrect boundary conditions in the Audio/Video: Web Codecs component
* CVE-2026-4698 JIT miscompilation in the JavaScript Engine: JIT component
* CVE-2026-4699 Incorrect boundary conditions in the Layout: Text and Fonts component
* CVE-2026-4700 Mitigation bypass in the Networking: HTTP component
* CVE-2026-4701 Use-after-free in the JavaScript Engine component
* CVE-2026-4702 JIT miscompilation in the JavaScript Engine component
* CVE-2026-4704 Denial-of-service in the WebRTC: Signaling component
* CVE-2026-4705 Undefined behavior in the WebRTC: Signaling component
* CVE-2026-4706 Incorrect boundary conditions in the Graphics: Canvas2D component
* CVE-2026-4707 Incorrect boundary conditions in the Graphics: Canvas2D component
* CVE-2026-4708 Incorrect boundary conditions in the Graphics component
* CVE-2026-4709 Incorrect boundary conditions in the Audio/Video: GMP component
* CVE-2026-4710 Incorrect boundary conditions in the Audio/Video component
* CVE-2026-4711 Use-after-free in the Widget: Cocoa component
* CVE-2026-4712 Information disclosure in the Widget: Cocoa component
* CVE-2026-4713 Incorrect boundary conditions in the Graphics component
* CVE-2026-4714 Incorrect boundary conditions in the Audio/Video component
* CVE-2026-4715 Uninitialized memory in the Graphics: Canvas2D component
* CVE-2026-4716 Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component
* CVE-2026-4717 Privilege escalation in the Netmonitor component
* CVE-2025-59375 Denial-of-service in the XML component
* CVE-2026-4718 Undefined behavior in the WebRTC: Signaling component
* CVE-2026-4719 Incorrect boundary conditions in the Graphics: Text component
* CVE-2026-4720 Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149
* CVE-2026-4721 Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-packagehub-230=1

Package List:

- openSUSE Leap 16.0:

MozillaThunderbird-140.10.0-bp160.1.1
MozillaThunderbird-openpgp-librnp-140.10.0-bp160.1.1
MozillaThunderbird-translations-common-140.10.0-bp160.1.1
MozillaThunderbird-translations-other-140.10.0-bp160.1.1

References:

* https://www.suse.com/security/cve/CVE-2025-59375.html
* https://www.suse.com/security/cve/CVE-2026-3889.html
* https://www.suse.com/security/cve/CVE-2026-4371.html
* https://www.suse.com/security/cve/CVE-2026-4684.html
* https://www.suse.com/security/cve/CVE-2026-4685.html
* https://www.suse.com/security/cve/CVE-2026-4686.html
* https://www.suse.com/security/cve/CVE-2026-4687.html
* https://www.suse.com/security/cve/CVE-2026-4688.html
* https://www.suse.com/security/cve/CVE-2026-4689.html
* https://www.suse.com/security/cve/CVE-2026-4690.html
* https://www.suse.com/security/cve/CVE-2026-4691.html
* https://www.suse.com/security/cve/CVE-2026-4692.html
* https://www.suse.com/security/cve/CVE-2026-4693.html
* https://www.suse.com/security/cve/CVE-2026-4694.html
* https://www.suse.com/security/cve/CVE-2026-4695.html
* https://www.suse.com/security/cve/CVE-2026-4696.html
* https://www.suse.com/security/cve/CVE-2026-4697.html
* https://www.suse.com/security/cve/CVE-2026-4698.html
* https://www.suse.com/security/cve/CVE-2026-4699.html
* https://www.suse.com/security/cve/CVE-2026-4700.html
* https://www.suse.com/security/cve/CVE-2026-4701.html
* https://www.suse.com/security/cve/CVE-2026-4702.html
* https://www.suse.com/security/cve/CVE-2026-4704.html
* https://www.suse.com/security/cve/CVE-2026-4705.html
* https://www.suse.com/security/cve/CVE-2026-4706.html
* https://www.suse.com/security/cve/CVE-2026-4707.html
* https://www.suse.com/security/cve/CVE-2026-4708.html
* https://www.suse.com/security/cve/CVE-2026-4709.html
* https://www.suse.com/security/cve/CVE-2026-4710.html
* https://www.suse.com/security/cve/CVE-2026-4711.html
* https://www.suse.com/security/cve/CVE-2026-4712.html
* https://www.suse.com/security/cve/CVE-2026-4713.html
* https://www.suse.com/security/cve/CVE-2026-4714.html
* https://www.suse.com/security/cve/CVE-2026-4715.html
* https://www.suse.com/security/cve/CVE-2026-4716.html
* https://www.suse.com/security/cve/CVE-2026-4717.html
* https://www.suse.com/security/cve/CVE-2026-4718.html
* https://www.suse.com/security/cve/CVE-2026-4719.html
* https://www.suse.com/security/cve/CVE-2026-4720.html
* https://www.suse.com/security/cve/CVE-2026-4721.html
* https://www.suse.com/security/cve/CVE-2026-5731.html
* https://www.suse.com/security/cve/CVE-2026-5732.html
* https://www.suse.com/security/cve/CVE-2026-5734.html
* https://www.suse.com/security/cve/CVE-2026-6746.html
* https://www.suse.com/security/cve/CVE-2026-6747.html
* https://www.suse.com/security/cve/CVE-2026-6748.html
* https://www.suse.com/security/cve/CVE-2026-6749.html
* https://www.suse.com/security/cve/CVE-2026-6750.html
* https://www.suse.com/security/cve/CVE-2026-6751.html
* https://www.suse.com/security/cve/CVE-2026-6752.html
* https://www.suse.com/security/cve/CVE-2026-6753.html
* https://www.suse.com/security/cve/CVE-2026-6754.html
* https://www.suse.com/security/cve/CVE-2026-6757.html
* https://www.suse.com/security/cve/CVE-2026-6759.html
* https://www.suse.com/security/cve/CVE-2026-6761.html
* https://www.suse.com/security/cve/CVE-2026-6762.html
* https://www.suse.com/security/cve/CVE-2026-6763.html
* https://www.suse.com/security/cve/CVE-2026-6764.html
* https://www.suse.com/security/cve/CVE-2026-6765.html
* https://www.suse.com/security/cve/CVE-2026-6766.html
* https://www.suse.com/security/cve/CVE-2026-6767.html
* https://www.suse.com/security/cve/CVE-2026-6769.html
* https://www.suse.com/security/cve/CVE-2026-6770.html
* https://www.suse.com/security/cve/CVE-2026-6771.html
* https://www.suse.com/security/cve/CVE-2026-6772.html
* https://www.suse.com/security/cve/CVE-2026-6776.html
* https://www.suse.com/security/cve/CVE-2026-6785.html
* https://www.suse.com/security/cve/CVE-2026-6786.html



