close
Alerts This Week
Warning Icon 1 613
Alerts This Week
Warning Icon 1 613

Stay Secure with the Latest Linux Advisories

Filter Icon Refine advisories
X Clear Filters
X Clear Filters
View More

Get the latest News and Insights

Get the latest Linux and open source security news straight to your inbox.

Community Poll

What got you started with Linux?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum {0} answer(s).
Please select maximum {0} answer(s).
/main-polls/150-what-got-you-started-with-linux?task=poll.vote&format=json
150
radio
0
[{"id":483,"title":"Self-taught through trial and error","votes":531,"type":"x","order":1,"pct":78.78,"resources":[]},{"id":484,"title":"Formal training or courses","votes":29,"type":"x","order":2,"pct":4.3,"resources":[]},{"id":485,"title":"A job that required it","votes":33,"type":"x","order":3,"pct":4.9,"resources":[]},{"id":486,"title":"Other","votes":81,"type":"x","order":4,"pct":12.02,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
bottom 200
Loading...

Explore Latest Linux Security advisories

We found 9,991 articles for you...
100

SUSE dnsmasq Important DoS Buffer Overflow Vuln 2026-1934-1

An update that solves seven vulnerabilities, contains one feature and has two security fixes can now be installed.. # Security update for dnsmasq Announcement ID: SUSE-SU-2026:1934-1 Release Date: 2026-05-18T07:40:18Z Rating: important References: * bsc#1247812 * bsc#1257934 * bsc#1258251 * bsc#1262487 * bsc#1265001 * bsc#1265002 * bsc#1265003 * bsc#1265004 * bsc#1265006 * jsc#PED-266 Cross-References: * CVE-2026-2291 * CVE-2026-4890 * CVE-2026-4891 * CVE-2026-4892 * CVE-2026-4893 * CVE-2026-5172 * CVE-2026-6507 CVSS scores: * CVE-2026-2291 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-2291 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2291 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-4890 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-4890 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-4891 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-4891 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-4892 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-4892 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-4893 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-4893 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-5172 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-5172 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-6507 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-6507 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-6507 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves seven vulnerabilities, contains one feature and has two security fixes can now be installed. ## Description: This update for dnsmasq fixes the following issues Security issues: * CVE-2026-4890: DoS vulnerability in the DNSSEC validation (bsc#1265001). * CVE-2026-4891: heap-based out-of-bounds read vulnerability in the DNSSEC validation (bsc#1265002). * CVE-2026-4892: heap-based out-of-bounds write vulnerability in the DHCPv6 implementation (bsc#1265003). * CVE-2026-4893: information disclosure vulnerability in dnsmasq allows remote attackers to bypass source checks (bsc#1265004). * CVE-2026-5172: buffer overflow in dnsmasq's extract_addresses() function (bsc#1265006). * CVE-2026-6507: out-of-bounds write in DHCP BOOTREPLY processing can lead to denial of service (bsc#1262487). Non security issues: * Updated to security release 2.92rel2. * aardvark-dnsupstream tests make dnsmasq dump core (bsc#1247812). * Drop rcFOO symlinks for CODE16 (jsc#PED-266). * libnettle: update to 4.0 breaks dnsmasq and gnutls (bsc#1257934). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1934=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1934=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1934=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1934=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-1934=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-1934=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-1934=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-1934=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-1934=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-1934=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1934=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1934=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1934=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1934=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -tpatch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1934=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1934=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1934=1 ## Package List: * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-utils-debuginfo-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * dnsmasq-utils-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) *dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2291.html * https://www.suse.com/security/cve/CVE-2026-4890.html * https://www.suse.com/security/cve/CVE-2026-4891.html * https://www.suse.com/security/cve/CVE-2026-4892.html * https://www.suse.com/security/cve/CVE-2026-4893.html * https://www.suse.com/security/cve/CVE-2026-5172.html * https://www.suse.com/security/cve/CVE-2026-6507.html * https://bugzilla.suse.com/show_bug.cgi?id=1247812 * https://bugzilla.suse.com/show_bug.cgi?id=1257934 * https://bugzilla.suse.com/show_bug.cgi?id=1258251 * https://bugzilla.suse.com/show_bug.cgi?id=1262487 * https://bugzilla.suse.com/show_bug.cgi?id=1265001 * https://bugzilla.suse.com/show_bug.cgi?id=1265002 * https://bugzilla.suse.com/show_bug.cgi?id=1265003 * https://bugzilla.suse.com/show_bug.cgi?id=1265004 * https://bugzilla.suse.com/show_bug.cgi?id=1265006 * https://jira.suse.com/browse/PED-266 . SUSE2026-1934-1 updates dnsmasq, addressing important security flaws including DoS and buffer overflow vulnerabilities.. SUSE dnsmasq security fix DoS buffer overflow. . Severity: Important. LinuxSecurity.com Team

