SUSE-SU-2026:21559-1: important: Security update for wireshark

SLE-UPDATES null at suse.de
Mon May 11 08:32:54 UTC 2026



# Security update for wireshark

Announcement ID: SUSE-SU-2026:21559-1  
Release Date: 2026-05-06T00:08:30Z  
Rating: important  
References:

  * bsc#1258907
  * bsc#1258909
  * bsc#1263726
  * bsc#1263728
  * bsc#1263729
  * bsc#1263731
  * bsc#1263732
  * bsc#1263733
  * bsc#1263734
  * bsc#1263735
  * bsc#1263736
  * bsc#1263737
  * bsc#1263739
  * bsc#1263741
  * bsc#1263742
  * bsc#1263743
  * bsc#1263744
  * bsc#1263745
  * bsc#1263746
  * bsc#1263747
  * bsc#1263749
  * bsc#1263750
  * bsc#1263751
  * bsc#1263752
  * bsc#1263753
  * bsc#1263754
  * bsc#1263756
  * bsc#1263757
  * bsc#1263762
  * bsc#1263765
  * bsc#1263766
  * bsc#1263767
  * bsc#1263809

  
Cross-References:

  * CVE-2026-3201
  * CVE-2026-3203
  * CVE-2026-5299
  * CVE-2026-5401
  * CVE-2026-5403
  * CVE-2026-5404
  * CVE-2026-5405
  * CVE-2026-5406
  * CVE-2026-5407
  * CVE-2026-5408
  * CVE-2026-5409
  * CVE-2026-5653
  * CVE-2026-5654
  * CVE-2026-5656
  * CVE-2026-5657
  * CVE-2026-6519
  * CVE-2026-6520
  * CVE-2026-6521
  * CVE-2026-6522
  * CVE-2026-6523
  * CVE-2026-6524
  * CVE-2026-6527
  * CVE-2026-6529
  * CVE-2026-6530
  * CVE-2026-6531
  * CVE-2026-6532
  * CVE-2026-6533
  * CVE-2026-6534
  * CVE-2026-6535
  * CVE-2026-6537
  * CVE-2026-6538
  * CVE-2026-6868
  * CVE-2026-6869

  
CVSS scores:

  * CVE-2026-3201 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-3201 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  * CVE-2026-3201 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-3201 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-3203 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-3203 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  * CVE-2026-3203 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-3203 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5299 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5299 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5401 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5401 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5403 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5403 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2026-5404 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5404 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5404 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5405 ( SUSE ):  8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2026-5405 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2026-5406 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5406 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5407 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5407 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5408 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5408 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5409 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5409 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5653 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5653 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5653 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-5654 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5654 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5654 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-5656 ( SUSE ):  8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-5656 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2026-5656 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2026-5657 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5657 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-5657 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-6519 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6519 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-6519 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6520 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6520 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6520 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-6521 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6521 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6522 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6522 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6523 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6523 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6524 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6524 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6527 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6527 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6529 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6529 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6530 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6530 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6531 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6531 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6532 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6532 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6533 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6533 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6534 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6534 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6535 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6535 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6537 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6537 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6538 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6538 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6868 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6868 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6868 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-6869 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2026-6869 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

  
Affected Products:

  * SUSE Linux Enterprise Server 16.0
  * SUSE Linux Enterprise Server for SAP applications 16.0

  
  
An update that solves 33 vulnerabilities can now be installed.

