| opensuse openSUSE-SU-2026:20193-1: openSUSE 16 : Security update for orthanc, gdcm, orthanc-authorization, orthanc-dicomweb, orthanc-gdcm, orthanc-indexer, orthanc-mysql, orthanc-neuro, orthanc-postgresql, orthanc-python, orthanc-stl, orthanc-tcia, orthanc-wsi, python-pyorthanc (Important) (openSUSE-SU-2026:20193-1) | CVE-2024-25569, CVE-2024-22373, CVE-2024-22391 | 2/12/2026 | development |
| opensuse openSUSE-SU-2026:20192-1: openSUSE 16 : Security update for tailscale (Important) (openSUSE-SU-2026:20192-1) | CVE-2025-22869, CVE-2025-58058 | 2/12/2026 | development |
| opensuse openSUSE-SU-2026:20185-1: openSUSE 16 : Security update for cockpit-packages (Important) (openSUSE-SU-2026:20185-1) | CVE-2025-13465 | 2/12/2026 | development |
| opensuse openSUSE-SU-2026:20186-1: openSUSE 16 : Security update for libsoup (Important) (openSUSE-SU-2026:20186-1) | CVE-2026-1536, CVE-2026-1761 | 2/12/2026 | development |
| opensuse openSUSE-SU-2026:20191-1: openSUSE 16 : Security update for trivy (Important) (openSUSE-SU-2026:20191-1) | CVE-2025-66564, CVE-2025-64702 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0430-1: SUSE SLED15 / SLES15 : Security update for python-pyasn1 (Important) (SUSE-SU-2026:0430-1) | CVE-2026-23490 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0437-1: SUSE SLED15 / SLES15 : Security update for ImageMagick (Important) (SUSE-SU-2026:0437-1) | CVE-2026-22770, CVE-2026-23876, CVE-2026-23952, CVE-2026-23874 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0450-1: SUSE SLES15 : Security update for munge (Important) (SUSE-SU-2026:0450-1) | CVE-2026-25506 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0423-1: SUSE SLES15 / openSUSE 15 : Security update for python-brotlipy (Important) (SUSE-SU-2026:0423-1) | | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0447-1: SUSE SLED15 / SLES15 : Security update for the Linux Kernel (Important) (SUSE-SU-2026:0447-1) | CVE-2025-71120, CVE-2026-22997, CVE-2025-68820, CVE-2025-71149, CVE-2025-71111, CVE-2025-40238, CVE-2025-71098, CVE-2025-68285, CVE-2025-68773, CVE-2025-68349, CVE-2025-71095, CVE-2025-68188, CVE-2025-71081, CVE-2025-68798, CVE-2025-71088, CVE-2025-68775, CVE-2025-71087, CVE-2025-40363, CVE-2026-23005, CVE-2025-71147, CVE-2025-39813, CVE-2025-68783, CVE-2025-40261, CVE-2025-68363, CVE-2025-71154, CVE-2025-38243, CVE-2025-68178, CVE-2025-68789, CVE-2025-71114, CVE-2025-40136, CVE-2025-71084, CVE-2025-40350, CVE-2025-68241, CVE-2025-39836, CVE-2025-71131, CVE-2025-40328, CVE-2025-37751, CVE-2025-68770, CVE-2026-22985, CVE-2025-68771, CVE-2025-68245, CVE-2025-68776, CVE-2025-71097, CVE-2025-71086, CVE-2025-40257, CVE-2025-71079, CVE-2026-22999, CVE-2025-40097, CVE-2025-68815, CVE-2026-23000, CVE-2025-71082, CVE-2025-40142, CVE-2025-71112, CVE-2025-71138, CVE-2025-68802, CVE-2025-38539, CVE-2026-22990, CVE-2025-68337, CVE-2025-71085, CVE-2025-68728, CVE-2026-22991, CVE-2026-22992, CVE-2023-54013, CVE-2024-56721, CVE-2025-38379, CVE-2025-71077, CVE-2026-23011, CVE-2025-68727, CVE-2025-68256, CVE-2024-53070, CVE-2025-37813, CVE-2025-68227, CVE-2025-71157, CVE-2025-71163, CVE-2025-68261, CVE-2025-40259, CVE-2026-22976, CVE-2025-68797, CVE-2025-68171, CVE-2025-40106, CVE-2025-40181, CVE-2025-71132, CVE-2025-68795, CVE-2025-68301, CVE-2025-39829, CVE-2025-71094