Calendar 2 May 18, 2026 Important SuSE
202

openSUSE dnsmasq Important DoS Buffer Overflow Issues 2026-1934-1

An update that solves seven vulnerabilities, contains one feature and has two security fixes can now be installed.. # Security update for dnsmasq Announcement ID: SUSE-SU-2026:1934-1 Release Date: 2026-05-18T07:40:18Z Rating: important References: * bsc#1247812 * bsc#1257934 * bsc#1258251 * bsc#1262487 * bsc#1265001 * bsc#1265002 * bsc#1265003 * bsc#1265004 * bsc#1265006 * jsc#PED-266 Cross-References: * CVE-2026-2291 * CVE-2026-4890 * CVE-2026-4891 * CVE-2026-4892 * CVE-2026-4893 * CVE-2026-5172 * CVE-2026-6507 CVSS scores: * CVE-2026-2291 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-2291 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2291 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-4890 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-4890 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-4891 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-4891 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-4892 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-4892 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-4893 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-4893 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-5172 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-5172 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-6507 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-6507 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-6507 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves seven vulnerabilities, contains one feature and has two security fixes can now be installed. ## Description: This update for dnsmasq fixes the following issues Security issues: * CVE-2026-4890: DoS vulnerability in the DNSSEC validation (bsc#1265001). * CVE-2026-4891: heap-based out-of-bounds read vulnerability in the DNSSEC validation (bsc#1265002). * CVE-2026-4892: heap-based out-of-bounds write vulnerability in the DHCPv6 implementation (bsc#1265003). * CVE-2026-4893: information disclosure vulnerability in dnsmasq allows remote attackers to bypass source checks (bsc#1265004). * CVE-2026-5172: buffer overflow in dnsmasq's extract_addresses() function (bsc#1265006). * CVE-2026-6507: out-of-bounds write in DHCP BOOTREPLY processing can lead to denial of service (bsc#1262487). Non security issues: * Updated to security release 2.92rel2. * aardvark-dnsupstream tests make dnsmasq dump core (bsc#1247812). * Drop rcFOO symlinks for CODE16 (jsc#PED-266). * libnettle: update to 4.0 breaks dnsmasq and gnutls (bsc#1257934). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1934=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1934=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1934=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1934=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-1934=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-1934=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-1934=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-1934=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-1934=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-1934=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1934=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1934=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1934=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1934=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -tpatch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1934=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1934=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1934=1 ## Package List: * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-utils-debuginfo-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * dnsmasq-utils-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) *dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * dnsmasq-2.92rel2-150400.16.12.1 * dnsmasq-debuginfo-2.92rel2-150400.16.12.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2291.html * https://www.suse.com/security/cve/CVE-2026-4890.html * https://www.suse.com/security/cve/CVE-2026-4891.html * https://www.suse.com/security/cve/CVE-2026-4892.html * https://www.suse.com/security/cve/CVE-2026-4893.html * https://www.suse.com/security/cve/CVE-2026-5172.html * https://www.suse.com/security/cve/CVE-2026-6507.html * https://bugzilla.suse.com/show_bug.cgi?id=1247812 * https://bugzilla.suse.com/show_bug.cgi?id=1257934 * https://bugzilla.suse.com/show_bug.cgi?id=1258251 * https://bugzilla.suse.com/show_bug.cgi?id=1262487 * https://bugzilla.suse.com/show_bug.cgi?id=1265001 * https://bugzilla.suse.com/show_bug.cgi?id=1265002 * https://bugzilla.suse.com/show_bug.cgi?id=1265003 * https://bugzilla.suse.com/show_bug.cgi?id=1265004 * https://bugzilla.suse.com/show_bug.cgi?id=1265006 * https://jira.suse.com/browse/PED-266 . #Security update for dnsmasq Announcement ID: SUSE-SU-2026:1934-1 Release Date: 2026-05-18T07:40:18. update, solves, seven, vulnerabilities, feature, security, fixes. . Severity: Important. LinuxSecurity.com Team