## Description:

This update for wireshark fixes the following issues

  * CVE-2026-3201: missing limit checks in USB HID protocol dissector's
    `parse_report_descriptor` function can lead to memory exhaustion
    (bsc#1258907).
  * CVE-2026-3203: missing length checks in the RF4CE Profile protocol dissector
    can lead to illegal memory access and crash (bsc#1258909).
  * CVE-2026-5299: ICMPv6 dissector crash (bsc#1263757).
  * CVE-2026-5401: AFP dissector crash (bsc#1263756).
  * CVE-2026-5403: SBC audio codec crash (bsc#1263765).
  * CVE-2026-5404: K12 RF5 file parser crash (bsc#1263766).
  * CVE-2026-5405: RDP dissector crash (bsc#1263767).
  * CVE-2026-5406: FC-SWILS dissector crash (bsc#1263754).
  * CVE-2026-5407: SMB2 dissector infinite loop (bsc#1263753).
  * CVE-2026-5408: BT-DHT dissector crash (bsc#1263752).
  * CVE-2026-5409: Monero dissector crash (bsc#1263751).
  * CVE-2026-5653: DCP-ETSI dissector crash (bsc#1263750).
  * CVE-2026-5654: AMR-NB audio codec crash (bsc#1263749).
  * CVE-2026-5656: Profile import crash and possible code execution
    (bsc#1263809).
  * CVE-2026-5657: iLBC audio codec crash (bsc#1263747).
  * CVE-2026-6519: MBIM protocol dissector infinite loop (bsc#1263746).
  * CVE-2026-6520: OpenFlow v6 protocol dissector infinite loop (bsc#1263745).
  * CVE-2026-6521: OpenFlow v5 protocol dissector infinite loops (bsc#1263744).
  * CVE-2026-6522: RPKI-Router protocol dissector infinite loop (bsc#1263743).
  * CVE-2026-6523: GNW protocol dissector infinite loop (bsc#1263742).
  * CVE-2026-6524: MySQL protocol dissector crash (bsc#1263741).
  * CVE-2026-6527: ASN.1 PER dissector crash (bsc#1263739).
  * CVE-2026-6529: iLBC audio codec crash (bsc#1263737).
  * CVE-2026-6530: DCP-ETSI protocol dissector crash (bsc#1263736).
  * CVE-2026-6531: SANE protocol dissector infinite loop (bsc#1263735).
  * CVE-2026-6532: Kismet protocol dissector crash (bsc#1263734).
  * CVE-2026-6533: Dissection engine LZ77 decompression crash (bsc#1263733).
  * CVE-2026-6534: USB HID dissector infinite loop (bsc#1263732).
  * CVE-2026-6535: Dissection engine zlib decompression crash (bsc#1263731).
  * CVE-2026-6537: ZigBee dissector crash (bsc#1263729).
  * CVE-2026-6538: BEEP dissector crash (bsc#1263728).
  * CVE-2026-6868: HTTP protocol dissector crash (bsc#1263762).
  * CVE-2026-6869: WebSocket protocol dissector crash (bsc#1263726).

Changes for wireshark:

  * Updated to 4.4.15

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Server for SAP applications 16.0  
    zypper in -t patch SUSE-SLES-16.0-702=1

  * SUSE Linux Enterprise Server 16.0  
    zypper in -t patch SUSE-SLES-16.0-702=1

## Package List:

  * SUSE Linux Enterprise Server for SAP applications 16.0 (ppc64le x86_64)
    * libwsutil16-debuginfo-4.4.15-160000.1.1
    * wireshark-debuginfo-4.4.15-160000.1.1
    * libwiretap15-debuginfo-4.4.15-160000.1.1
    * wireshark-debugsource-4.4.15-160000.1.1
    * wireshark-ui-qt-4.4.15-160000.1.1
    * libwireshark18-debuginfo-4.4.15-160000.1.1
    * libwsutil16-4.4.15-160000.1.1
    * libwireshark18-4.4.15-160000.1.1
    * wireshark-ui-qt-debuginfo-4.4.15-160000.1.1
    * wireshark-devel-4.4.15-160000.1.1
    * libwiretap15-4.4.15-160000.1.1
    * wireshark-4.4.15-160000.1.1
  * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64)
    * libwsutil16-debuginfo-4.4.15-160000.1.1
    * wireshark-debuginfo-4.4.15-160000.1.1
    * libwiretap15-debuginfo-4.4.15-160000.1.1
    * wireshark-debugsource-4.4.15-160000.1.1
    * wireshark-ui-qt-4.4.15-160000.1.1
    * libwireshark18-debuginfo-4.4.15-160000.1.1
    * libwsutil16-4.4.15-160000.1.1
    * libwireshark18-4.4.15-160000.1.1
    * wireshark-ui-qt-debuginfo-4.4.15-160000.1.1
    * wireshark-devel-4.4.15-160000.1.1
    * libwiretap15-4.4.15-160000.1.1
    * wireshark-4.4.15-160000.1.1