openSUSE-SU-2026:20659-1: moderate: Security update for libspectre


openSUSE security update: security update for libspectre
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20659-1
Rating: moderate

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves various issues can now be installed.

Description:

This update for libspectre fixes the following issues:

- rebuilds against ghostscript version update.

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-665=1

Package List:

- openSUSE Leap 16.0:

libspectre-devel-0.2.12-160000.2.3
libspectre1-0.2.12-160000.2.3



openSUSE-SU-2026:20655-1: moderate: Security update for helm


openSUSE security update: security update for helm
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20655-1
Rating: moderate
References:

* bsc#1248093
* bsc#1261938

Cross-References:

* CVE-2025-55199
* CVE-2026-35206

CVSS scores:

* CVE-2025-55199 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-55199 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-35206 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
* CVE-2026-35206 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 2 vulnerabilities and has 2 bug fixes can now be installed.

Description:

This update for helm fixes the following issues:

Update to version 3.20.2.

Security issued fixed:

- CVE-2025-55199: specially crafted JSON Schema can lead to out of memory (OOM) termination (bsc#1248093).
- CVE-2026-35206: specially crafted Chart will have contents extracted to immediate output directory rather than to
expected output directory suffixed by the Chart's name (bsc#1261938).

Other updates and bugfixes:

- Version 3.20.1:
- chore(deps): bump the k8s-io group with 7 updates a2369ca (dependabot[bot])
- add image index test 90e1056 (Pedro T?rres)
- fix pulling charts from OCI indices 911f2e9 (Pedro T?rres)
- Remove refactorring changes from coalesce_test.go 76dad33 (Evans Mungai)
- Fix import 45c12f7 (Evans Mungai)
- Update pkg/chart/common/util/coalesce_test.go 26c6f19 (Evans Mungai)
- Fix lint warning 09f5129 (Evans Mungai)
- Preserve nil values in chart already 417deb2 (Evans Mungai)
- fix(values): preserve nil values when chart default is empty map 5417bfa (Evans Mungai)
- Version 3.20.0:
- SDK: bump k8s API versions to v0.35.0
- v3 backport: Fixed a bug where helm uninstall with --keep-history did not suspend previous deployed releases #12564
- v3 backport: Bump Go version to v1.25
- bump version to v3.20
- chore(deps): bump golang.org/x/text from 0.32.0 to 0.33.0
- chore(deps): bump golang.org/x/term from 0.38.0 to 0.39.0
- chore(deps): bump github.com/foxcpp/go-mockdns from 1.1.0 to 1.2.0
- chore(deps): bump the k8s-io group with 7 updates
- [dev-v3] Replace deprecated `NewSimpleClientset`
- [dev-v3] Bump Go v1.25, `golangci-lint` v2
- chore(deps): bump github.com/BurntSushi/toml from 1.5.0 to 1.6.0
- chore(deps): bump github.com/containerd/containerd from 1.7.29 to 1.7.30
- fix(rollback): `errors.Is` instead of string comp
- fix(uninstall): supersede deployed releases
- Use latest patch release of Go in releases
- chore(deps): bump golang.org/x/crypto from 0.45.0 to 0.46.0
- chore(deps): bump golang.org/x/text from 0.31.0 to 0.32.0
- chore(deps): bump golang.org/x/term from 0.37.0 to 0.38.0
- chore(deps): bump github.com/spf13/cobra from 1.10.1 to 1.10.2
- chore(deps): bump github.com/rubenv/sql-migrate from 1.8.0 to 1.8.1
- chore(deps): bump golang.org/x/crypto from 0.44.0 to 0.45.0
- chore(deps): bump github.com/cyphar/filepath-securejoin
- chore(deps): bump golang.org/x/text from 0.30.0 to 0.31.0
- chore(deps): bump golang.org/x/crypto from 0.43.0 to 0.44.0
- Remove dev-v3 `helm-latest-version` publish
- chore(deps): bump golang.org/x/term from 0.36.0 to 0.37.0 1.7.28 to 1.7.29
- Revert "pkg/registry: Login option for passing TLS config in memory"
- jsonschema: warn and ignore unresolved URN $ref to match v3.18.4
- Fix `helm pull` untar dir check with repo urls
- chore(deps): bump golang.org/x/crypto from 0.42.0 to 0.43.0
- chore(deps): bump github.com/gofrs/flock from 0.12.1 to 0.13.0
- chore(deps): bump golang.org/x/text from 0.29.0 to 0.30.0
- [backport] fix: get-helm-3 script use helm3-latest-version
- pkg/registry: Login option for passing TLS config in memory
- Fix deprecation warning
- chore(deps): bump golang.org/x/crypto from 0.41.0 to 0.42.0
- chore(deps): bump golang.org/x/term from 0.34.0 to 0.35.0
- Avoid "panic: interface conversion: interface {} is nil"
- bump version to v3.19.0
- chore(deps): bump github.com/spf13/pflag from 1.0.7 to 1.0.10
- fix: set repo authorizer in registry.Client.Resolve()
- fix null merge
- Add timeout flag to repo add and update flags
- Version 3.19.5:
- Fixed bug where removing subchart value via override resulted in warning #31118
- Fixed bug where helm uninstall with --keep-history did not suspend previous deployed releases #12556
- fix(rollback): errors.Is instead of string comp 4a19a5b (Hidde Beydals)
- fix(uninstall): supersede deployed releases 7a00235 (Hidde Beydals)
- fix null merge 578564e (Ben Foster)
- Version 3.19.4:
- Use latest patch release of Go in releases 7cfb6e4 (Matt Farina)
- chore(deps): bump github.com/gofrs/flock from 0.12.1 to 0.13.0 59c951f (dependabot[bot])
- chore(deps): bump github.com/cyphar/filepath-securejoin d45f3f1
- chore(deps): bump golang.org/x/crypto from 0.44.0 to 0.45.0 d459544 (dependabot[bot])
- chore(deps): bump golang.org/x/term from 0.36.0 to 0.37.0 becd387 (dependabot[bot])
- chore(deps): bump the k8s-io group with 7 updates edb1579
- Version 3.19.3:
- Bump golang.org/x/crypto to v0.45.0
- Version 3.19.2:
- [backport] fix: get-helm-3 script use helm3-latest-version 8766e71 (George Jenkins)

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-661=1

Package List:

- openSUSE Leap 16.0:

helm-3.20.2-160000.1.1
helm-bash-completion-3.20.2-160000.1.1
helm-fish-completion-3.20.2-160000.1.1
helm-zsh-completion-3.20.2-160000.1.1

References:

* https://www.suse.com/security/cve/CVE-2025-55199.html
* https://www.suse.com/security/cve/CVE-2026-35206.html



openSUSE-SU-2026:20658-1: moderate: Security update for himmelblau


openSUSE security update: security update for himmelblau
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20658-1
Rating: moderate
References:

* bsc#1261324
* bsc#1261613

Cross-References:

* CVE-2026-34397

CVSS scores:

* CVE-2026-34397 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-34397 ( SUSE ): 7.2 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has 2 bug fixes can now be installed.

Description:

This update for himmelblau fixes the following issues:

Update to version 2.3.9+git0.a9fd29b.

Security issues fixed:

- CVE-2026-34397: Fixed naming collision that can lead to local privilege escalation (bsc#1261324).