Calendar 2 May 18, 2026 Important OpenSUSE
100

SUSE Google-Cloud-SAP-Agent Important Denial of Service Patch 2026-1935-1

An update that solves one vulnerability can now be installed.. # Security update for google-cloud-sap-agent Announcement ID: SUSE-SU-2026:1935-1 Release Date: 2026-05-18T07:40:31Z Rating: important References: * bsc#1262936 Cross-References: * CVE-2026-34986 CVSS scores: * CVE-2026-34986 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-34986 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-34986 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for google-cloud-sap-agent fixes the following issue: * CVE-2026-34986: github.com/go-jose/go-jose/v4: processing of JWE object with empty `encrypted_key` field but key wrapping algorithm set can lead to a denial of service (bsc#1262936). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -tpatch SUSE-SLE-Module-Public-Cloud-12-2026-1935=1 ## Package List: * Public Cloud Module 12 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-3.12-6.63.1 ## References: * https://www.suse.com/security/cve/CVE-2026-34986.html * https://bugzilla.suse.com/show_bug.cgi?id=1262936 . SUSE release fixes important denial of service issue for google-cloud-sap-agent 2026-1935-1 update. Get the patch now!. SUSE Security Update, google-cloud-sap-agent, Denial of Service, 2026-1935-1. . Severity: Important. LinuxSecurity.com Team

Calendar 2 May 18, 2026 Important SuSE
100

SUSE perl-Text-CSV_XS Important Memory Corruption Risk CVE-2026-7111

An update that solves one vulnerability can now be installed.. # Security update for perl-Text-CSV_XS Announcement ID: SUSE-SU-2026:1936-1 Release Date: 2026-05-18T07:41:35Z Rating: important References: * bsc#1263690 Cross-References: * CVE-2026-7111 CVSS scores: * CVE-2026-7111 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-7111 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-7111 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Development Tools Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for perl-Text-CSV_XS fixes the following issue * CVE-2026-7111: use-after-free when registered callbacks extend the Perl argument stack may enable type confusion or memory corruption (bsc#1263690). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypperpatch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1936=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1936=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1936=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1936=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1936=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1936=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1936=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1936=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-1936=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1936=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1936=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * perl-Text-CSV_XS-debuginfo-1.34-150000.3.3.1 * perl-Text-CSV_XS-debugsource-1.34-150000.3.3.1 * perl-Text-CSV_XS-1.34-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * perl-Text-CSV_XS-1.34-150000.3.3.1 * perl-Text-CSV_XS-debuginfo-1.34-150000.3.3.1 * perl-Text-CSV_XS-debugsource-1.34-150000.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) *perl-Text-CSV_XS-1.34-150000.3.3.1 * perl-Text-CSV_XS-debuginfo-1.34-150000.3.3.1 * perl-Text-CSV_XS-debugsource-1.34-150000.3.3.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * perl-Text-CSV_XS-1.34-150000.3.3.1 * perl-Text-CSV_XS-debuginfo-1.34-150000.3.3.1 * perl-Text-CSV_XS-debugsource-1.34-150000.3.3.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * perl-Text-CSV_XS-1.34-150000.3.3.1 * perl-Text-CSV_XS-debuginfo-1.34-150000.3.3.1 * perl-Text-CSV_XS-debugsource-1.34-150000.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * perl-Text-CSV_XS-1.34-150000.3.3.1 * perl-Text-CSV_XS-debuginfo-1.34-150000.3.3.1 * perl-Text-CSV_XS-debugsource-1.34-150000.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * perl-Text-CSV_XS-1.34-150000.3.3.1 * perl-Text-CSV_XS-debuginfo-1.34-150000.3.3.1 * perl-Text-CSV_XS-debugsource-1.34-150000.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * perl-Text-CSV_XS-1.34-150000.3.3.1 * perl-Text-CSV_XS-debuginfo-1.34-150000.3.3.1 * perl-Text-CSV_XS-debugsource-1.34-150000.3.3.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * perl-Text-CSV_XS-1.34-150000.3.3.1 * perl-Text-CSV_XS-debuginfo-1.34-150000.3.3.1 * perl-Text-CSV_XS-debugsource-1.34-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * perl-Text-CSV_XS-1.34-150000.3.3.1 * perl-Text-CSV_XS-debuginfo-1.34-150000.3.3.1 * perl-Text-CSV_XS-debugsource-1.34-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * perl-Text-CSV_XS-1.34-150000.3.3.1 * perl-Text-CSV_XS-debuginfo-1.34-150000.3.3.1 * perl-Text-CSV_XS-debugsource-1.34-150000.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2026-7111.html *https://bugzilla.suse.com/show_bug.cgi?id=1263690 . Fixes a significant issue with perl-Text-CSV_XS affecting multiple SUSE versions, addressing type confusion.. SUSE Security Update, Perl Module Vulnerability, System Patch, Software Security Fix. . Severity: Important. LinuxSecurity.com Team