## References:

  * https://www.suse.com/security/cve/CVE-2026-3201.html
  * https://www.suse.com/security/cve/CVE-2026-3203.html
  * https://www.suse.com/security/cve/CVE-2026-5299.html
  * https://www.suse.com/security/cve/CVE-2026-5401.html
  * https://www.suse.com/security/cve/CVE-2026-5403.html
  * https://www.suse.com/security/cve/CVE-2026-5404.html
  * https://www.suse.com/security/cve/CVE-2026-5405.html
  * https://www.suse.com/security/cve/CVE-2026-5406.html
  * https://www.suse.com/security/cve/CVE-2026-5407.html
  * https://www.suse.com/security/cve/CVE-2026-5408.html
  * https://www.suse.com/security/cve/CVE-2026-5409.html
  * https://www.suse.com/security/cve/CVE-2026-5653.html
  * https://www.suse.com/security/cve/CVE-2026-5654.html
  * https://www.suse.com/security/cve/CVE-2026-5656.html
  * https://www.suse.com/security/cve/CVE-2026-5657.html
  * https://www.suse.com/security/cve/CVE-2026-6519.html
  * https://www.suse.com/security/cve/CVE-2026-6520.html
  * https://www.suse.com/security/cve/CVE-2026-6521.html
  * https://www.suse.com/security/cve/CVE-2026-6522.html
  * https://www.suse.com/security/cve/CVE-2026-6523.html
  * https://www.suse.com/security/cve/CVE-2026-6524.html
  * https://www.suse.com/security/cve/CVE-2026-6527.html
  * https://www.suse.com/security/cve/CVE-2026-6529.html
  * https://www.suse.com/security/cve/CVE-2026-6530.html
  * https://www.suse.com/security/cve/CVE-2026-6531.html
  * https://www.suse.com/security/cve/CVE-2026-6532.html
  * https://www.suse.com/security/cve/CVE-2026-6533.html
  * https://www.suse.com/security/cve/CVE-2026-6534.html
  * https://www.suse.com/security/cve/CVE-2026-6535.html
  * https://www.suse.com/security/cve/CVE-2026-6537.html
  * https://www.suse.com/security/cve/CVE-2026-6538.html
  * https://www.suse.com/security/cve/CVE-2026-6868.html
  * https://www.suse.com/security/cve/CVE-2026-6869.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1258907
  * https://bugzilla.suse.com/show_bug.cgi?id=1258909
  * https://bugzilla.suse.com/show_bug.cgi?id=1263726
  * https://bugzilla.suse.com/show_bug.cgi?id=1263728
  * https://bugzilla.suse.com/show_bug.cgi?id=1263729
  * https://bugzilla.suse.com/show_bug.cgi?id=1263731
  * https://bugzilla.suse.com/show_bug.cgi?id=1263732
  * https://bugzilla.suse.com/show_bug.cgi?id=1263733
  * https://bugzilla.suse.com/show_bug.cgi?id=1263734
  * https://bugzilla.suse.com/show_bug.cgi?id=1263735
  * https://bugzilla.suse.com/show_bug.cgi?id=1263736
  * https://bugzilla.suse.com/show_bug.cgi?id=1263737
  * https://bugzilla.suse.com/show_bug.cgi?id=1263739
  * https://bugzilla.suse.com/show_bug.cgi?id=1263741
  * https://bugzilla.suse.com/show_bug.cgi?id=1263742
  * https://bugzilla.suse.com/show_bug.cgi?id=1263743
  * https://bugzilla.suse.com/show_bug.cgi?id=1263744
  * https://bugzilla.suse.com/show_bug.cgi?id=1263745
  * https://bugzilla.suse.com/show_bug.cgi?id=1263746
  * https://bugzilla.suse.com/show_bug.cgi?id=1263747
  * https://bugzilla.suse.com/show_bug.cgi?id=1263749
  * https://bugzilla.suse.com/show_bug.cgi?id=1263750
  * https://bugzilla.suse.com/show_bug.cgi?id=1263751
  * https://bugzilla.suse.com/show_bug.cgi?id=1263752
  * https://bugzilla.suse.com/show_bug.cgi?id=1263753
  * https://bugzilla.suse.com/show_bug.cgi?id=1263754
  * https://bugzilla.suse.com/show_bug.cgi?id=1263756
  * https://bugzilla.suse.com/show_bug.cgi?id=1263757
  * https://bugzilla.suse.com/show_bug.cgi?id=1263762
  * https://bugzilla.suse.com/show_bug.cgi?id=1263765
  * https://bugzilla.suse.com/show_bug.cgi?id=1263766
  * https://bugzilla.suse.com/show_bug.cgi?id=1263767
  * https://bugzilla.suse.com/show_bug.cgi?id=1263809

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20260511/e77bf541/attachment.htm>


More information about the sle-updates mailing list