, CVE-2025-40264, CVE-2025-68174, CVE-2026-23001, CVE-2025-71066, CVE-2024-42103, CVE-2025-71089, CVE-2025-68813, CVE-2025-71143, CVE-2025-68804, CVE-2025-71100, CVE-2024-53149, CVE-2025-68320, CVE-2025-68800, CVE-2025-68768, CVE-2025-39913, CVE-2025-71083, CVE-2025-38322, CVE-2025-71064, CVE-2025-68801, CVE-2025-71101, CVE-2025-40355, CVE-2025-22047, CVE-2025-40166, CVE-2025-71108, CVE-2025-71145, CVE-2025-68215, CVE-2026-22984, CVE-2025-71096, CVE-2025-71076, CVE-2025-68819, CVE-2025-71135, CVE-2025-40177, CVE-2025-71116, CVE-2025-39689, CVE-2025-68325, CVE-2025-68777, CVE-2025-39880, CVE-2025-71123, CVE-2025-71093, CVE-2025-71119, CVE-2025-68366, CVE-2026-22977, CVE-2025-71137, CVE-2025-68254, CVE-2025-71136, CVE-2023-53714, CVE-2026-22978, CVE-2026-23006, CVE-2024-27005, CVE-2026-22996, CVE-2025-68808, CVE-2025-71091, CVE-2025-68297, CVE-2025-71156, CVE-2025-68764, CVE-2025-71078, CVE-2025-38209, CVE-2025-68814, CVE-2025-40254, CVE-2025-71118, CVE-2025-37744, CVE-2026-22988, CVE-2025-40202, CVE-2025-71080, CVE-2025-68379, CVE-2025-71130, CVE-2025-68367, CVE-2025-68733, CVE-2025-40132, CVE-2025-71099, CVE-2025-68327, CVE-2025-71141, CVE-2025-71142, CVE-2025-68200, CVE-2025-68816, CVE-2025-68365, CVE-2025-68725, CVE-2025-71162, CVE-2025-68372, CVE-2025-68284, CVE-2025-68788, CVE-2025-68803, CVE-2025-68296, CVE-2025-71133, CVE-2026-22993 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0443-1: SUSE SLED15 / SLES15 : Security update for python-urllib3 (Moderate) (SUSE-SU-2026:0443-1) | CVE-2025-66418, CVE-2026-21441, CVE-2025-66471 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0434-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for gpg2 (Important) (SUSE-SU-2026:0434-1) | CVE-2026-24882 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0432-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for sqlite3 (Moderate) (SUSE-SU-2026:0432-1) | CVE-2025-7709 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0441-1: SUSE SLES12 : Security update for java-1_8_0-openjdk (Important) (SUSE-SU-2026:0441-1) | CVE-2026-21945, CVE-2026-21933, CVE-2026-21925, CVE-2026-21932 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0439-1: SUSE SLES15 / openSUSE 15 : Security update for apptainer (Important) (SUSE-SU-2026:0439-1) | CVE-2025-22870, CVE-2025-65105, CVE-2025-27144, CVE-2025-8556, CVE-2025-47913, CVE-2025-58181, CVE-2025-47914, CVE-2024-45310, CVE-2025-22869, CVE-2025-22872 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0440-1: SUSE SLES15 / openSUSE 15 : Security update for python-Django (Important) (SUSE-SU-2026:0440-1) | CVE-2026-1287, CVE-2025-13473, CVE-2026-1285, CVE-2026-1207, CVE-2025-14550, CVE-2026-1312 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0438-1: SUSE SLES15 / openSUSE 15 : Security update for ImageMagick (Important) (SUSE-SU-2026:0438-1) | CVE-2026-22770, CVE-2026-23876, CVE-2026-23952, CVE-2026-23874 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0424-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for python-wheel (Important) (SUSE-SU-2026:0424-1) | CVE-2026-24049 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0444-1: SUSE SLES15 / openSUSE 15 : Security update for uriparser (Moderate) (SUSE-SU-2026:0444-1) | CVE-2025-67899 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0448-1: SUSE SLES12 : Security update for munge (Important) (SUSE-SU-2026:0448-1) | CVE-2026-25506 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0449-1: SUSE SLED15 / SLES15 : Security update for freerdp2 (Important) (SUSE-SU-2026:0449-1) | CVE-2026-22856, CVE-2026-22852, CVE-2026-22854, CVE-2026-23530, CVE-2026-23531, CVE-2026-23534, CVE-2026-22859, CVE-2026-23532 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0433-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for xrdp (Important) (SUSE-SU-2026:0433-1) | CVE-2025-68670 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0436-1: SUSE SLES15 : Security update for qemu (Important) (SUSE-SU-2026:0436-1) | CVE-2025-11234 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0442-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for gimp (Important) (SUSE-SU-2026:0442-1) | CVE-2026-0797 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0422-1: SUSE SLES12 : Security update for avahi (Moderate) (SUSE-SU-2026:0422-1) | CVE-2025-68468, CVE-2025-68471, CVE-2025-68276 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0425-1: SUSE SLED15 / SLES15 : Security update for python313-wheel (Important) (SUSE-SU-2026:0425-1) | CVE-2026-24049 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0426-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for go1.24 (Critical) (SUSE-SU-2026:0426-1) | CVE-2025-68121, CVE-2025-68119, CVE-2025-61732 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0445-1: SUSE SLED15 / SLES15 : Security update for qemu (Moderate) (SUSE-SU-2026:0445-1) | CVE-2026-0665 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0427-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for go1.25 (Critical) (SUSE-SU-2026:0427-1) | CVE-2025-68121, CVE-2025-61732 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0431-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for libsoup (Important) (SUSE-SU-2026:0431-1) | CVE-2026-1536, CVE-2026-1761 | 2/12/2026 | development |
| suse_linux SUSE-SU-2026:0435-1: SUSE SLES15 / openSUSE 15 : Security update for nodejs20 (Important) (SUSE-SU-2026:0435-1) | CVE-2025-55132, CVE-2025-59465, CVE-2026-21637, CVE-2025-55131, CVE-2026-22036, CVE-2025-59466, CVE-2025-55130 | 2/12/2026 | development |
| redhat RHSA-2026:2573: RHSA-2026:2573: kernel security update (Moderate) | CVE-2025-40322, CVE-2025-68301, CVE-2023-53673, CVE-2023-53833, CVE-2023-53192, CVE-2023-53751, CVE-2025-40251, CVE-2025-40304, CVE-2022-50673, CVE-2022-50865, CVE-2022-49503 | 2/12/2026 | testing |
| redhat RHSA-2026:2583: RHSA-2026:2583: kernel-rt security update (Moderate) | CVE-2025-40322, CVE-2023-53673, CVE-2023-53833, CVE-2025-40258, CVE-2025-40096, CVE-2025-38051, CVE-2025-38022, CVE-2025-40251, CVE-2025-40304 | 2/12/2026 | testing |
| redhat RHSA-2026:2557: RHSA-2026:2557: kpatch-patch-4_18_0-477_107_1, kpatch-patch-4_18_0-477_120_1, kpatch-patch-4_18_0-477_81_1, kpatch-patch-4_18_0-477_89_1, and kpatch-patch-4_18_0-477_97_1 security update (Moderate) | CVE-2025-68285 | 2/12/2026 | testing |
| redhat RHSA-2026:2558: RHSA-2026:2558: kpatch-patch-4_18_0-372_131_1, kpatch-patch-4_18_0-372_137_1, kpatch-patch-4_18_0-372_145_1, kpatch-patch-4_18_0-372_158_1, and kpatch-patch-4_18_0-372_170_1 security update (Moderate) | CVE-2025-68285 | 2/12/2026 | testing |