Calendar 2 May 18, 2026 Important SuSE
100

SUSE Linux Python3 Important Command Injection Fix Advisory 2026-1937-1

An update that solves five vulnerabilities can now be installed.. # Security update for python3 Announcement ID: SUSE-SU-2026:1937-1 Release Date: 2026-05-18T07:42:02Z Rating: important References: * bsc#1261969 * bsc#1261970 * bsc#1262098 * bsc#1262319 * bsc#1262654 Cross-References: * CVE-2026-1502 * CVE-2026-3446 * CVE-2026-4786 * CVE-2026-6019 * CVE-2026-6100 CVSS scores: * CVE-2026-1502 ( SUSE ): 5.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2026-1502 ( SUSE ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2026-1502 ( NVD ): 5.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-3446 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2026-3446 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2026-3446 ( NVD ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-4786 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-4786 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L * CVE-2026-4786 ( NVD ): 7.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-6019 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-6019 ( SUSE ): 3.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N * CVE-2026-6019 ( NVD ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-6100 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2026-6100 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-6100 ( NVD ): 9.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for python3 fixes the following issue: * CVE-2026-1502: HTTP client proxy tunnel headers not validated for CR/LF (bsc#1261969). * CVE-2026-3446: base64 decoding stops at first padded quad by default and ignores other information that could be processed (bsc#1261970). * CVE-2026-4786: URLs prefixed with `%action` can pass the dash-prefix safety check and allow for command injection (bsc#1262319). * CVE-2026-6019: `BaseCookie.js_output()` does not neutralize characters in cookie values embedded in JS (bsc#1262654). * CVE-2026-6100: use-after-free in `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile` when process is under memory pressure(bsc#1262098). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-1937=1 * SUSE Linux Enterprise Server 12 SP5 LTSS ExtendedSecurity zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-1937=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * python3-devel-3.4.10-25.185.1 * python3-base-3.4.10-25.185.1 * python3-tk-debuginfo-3.4.10-25.185.1 * python3-3.4.10-25.185.1 * python3-curses-3.4.10-25.185.1 * python3-curses-debuginfo-3.4.10-25.185.1 * python3-debuginfo-3.4.10-25.185.1 * python3-tk-3.4.10-25.185.1 * libpython3_4m1_0-3.4.10-25.185.1 * python3-debugsource-3.4.10-25.185.1 * python3-base-debugsource-3.4.10-25.185.1 * libpython3_4m1_0-debuginfo-3.4.10-25.185.1 * python3-base-debuginfo-3.4.10-25.185.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (ppc64le s390x x86_64) * python3-devel-debuginfo-3.4.10-25.185.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libpython3_4m1_0-debuginfo-32bit-3.4.10-25.185.1 * libpython3_4m1_0-32bit-3.4.10-25.185.1 * python3-base-debuginfo-32bit-3.4.10-25.185.