Other updates and bugfixes:

- update aws-lc-sys to 0.39.0 for security fixes
- update rustls-webpki to 0.103.10 for CRL revocation fix
- Version 2.3.9:
* packaging: fix if/else block for debian's postrm
* Update apparmor.unix-chkpwd.local (Issue #1252)
* When Hello user encounters SSPR demand, be permissive
* add tests for sudo_groups functionality
* Fix config tests to ignore local host config
* Do not clear $NOTIFY_SOCKET when calling sd_ready
* Fix token cache 24h purge
* broker: use SSO server nonce for PRT only when provided
* Fix pam_himmelblau blocking local user password changes (#1199)
* Remove unused File import
* Use is_ascii_alphanumeric() for account_id validation
* Fix path traversal in LoadProfilePhoto AccountsService writes
* Drop initialization tracing span
* himmelblau-hsm-pin-init: drop RemainAfterExit=yes
* Add fallback behavior when consent is required
* qr-greeter: enable extension without socket noise
* debian: make install/remove noninteractive; reduce QR postinst noise; soften missing hello prt
* Never respond with BadRequest without error detail
* deps(rust): bump the all-cargo-updates group across 1 directory with 7 updates

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-664=1

Package List:

- openSUSE Leap 16.0:

himmelblau-2.3.9+git0.a9fd29b-160000.1.1
himmelblau-qr-greeter-2.3.9+git0.a9fd29b-160000.1.1
himmelblau-sshd-config-2.3.9+git0.a9fd29b-160000.1.1
himmelblau-sso-2.3.9+git0.a9fd29b-160000.1.1
libnss_himmelblau2-2.3.9+git0.a9fd29b-160000.1.1
pam-himmelblau-2.3.9+git0.a9fd29b-160000.1.1

References:

* https://www.suse.com/security/cve/CVE-2026-34397.html



SUSE-SU-2026:1671-2: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2026:1671-2
Release Date: 2026-05-04T09:19:32Z
Rating: important
References:

* bsc#1262573

Cross-References:

* CVE-2026-31431

CVSS scores:

* CVE-2026-31431 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-31431 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6

An update that solves one vulnerability can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 kernel was updated to fix one security issue

The following security issue was fixed:

* CVE-2026-31431: The copy.fail security issue is fixed by revert to operating
out-of-place in algif_aead (bsc#1262573).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1671=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-6.4.0-150600.23.100.1
* kernel-default-debuginfo-6.4.0-150600.23.100.1
* kernel-default-extra-debuginfo-6.4.0-150600.23.100.1
* kernel-default-debugsource-6.4.0-150600.23.100.1
* kernel-syms-6.4.0-150600.23.100.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.100.1
* gfs2-kmp-default-6.4.0-150600.23.100.1
* kernel-default-optional-debuginfo-6.4.0-150600.23.100.1
* kselftests-kmp-default-debuginfo-6.4.0-150600.23.100.1
* cluster-md-kmp-default-6.4.0-150600.23.100.1
* kernel-obs-qa-6.4.0-150600.23.100.1
* kernel-default-devel-6.4.0-150600.23.100.1
* dlm-kmp-default-debuginfo-6.4.0-150600.23.100.1
* dlm-kmp-default-6.4.0-150600.23.100.1
* kernel-obs-build-debugsource-6.4.0-150600.23.100.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.100.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.100.1
* reiserfs-kmp-default-6.4.0-150600.23.100.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.100.1
* kselftests-kmp-default-6.4.0-150600.23.100.1
* ocfs2-kmp-default-6.4.0-150600.23.100.1
* kernel-default-livepatch-6.4.0-150600.23.100.1
* kernel-default-optional-6.4.0-150600.23.100.1
* kernel-default-extra-6.4.0-150600.23.100.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.100.1
* openSUSE Leap 15.6 (nosrc ppc64le x86_64)