| redhat RHSA-2026:2560: RHSA-2026:2560: kernel security update (Moderate) | CVE-2025-40322, CVE-2023-53673, CVE-2023-53833, CVE-2025-40258, CVE-2025-40096, CVE-2025-38051, CVE-2025-38022, CVE-2025-40251, CVE-2025-40304 | 2/12/2026 | testing |
| unity_linux UTSA-2026-005336: Unity Linux: binutils (UTSA-2026-005336) | CVE-2025-11494 | 2/12/2026 | testing |
| unity_linux UTSA-2026-005350: Unity Linux: openssl (UTSA-2026-005350) | CVE-2025-69421 | 2/12/2026 | testing |
| unity_linux UTSA-2026-005337: Unity Linux: httpd (UTSA-2026-005337) | CVE-2025-66200 | 2/12/2026 | testing |
| unity_linux UTSA-2026-005344: Unity Linux: postgresql-13 (UTSA-2026-005344) | CVE-2025-8714 | 2/12/2026 | testing |
| unity_linux UTSA-2026-005340: Unity Linux: httpd (UTSA-2026-005340) | CVE-2025-65082 | 2/12/2026 | testing |
| unity_linux UTSA-2026-005347: Unity Linux: redis (UTSA-2026-005347) | CVE-2025-46817 | 2/12/2026 | testing |
| fedora FEDORA-2026-ef7170c9f6: gnutls-3.8.12-1.fc43 | CVE-2025-14831, CVE-2026-1584 | 2/12/2026 | testing |
| fedora FEDORA-2026-f1fabb2a49: p11-kit-0.26.2-1.fc43 | CVE-2026-2100 | 2/12/2026 | testing |
| apple 126348: About the security content of macOS Tahoe 26.3 | CVE-2026-20673, CVE-2025-59375, CVE-2026-20605, CVE-2026-20650, CVE-2026-20608, CVE-2026-20619, CVE-2026-20669, CVE-2026-20630, CVE-2026-20681, CVE-2026-20700, CVE-2026-20628, CVE-2026-20629, CVE-2026-20654, CVE-2026-20653, CVE-2026-20658, CVE-2026-20627, CVE-2026-20617, CVE-2026-20652, CVE-2026-20636, CVE-2026-20606, CVE-2026-20680, CVE-2026-20675, CVE-2026-20676, CVE-2026-20648, CVE-2026-20603, CVE-2026-20656, CVE-2026-20644, CVE-2026-20671, CVE-2026-20620, CVE-2026-20601, CVE-2026-20609, CVE-2026-20615, CVE-2026-20624, CVE-2026-20610, CVE-2026-20618, CVE-2026-20635, CVE-2026-20667, CVE-2026-20649, CVE-2026-20666, CVE-2026-20660, CVE-2026-20602, CVE-2026-20641, CVE-2026-20646, CVE-2026-20677, CVE-2026-20647, CVE-2026-20611, CVE-2026-20621, CVE-2026-20623, CVE-2026-20616, CVE-2026-20614, CVE-2026-20634, CVE-2026-20626, CVE-2026-20662, CVE-2026-20625, CVE-2026-20612 | 2/12/2026 | testing |
| apple 126346: About the security content of iOS 26.3 and iPadOS 26.3 | CVE-2025-59375, CVE-2026-20650, CVE-2026-20655, CVE-2026-20608, CVE-2026-20700, CVE-2026-20628, CVE-2026-20653, CVE-2026-20627, CVE-2026-20617, CVE-2026-20661, CVE-2026-20652, CVE-2026-20636, CVE-2026-20606, CVE-2026-20680, CVE-2026-20675, CVE-2026-20676, CVE-2026-20678, CVE-2026-20682, CVE-2026-20645, CVE-2026-20644, CVE-2026-20671, CVE-2026-20609, CVE-2026-20615, CVE-2026-20635, CVE-2026-20667, CVE-2026-20638, CVE-2026-20649, CVE-2026-20640, CVE-2026-20660, CVE-2026-20641, CVE-2026-20642, CVE-2026-20663, CVE-2026-20677, CVE-2026-20611, CVE-2026-20621, CVE-2026-20674, CVE-2026-20634, CVE-2026-20626, CVE-2026-20654 | 2/12/2026 | testing |
| unity_linux UTSA-2026-005349: Unity Linux: postgresql-13 (UTSA-2026-005349) | CVE-2025-1094 | 2/12/2026 | testing |
| unity_linux UTSA-2026-005334: Unity Linux: postgresql-13 (UTSA-2026-005334) | CVE-2025-8715 | 2/12/2026 | testing |
| unity_linux UTSA-2026-005342: Unity Linux: openssl (UTSA-2026-005342) | CVE-2025-69420 | 2/12/2026 | testing |
| redhat RHSA-2026:2513: RHSA-2026:2513: spice-client-win security update (Important) | CVE-2026-0719, CVE-2026-1761 | 2/11/2026 | testing |