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libpython3_4m1_0-32bit-3.4.10-25.185.1 * python3-devel-3.4.10-25.185.1 * python3-base-3.4.10-25.185.1 * python3-tk-debuginfo-3.4.10-25.185.1 * libpython3_4m1_0-debuginfo-32bit-3.4.10-25.185.1 * python3-3.4.10-25.185.1 * python3-curses-3.4.10-25.185.1 * python3-curses-debuginfo-3.4.10-25.185.1 * python3-debuginfo-3.4.10-25.185.1 * libpython3_4m1_0-3.4.10-25.185.1 * python3-base-debuginfo-32bit-3.4.10-25.185.1 * python3-tk-3.4.10-25.185.1 * python3-devel-debuginfo-3.4.10-25.185.1 * python3-debugsource-3.4.10-25.185.1 * python3-base-debugsource-3.4.10-25.185.1 * libpython3_4m1_0-debuginfo-3.4.10-25.185.1 * python3-base-debuginfo-3.4.10-25.185.1 ## References: * https://www.suse.com/security/cve/CVE-2026-1502.html * https://www.suse.com/security/cve/CVE-2026-3446.html * https://www.suse.com/security/cve/CVE-2026-4786.html *https://www.suse.com/security/cve/CVE-2026-6019.html * https://www.suse.com/security/cve/CVE-2026-6100.html * https://bugzilla.suse.com/show_bug.cgi?id=1261969 * https://bugzilla.suse.com/show_bug.cgi?id=1261970 * https://bugzilla.suse.com/show_bug.cgi?id=1262098 * https://bugzilla.suse.com/show_bug.cgi?id=1262319 * https://bugzilla.suse.com/show_bug.cgi?id=1262654 . SUSE updates python3 with fixes for five important issues. Ensure your system is patched to safeguard against risks.. SUSE python3 security update important vulnerabilities patch. . Severity: Important. LinuxSecurity.com Team

Calendar 2 May 18, 2026 Important SuSE
100

SUSE Google Cloud SAP Agent Important Denial Of Service Vuln 2026-1938-1

An update that solves one vulnerability can now be installed.. # Security update for google-cloud-sap-agent Announcement ID: SUSE-SU-2026:1938-1 Release Date: 2026-05-18T07:42:44Z Rating: important References: * bsc#1262936 Cross-References: * CVE-2026-34986 CVSS scores: * CVE-2026-34986 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-34986 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-34986 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for google-cloud-sap-agent fixes the following issue: * CVE-2026-34986: github.com/go-jose/go-jose/v4: processing of JWE object with empty `encrypted_key` field but key wrapping algorithm set can lead to a denial of service (bsc#1262936). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2026-1938=1 * Public Cloud Module 15-SP6 zypper in -t patchSUSE-SLE-Module-Public-Cloud-15-SP6-2026-1938=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2026-1938=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-1938=1 ## Package List: * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-3.12-150100.3.66.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-3.12-150100.3.66.1 * Public Cloud Module 15-SP7 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-3.12-150100.3.66.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-3.12-150100.3.66.1 ## References: * https://www.suse.com/security/cve/CVE-2026-34986.html * https://bugzilla.suse.com/show_bug.cgi?id=1262936 . Important security advisory for SUSE addressing denial of service in google-cloud-sap-agent, CVE-2026-34986.. SUSE security, google-cloud-sap-agent, important advisory. . Severity: Important. LinuxSecurity.com Team