* kernel-debug-6.4.0-150600.23.100.1
* openSUSE Leap 15.6 (ppc64le x86_64)
* kernel-debug-devel-debuginfo-6.4.0-150600.23.100.1
* kernel-debug-debugsource-6.4.0-150600.23.100.1
* kernel-debug-debuginfo-6.4.0-150600.23.100.1
* kernel-debug-devel-6.4.0-150600.23.100.1
* openSUSE Leap 15.6 (x86_64)
* kernel-debug-vdso-debuginfo-6.4.0-150600.23.100.1
* kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.100.1
* kernel-default-vdso-6.4.0-150600.23.100.1
* kernel-debug-vdso-6.4.0-150600.23.100.1
* kernel-kvmsmall-vdso-6.4.0-150600.23.100.1
* kernel-default-vdso-debuginfo-6.4.0-150600.23.100.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.100.1
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.100.1
* kernel-default-base-6.4.0-150600.23.100.1.150600.12.46.2
* kernel-kvmsmall-devel-6.4.0-150600.23.100.1
* kernel-kvmsmall-debugsource-6.4.0-150600.23.100.1
* kernel-default-base-rebuild-6.4.0-150600.23.100.1.150600.12.46.2
* kernel-kvmsmall-debuginfo-6.4.0-150600.23.100.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-6.4.0-150600.23.100.1
* openSUSE Leap 15.6 (noarch)
* kernel-devel-6.4.0-150600.23.100.1
* kernel-docs-html-6.4.0-150600.23.100.1
* kernel-source-6.4.0-150600.23.100.1
* kernel-macros-6.4.0-150600.23.100.1
* kernel-source-vanilla-6.4.0-150600.23.100.1
* openSUSE Leap 15.6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.100.1
* openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-6.4.0-150600.23.100.1
* openSUSE Leap 15.6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.100.1
* openSUSE Leap 15.6 (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.100.1
* kernel-zfcpdump-debugsource-6.4.0-150600.23.100.1
* openSUSE Leap 15.6 (aarch64)
* cluster-md-kmp-64kb-6.4.0-150600.23.100.1
* gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.100.1
* dtb-nvidia-6.4.0-150600.23.100.1
* dtb-allwinner-6.4.0-150600.23.100.1
* kselftests-kmp-64kb-6.4.0-150600.23.100.1
* kernel-64kb-debugsource-6.4.0-150600.23.100.1
* kernel-64kb-extra-debuginfo-6.4.0-150600.23.100.1
* dtb-amlogic-6.4.0-150600.23.100.1
* dtb-lg-6.4.0-150600.23.100.1
* dtb-qcom-6.4.0-150600.23.100.1
* kernel-64kb-devel-6.4.0-150600.23.100.1
* gfs2-kmp-64kb-6.4.0-150600.23.100.1
* dtb-marvell-6.4.0-150600.23.100.1
* dtb-cavium-6.4.0-150600.23.100.1
* dtb-renesas-6.4.0-150600.23.100.1
* dtb-sprd-6.4.0-150600.23.100.1
* dtb-socionext-6.4.0-150600.23.100.1
* dtb-amazon-6.4.0-150600.23.100.1
* ocfs2-kmp-64kb-6.4.0-150600.23.100.1
* cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.100.1
* dtb-apple-6.4.0-150600.23.100.1
* dtb-mediatek-6.4.0-150600.23.100.1
* dtb-xilinx-6.4.0-150600.23.100.1
* dtb-exynos-6.4.0-150600.23.100.1
* kernel-64kb-optional-debuginfo-6.4.0-150600.23.100.1
* dtb-arm-6.4.0-150600.23.100.1
* dlm-kmp-64kb-6.4.0-150600.23.100.1
* dtb-broadcom-6.4.0-150600.23.100.1
* dtb-amd-6.4.0-150600.23.100.1
* dlm-kmp-64kb-debuginfo-6.4.0-150600.23.100.1
* kernel-64kb-debuginfo-6.4.0-150600.23.100.1
* ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.100.1
* kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.100.1
* dtb-apm-6.4.0-150600.23.100.1
* reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.100.1
* dtb-rockchip-6.4.0-150600.23.100.1
* kernel-64kb-optional-6.4.0-150600.23.100.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.100.1
* reiserfs-kmp-64kb-6.4.0-150600.23.100.1
* dtb-hisilicon-6.4.0-150600.23.100.1
* kernel-64kb-extra-6.4.0-150600.23.100.1
* dtb-freescale-6.4.0-150600.23.100.1
* dtb-altera-6.4.0-150600.23.100.1
* openSUSE Leap 15.6 (nosrc)
* dtb-aarch64-6.4.0-150600.23.100.1
* openSUSE Leap 15.6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.100.1