Calendar 2 May 18, 2026 Important SuSE
100

openSUSE PackageKit Important LPE Risk Fix SUSE-2026-1939-1

An update that solves one vulnerability can now be installed.. # Security update for PackageKit Announcement ID: SUSE-SU-2026:1939-1 Release Date: 2026-05-18T07:43:59Z Rating: important References: * bsc#1262220 Cross-References: * CVE-2026-41651 CVSS scores: * CVE-2026-41651 ( SUSE ): 9.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2026-41651 ( SUSE ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2026-41651 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for PackageKit fixes the following issue: * CVE-2026-41651: race condition allows for arbitrary RPM package installation as root and can lead to LPE (bsc#1262220). ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-1939=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1939=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1939=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-1939=1 * Desktop Applications Module 15-SP7 zypper in -t patchSUSE-SLE-Module-Desktop-Applications-15-SP7-2026-1939=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * PackageKit-backend-dnf-debuginfo-1.2.8-150600.4.14.1 * PackageKit-backend-zypp-1.2.8-150600.4.14.1 * libpackagekit-glib2-devel-1.2.8-150600.4.14.1 * PackageKit-backend-dnf-1.2.8-150600.4.14.1 * PackageKit-backend-zypp-debuginfo-1.2.8-150600.4.14.1 * PackageKit-devel-1.2.8-150600.4.14.1 * PackageKit-gtk3-module-debuginfo-1.2.8-150600.4.14.1 * typelib-1_0-PackageKitGlib-1_0-1.2.8-150600.4.14.1 * PackageKit-gstreamer-plugin-1.2.8-150600.4.14.1 * PackageKit-1.2.8-150600.4.14.1 * PackageKit-debugsource-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-1.2.8-150600.4.14.1 * PackageKit-debuginfo-1.2.8-150600.4.14.1 * PackageKit-gstreamer-plugin-debuginfo-1.2.8-150600.4.14.1 * PackageKit-gtk3-module-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-debuginfo-1.2.8-150600.4.14.1 * PackageKit-devel-debuginfo-1.2.8-150600.4.14.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libpackagekit-glib2-devel-64bit-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-64bit-debuginfo-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-64bit-1.2.8-150600.4.14.1 * openSUSE Leap 15.6 (noarch) * PackageKit-branding-upstream-1.2.8-150600.4.14.1 * PackageKit-lang-1.2.8-150600.4.14.1 * openSUSE Leap 15.6 (x86_64) * libpackagekit-glib2-devel-32bit-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-32bit-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-32bit-debuginfo-1.2.8-150600.4.14.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * PackageKit-backend-zypp-1.2.8-150600.4.14.1 * PackageKit-devel-1.2.8-150600.4.14.1 * libpackagekit-glib2-devel-1.2.8-150600.4.14.1 * PackageKit-backend-zypp-debuginfo-1.2.8-150600.4.14.1 * typelib-1_0-PackageKitGlib-1_0-1.2.8-150600.4.14.1 * PackageKit-1.2.8-150600.4.14.1 * PackageKit-debugsource-1.2.8-150600.4.14.1 *PackageKit-debuginfo-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-debuginfo-1.2.8-150600.4.14.1 * PackageKit-devel-debuginfo-1.2.8-150600.4.14.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * PackageKit-lang-1.2.8-150600.4.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * PackageKit-backend-zypp-1.2.8-150600.4.14.1 * PackageKit-devel-1.2.8-150600.4.14.1 * libpackagekit-glib2-devel-1.2.8-150600.4.14.1 * PackageKit-backend-zypp-debuginfo-1.2.8-150600.4.14.1 * typelib-1_0-PackageKitGlib-1_0-1.2.8-150600.4.14.1 * PackageKit-1.2.8-150600.4.14.1 * PackageKit-debugsource-1.2.8-150600.4.14.1 * PackageKit-debuginfo-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-debuginfo-1.2.8-150600.4.14.1 * PackageKit-devel-debuginfo-1.2.8-150600.4.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * PackageKit-lang-1.2.8-150600.4.14.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * PackageKit-gtk3-module-debuginfo-1.2.8-150600.4.14.1 * PackageKit-gstreamer-plugin-1.2.8-150600.4.14.1 * PackageKit-gstreamer-plugin-debuginfo-1.2.8-150600.4.14.1 * PackageKit-gtk3-module-1.2.8-150600.4.14.1 * PackageKit-debugsource-1.2.8-150600.4.14.1 * PackageKit-debuginfo-1.2.8-150600.4.14.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * PackageKit-backend-zypp-1.2.8-150600.4.14.1 * PackageKit-devel-1.2.8-150600.4.14.1 * libpackagekit-glib2-devel-1.2.8-150600.4.14.1 * PackageKit-backend-zypp-debuginfo-1.2.8-150600.4.14.1 * typelib-1_0-PackageKitGlib-1_0-1.2.8-150600.4.14.1 * PackageKit-1.2.8-150600.4.14.1 * PackageKit-debugsource-1.2.8-150600.4.14.1 * PackageKit-debuginfo-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-debuginfo-1.2.8-150600.4.14.1 *PackageKit-devel-debuginfo-1.2.8-150600.4.14.1 * Desktop Applications Module 15-SP7 (noarch) * PackageKit-lang-1.2.8-150600.4.14.1 ## References: * https://www.suse.com/security/cve/CVE-2026-41651.html * https://bugzilla.suse.com/show_bug.cgi?id=1262220 . Fix for important PackageKit issue released for openSUSE; addresses LPE risk due to race condition vulnerability.. PackageKit update, LPE risk, openSUSE security. . Severity: Important. LinuxSecurity.com Team

Calendar 2 May 18, 2026 Important SuSE
202

Critical Update for openSUSE PackageKit Addressing CVE-2026-41651 Issue

An update that solves one vulnerability can now be installed.. # Security update for PackageKit Announcement ID: SUSE-SU-2026:1939-1 Release Date: 2026-05-18T07:43:59Z Rating: important References: * bsc#1262220 Cross-References: * CVE-2026-41651 CVSS scores: * CVE-2026-41651 ( SUSE ): 9.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2026-41651 ( SUSE ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2026-41651 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for PackageKit fixes the following issue: * CVE-2026-41651: race condition allows for arbitrary RPM package installation as root and can lead to LPE (bsc#1262220). ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-1939=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1939=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1939=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-1939=1 * Desktop Applications Module 15-SP7 zypper in -t patchSUSE-SLE-Module-Desktop-Applications-15-SP7-2026-1939=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * PackageKit-backend-dnf-debuginfo-1.2.8-150600.4.14.1 * PackageKit-backend-zypp-1.2.8-150600.4.14.1 * libpackagekit-glib2-devel-1.2.8-150600.4.14.1 * PackageKit-backend-dnf-1.2.8-150600.4.14.1 * PackageKit-backend-zypp-debuginfo-1.2.8-150600.4.14.1 * PackageKit-devel-1.2.8-150600.4.14.1 * PackageKit-gtk3-module-debuginfo-1.2.8-150600.4.14.1 * typelib-1_0-PackageKitGlib-1_0-1.2.8-150600.4.14.1 * PackageKit-gstreamer-plugin-1.2.8-150600.4.14.1 * PackageKit-1.2.8-150600.4.14.1 * PackageKit-debugsource-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-1.2.8-150600.4.14.1 * PackageKit-debuginfo-1.2.8-150600.4.14.1 * PackageKit-gstreamer-plugin-debuginfo-1.2.8-150600.4.14.1 * PackageKit-gtk3-module-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-debuginfo-1.2.8-150600.4.14.1 * PackageKit-devel-debuginfo-1.2.8-150600.4.14.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libpackagekit-glib2-devel-64bit-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-64bit-debuginfo-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-64bit-1.2.8-150600.4.14.1 * openSUSE Leap 15.6 (noarch) * PackageKit-branding-upstream-1.2.8-150600.4.14.1 * PackageKit-lang-1.2.8-150600.4.14.1 * openSUSE Leap 15.6 (x86_64) * libpackagekit-glib2-devel-32bit-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-32bit-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-32bit-debuginfo-1.2.8-150600.4.14.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * PackageKit-backend-zypp-1.2.8-150600.4.14.1 * PackageKit-devel-1.2.8-150600.4.14.1 * libpackagekit-glib2-devel-1.2.8-150600.4.14.1 * PackageKit-backend-zypp-debuginfo-1.2.8-150600.4.14.1 * typelib-1_0-PackageKitGlib-1_0-1.2.8-150600.4.14.1 * PackageKit-1.2.8-150600.4.14.1 * PackageKit-debugsource-1.2.8-150600.4.14.1 *PackageKit-debuginfo-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-debuginfo-1.2.8-150600.4.14.1 * PackageKit-devel-debuginfo-1.2.8-150600.4.14.