## References:

* https://www.suse.com/security/cve/CVE-2026-31431.html
* https://bugzilla.suse.com/show_bug.cgi?id=1262573



openSUSE-SU-2026:0163-1: important: Security update for trivy


openSUSE Security Update: Security update for trivy
_______________________________

Announcement ID: openSUSE-SU-2026:0163-1
Rating: important
References: #1255366 #1258094 #1258513 #1260193 #1260971
#1261052 #1262389 #1262893
Cross-References: CVE-2025-64702 CVE-2025-66564 CVE-2025-69725
CVE-2026-25934 CVE-2026-33186 CVE-2026-33747
CVE-2026-33748 CVE-2026-34986 CVE-2026-39984

CVSS scores:
CVE-2025-64702 (SUSE): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CVE-2025-69725 (SUSE): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N
CVE-2026-25934 (SUSE): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
CVE-2026-33186 (SUSE): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVE-2026-33747 (SUSE): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVE-2026-33748 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2026-34986 (SUSE): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVE-2026-39984 (SUSE): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________

An update that fixes 9 vulnerabilities is now available.

Description:

This update for trivy fixes the following issues:

Update to version 0.70.0 ( boo#1260193, CVE-2026-33186, boo#1260971,
CVE-2026-33747, boo#1261052, CVE-2026-33748, boo#1262389, CVE-2026-39984,
boo#1262893, CVE-2026-34986):

* release: v0.70.0 [main] (#10105)
* chore(deps): bump go.opentelemetry.io/otel/sdk from 1.42.0 to 1.43.0
(#10496)
* chore(deps): bump github.com/sigstore/timestamp-authority/v2 from
2.0.3 to 2.0.6 (#10526)
* chore(deps): bump the common group across 1 directory with 8 updates
(#10540)
* chore(deps): bump the docker group across 1 directory with 2 updates
(#10538)
* fix: use Development category for GoReleaser discussions (#10530)
* chore(deps): bump testcontainers-go to v0.42.0 (#10531)
* chore: update CODEOWNERS (#10529)
* chore(deps): bump helm.sh/helm/v3 from 3.20.1 to 3.20.2 (#10511)
* chore(deps): bump github.com/hashicorp/go-getter from 1.8.5 to 1.8.6
(#10510)
* chore(deps): bump github.com/moby/buildkit from 0.27.1 to 0.28.1
(#10449)
* ci: migrate from mkdocs-material-insiders to mkdocs-material (#10509)
* chore: remove aquasecurity/homebrew-trivy tap from GoReleaser (#10508)
* ci: update runners for workflows that interact with GitHub API (#10502)
* ci: rename tokens and update runners (#10500)
* ci: trigger helm chart publishing via helm-charts workflow (#10474)
* ci: remove ruleset update step from release-please workflow (#10499)
* ci: use large runner and replace ORG_REPO_TOKEN in release-please
workflow (#10498)
* ci: trigger rpm/deb deployment via trivy-repo workflow (#10476)
* fix: remove os.Stdout from wazero module config (#10403)
* chore(deps): bump the common group across 1 directory with 22 updates
(#10408)
* chore(deps): bump google.golang.org/grpc from 1.78.0 to 1.79.3 (#10407)
* fix(flag): validate template file extension (#10296)
* fix(sbom): preserve Red Hat BuildInfo when scanning SBOMs without
layer info (#10378)
* fix: handle Go 1.26 GOEXPERIMENT version format change (#10351)
* fix(python): handle multiple version specifiers in requirements.txt
(#10361)
* ci: run Trivy version bump in trivy-action (#10272)
* fix(python): nil pointer dereference with optional poetry groups
without dependencies (#10359)
* ci: replace personal email with github-actions[bot] in workflows
(#10369)
* chore: replace smithy epoch parsing with stdlib time.Unix (#10286)
* test: update golden files for purl changes (#10372)
* ci: add zizmor to scan GitHub Actions workflows (#10322)
* refactor: log statuses as strings (#10285)
* ci: add build provenance attestations for release artifacts (#10316)
* fix(sbom): add NOASSERTION for licenseDeclared/licenseConcluded in