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * PackageKit-lang-1.2.8-150600.4.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * PackageKit-backend-zypp-1.2.8-150600.4.14.1 * PackageKit-devel-1.2.8-150600.4.14.1 * libpackagekit-glib2-devel-1.2.8-150600.4.14.1 * PackageKit-backend-zypp-debuginfo-1.2.8-150600.4.14.1 * typelib-1_0-PackageKitGlib-1_0-1.2.8-150600.4.14.1 * PackageKit-1.2.8-150600.4.14.1 * PackageKit-debugsource-1.2.8-150600.4.14.1 * PackageKit-debuginfo-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-debuginfo-1.2.8-150600.4.14.1 * PackageKit-devel-debuginfo-1.2.8-150600.4.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * PackageKit-lang-1.2.8-150600.4.14.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * PackageKit-gtk3-module-debuginfo-1.2.8-150600.4.14.1 * PackageKit-gstreamer-plugin-1.2.8-150600.4.14.1 * PackageKit-gstreamer-plugin-debuginfo-1.2.8-150600.4.14.1 * PackageKit-gtk3-module-1.2.8-150600.4.14.1 * PackageKit-debugsource-1.2.8-150600.4.14.1 * PackageKit-debuginfo-1.2.8-150600.4.14.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * PackageKit-backend-zypp-1.2.8-150600.4.14.1 * PackageKit-devel-1.2.8-150600.4.14.1 * libpackagekit-glib2-devel-1.2.8-150600.4.14.1 * PackageKit-backend-zypp-debuginfo-1.2.8-150600.4.14.1 * typelib-1_0-PackageKitGlib-1_0-1.2.8-150600.4.14.1 * PackageKit-1.2.8-150600.4.14.1 * PackageKit-debugsource-1.2.8-150600.4.14.1 * PackageKit-debuginfo-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-1.2.8-150600.4.14.1 * libpackagekit-glib2-18-debuginfo-1.2.8-150600.4.14.1 *PackageKit-devel-debuginfo-1.2.8-150600.4.14.1 * Desktop Applications Module 15-SP7 (noarch) * PackageKit-lang-1.2.8-150600.4.14.1 ## References: * https://www.suse.com/security/cve/CVE-2026-41651.html * https://bugzilla.suse.com/show_bug.cgi?id=1262220 . # Security update for PackageKit Announcement ID: SUSE-SU-2026:1939-1 Release Date: 2026-05-18T07:43. update, solves, vulnerability, installed, security, packagekit, annou. . Severity: Important. LinuxSecurity.com Team

Calendar 2 May 18, 2026 Important OpenSUSE
News Add Esm H240

Get the latest News and Insights

Get the latest Linux and open source security news straight to your inbox.

Community Poll

What got you started with Linux?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum {0} answer(s).
Please select maximum {0} answer(s).
/main-polls/150-what-got-you-started-with-linux?task=poll.vote&format=json
150
radio
0
[{"id":483,"title":"Self-taught through trial and error","votes":531,"type":"x","order":1,"pct":78.78,"resources":[]},{"id":484,"title":"Formal training or courses","votes":29,"type":"x","order":2,"pct":4.3,"resources":[]},{"id":485,"title":"A job that required it","votes":33,"type":"x","order":3,"pct":4.9,"resources":[]},{"id":486,"title":"Other","votes":81,"type":"x","order":4,"pct":12.02,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
bottom 200
Your message here