SPDX non-library packages (#10368)
* fix(report): set correct sarif ROOTPATH uri when scanning a git
repository (#10366)
* perf(plugin): optimize directory traversal by replacing filepath.Walk
with filepath.WalkDir (#10325)
* docs: correct typos in CHANGELOG and diagram (#10320)
* chore: delete roadmap wf (#10295)
* ci(helm): bump Trivy version to 0.69.3 for Trivy Helm Chart 0.21.3
(#10310)
* fix(cyclonedx): include CVSS v4 vulnerability ratings (#10313)
* fix: detected vulnerability fields in azure and mariner detector
(#10275)
* ci: add persist-credentials: false to checkout steps (#10306)
* ci(helm): bump Trivy version to 0.69.2 for Trivy Helm Chart 0.21.2
(#10270)
* chore(deps): bump the common group across 1 directory with 8 updates
(#10248)
* chore(deps): bump go.opentelemetry.io/otel/sdk from 1.39.0 to 1.40.0
(#10257)
* chore(deps): bump the aws group across 1 directory with 6 updates
(#10249)
* chore(deps): bump github.com/cloudflare/circl from 1.6.1 to 1.6.3
(#10241)
* ci: remove apidiff workflow (#10259)
* chore(deps): bump github.com/docker/cli from 29.1.4+incompatible to
29.2.1+incompatible in the docker group across 1 directory (#10221)
* ci: bump golangci-lint to v2.10 in cache-test-assets (#10243)
* feat(java): add support for proxy configuration from Maven
settings.xml (#10187)
* chore(deps): bump the github-actions group across 3 directories with
11 updates (#10242)
* feat(python): add pylock.toml support (#10137)
* chore: bump SPDX license IDs and exceptions to `v3.28.0` (#10233)
* docs: fix typos and upgrade insecure HTTP links to HTTPS (#10219)
* chore: bump golangci-lint to v2.10.0 (#10223)
* feat(misconf): support for
azurerm_network_interface_security_group_association (#10215)
* ci: pin Docker Engine to v29 for integration tests (#10232)
* feat(go): detect version from ELF symbol table for binaries built with
-trimpath (#10197)
* docs: migrate private registry documentation from GCR to GAR (#10208)
* chore(deps): bump the common group across 1 directory with 24 updates
(#10206)
* chore(deps): update Docker client SDK to v29 (#10202)
* test: update Docker Engine integration tests for Docker API v0.29.0+
compatibility (#10199)
* fix(misconf): initialize custom annotation field if empty (#10123)
* feat(ubuntu): add eol data for 25.10 (#10181)
* docs: fix incorrect count of Python package managers (#10175)
* chore(deps): bump github.com/go-git/go-git/v5 from 5.16.4 to 5.16.5
(#10179)
* feat(misconf): resolve Azure resources via resource_id (#10173)
* ci(helm): bump Trivy version to 0.69.1 for Trivy Helm Chart 0.21.1
(#10155)
* refactor: remove unused Insecure field from ServiceOption (#10113)
* refactor: reduce complexity of init in detect.go (#10163)
* feat(misconf): adapt ARM k8s clusters (#9696) (#10125)
* docs: update version endpoint example in client/server documentation
(#10151)
* feat(vuln): skip third-party packages in common Detect function
(#10129)
* ci: add composite action for Go setup (#10146)
* fix(misconf): apply check aliases when filtering results via
.trivyignore (#10112)
* docs(terraform): add limitation for data sources and computed resource
attributes (#10128)
* fix: update PhotonOS feed URL (#10122)
* feat(server): include server version info in JSON output for
client/server mode (#10075)
* chore(deps): bump to alpine:3.23.3 and go-1.25.6 to fix CVEs (#10107)
* refactor: unify scanner error limit and compiler limit (#10106)
* ci(helm): bump Trivy version to 0.69.0 for Trivy Helm Chart 0.21.0
(#10103)
* fix(java): Disable overwriting exclusions (#10088)
* refactor(rust): use txtar format for cargo analyzer test data (#10104)
* feat(python): add pylock.toml (PEP 751) parser (#9632)
* chore(deps): bump the aws group across 1 directory with 6 updates
(#10068)
* fix(server): exclude JavaDB and CheckBundle from /version endpoint
(#10100)

- Update to version 0.69.3 (CVE-2026-25934, boo#1258094):
* release: v0.69.3 [release/v0.69] (#10293)
* fix(deps): bump github.com/go-git/go-git/v5 from 5.16.4 to 5.16.5
[backport: release/v0.69] (#10291)
* release: v0.69.2 [release/v0.69] (#10266)
* fix(deps): bump go.opentelemetry.io/otel/sdk from 1.39.0 to 1.40.0
[backport: release/v0.69] (#10267)
* fix(deps): bump github.com/cloudflare/circl from 1.6.1 to 1.6.3
[backport: release/v0.69] (#10264)
* ci: remove apidiff workflow
* release: v0.69.1 [release/v0.69] (#10145)
* ci: add composite action for Go setup [backport: release/v0.69]
(#10150)
* fix(misconf): apply check aliases when filtering results via
.trivyignore [backport: release/v0.69] (#10143)
* chore(deps): bump to alpine:3.23.3 and go-1.25.6 to fix CVEs
[backport: release/v0.69] (#10135)

- Update to version 0.69.0 (boo#1255366, CVE-2025-64702, boo#1258513,
CVE-2025-69725):
* release: v0.69.0 [main] (#9886)
* chore: bump trivy-checks to v2 (#9875)
* chore(deps): bump github.com/theupdateframework/go-tuf/v2 from 2.3.1
to 2.4.1 (#10091)
* fix(repo): return a nil interface for gitAuth if missing (#10097)
* fix(java): correctly inherit properties from parent fields for pom.xml
files (#9111)
* fix(rust): implement version inheritance for Cargo mono repos (#10011)
* feat(activestate): add support ActiveState images (#10081)
* feat(vex): support per-repo tls configuration (#10030)
* refactor: allow per-request transport options override (#10083)
* chore(deps): bump github.com/sigstore/rekor from 1.4.3 to 1.5.0
(#10084)
* chore(deps): bump github.com/sigstore/sigstore from 1.10.3 to 1.10.4
(#10085)
* fix(java): correctly propagate repositories from upper POMs to
dependencies (#10077)
* feat(rocky): enable modular package vulnerability detection (#10069)
* chore(deps): bump github.com/theupdateframework/go-tuf/v2 from 2.3.0
to 2.3.1 (#10079)
* docs: fix mistake in config file example for skip-dirs/skip-files flag
(#10070)
* feat(report): add Trivy version to JSON output (#10065)
* fix(rust): add cargo workspace members glob support (#10032)
* feat: add AnalyzedBy field to track which analyzer detected packages
(#10059)
* fix: use canonical SPDX license IDs from embeded licenses.json (#10053)
* docs: fix link to Docker Image Specification (#10057)
* feat(secret): add detection for Symfony default secret key (#9892)
* refactor(misconf): move common logic to base value and simplify typed
values (#9986)
* fix(java): add hash of GAV+root pom file path for pkgID for packages
from pom.xml files (#9880)
* feat(misconf): use Terraform plan configuration to partially restore
schema (#9623)
* feat(misconf): add action block to Terraform schema (#10035)
* fix(misconf): correct typos in block and attribute names (#9993)
* test(misconf): simplify test values using *Test helpers (#9985)
* fix(misconf): safely parse rotation_period in google_kms_crypto_key
(#9980)
* feat(misconf): support for ARM resources defined as an object (#9959)
* feat(misconf): support for azurerm_*_web_app (#9944)
* test: migrate private test helpers to `export_test.go` convention
(#10043)
* chore(deps): bump github.com/sigstore/cosign/v2 from 2.2.4 to 2.6.2
(#10048)
* fix(secret): improve word boundary detection for Hugging Face tokens
(#10046)
* fix(go): use ldflags version for all pseudo-versions (#10037)
* chore: switch to ID from AVDID in internal and user-facing fields
(#9655)
* refactor(misconf)!: use ID instead of AVDID for providers mapping
(#9752)
* fix: move enum into items for array-type fields in JSON Schema (#10039)
* docs: fix incorrect documentation URLs (#10038)
* feat(sbom): exclude PEP 770 SBOMs in .dist-info/sboms/ (#10033)
* fix(docker): fix non-det scan results for images with embedded SBOM
(#9866)
* chore(deps): bump the github-actions group with 11 updates (#10001)
* test: fix assertion after 2026 roll over (#10002)
* fix(vuln): skip vulns detection for CentOS Stream family without scan
failure (#9964)
* fix(license): normalize licenses for PostAnalyzers (#9941)
* feat(nodejs): parse licenses from `package-lock.json` file (#9983)
* chore: update reference links to Go Wiki (#9987)
* refactor: add xslices.Map and replace lo.Map usages (#9984)
* fix(image): race condition in image artifact inspection (#9966)
* feat(flag): add JSON Schema for trivy.yaml configuration file (#9971)
* refactor(debian): use txtar format for test data (#9957)
* chore(deps): bump `golang.org/x/tools` to `v0.40.0` + `gopls` to
`v0.21.0` (#9973)
* feat(rootio): Update trivy db to support usage of Severity from
root.io feed (#9930)
* feat(vuln): skip vulnerability scanning for third-party packages in
Debian/Ubuntu (#9932)
* docs: add info that `--file-pattern` flag doesn't disable default
behaviuor (#9961)
* perf(misconf): optimize string concatenation in azure scanner (#9969)
* chore: add client option to install script (#9962)
* ci(helm): bump Trivy version to 0.68.2 for Trivy Helm Chart 0.20.1
(#9956)
* chore(deps): bump github.com/quic-go/quic-go from 0.54.1 to 0.57.0
(#9952)
* docs: update binary signature verification for sigstore bundles (#9929)
* chore(deps): bump alpine from `3.22.1` to `3.23.0` (#9935)
* chore(alpine): add EOL date for alpine 3.23 (#9934)
* feat(cloudformation): add support for Fn::ForEach (#9508)
* ci: enable `check-latest` for `setup-go` (#9931)
* feat(debian): detect third-party packages using maintainer list (#9917)
* fix(vex): add CVE-2025-66564 as not_affected into Trivy VEX file
(#9924)
* feat(helm): add sslCertDir parameter (#9697)
* fix(misconf): respect .yml files when Helm charts are detected (#9912)
* feat(php): add support for dev dependencies in Composer (#9910)
* chore(deps): bump the common group across 1 directory with 9 updates
(#9903)
* chore(deps): bump github.com/docker/cli from 29.0.3+incompatible to
29.1.1+incompatible in the docker group (#9859)
* fix: remove trailing tab in statefulset template (#9889)
* feat(julia): enable vulnerability scanning for the Julia language
ecosystem (#9800)
* feat(misconf): initial ansible scanning support (#9332)
* feat(misconf): Update Azure Database schema (#9811)
* ci(helm): bump Trivy version to 0.68.1 for Trivy Helm Chart 0.20.0
(#9869)
* chore: update the install script (#9874)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP7:

zypper in -t patch openSUSE-2026-163=1

Package List:

- openSUSE Backports SLE-15-SP7 (aarch64 i586 ppc64le s390x x86_64):

trivy-0.70.0-bp157.2.9.1

References:

https://www.suse.com/security/cve/CVE-2025-64702.html
https://www.suse.com/security/cve/CVE-2025-66564.html
https://www.suse.com/security/cve/CVE-2025-69725.html
https://www.suse.com/security/cve/CVE-2026-25934.html
https://www.suse.com/security/cve/CVE-2026-33186.html
https://www.suse.com/security/cve/CVE-2026-33747.html
https://www.suse.com/security/cve/CVE-2026-33748.html
https://www.suse.com/security/cve/CVE-2026-34986.html
https://www.suse.com/security/cve/CVE-2026-39984.html
https://bugzilla.suse.com/1255366
https://bugzilla.suse.com/1258094
https://bugzilla.suse.com/1258513
https://bugzilla.suse.com/1260193
https://bugzilla.suse.com/1260971
https://bugzilla.suse.com/1261052
https://bugzilla.suse.com/1262389
https://bugzilla.suse.com/1262893