SUSE-SU-2026:20575-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-202620575-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20575-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2026:20575-1
Upstream
Related
Published
2026-02-17T14:06:56Z
Modified
2026-03-23T04:52:50.003655Z
Summary
Security update for wicked2nm
Details

This update for wicked2nm fixes the following issues:

  • Update to version 1.4.1
  • CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion (bsc#1257908).
References

Affected packages

SUSE:Linux Enterprise Server 16.0 / wicked2nm

Package

Name
wicked2nm
Purl
pkg:rpm/suse/wicked2nm&distro=SUSE%20Linux%20Enterprise%20Server%2016.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.1-160000.1.1

Ecosystem specific

{
    "binaries": [
        {
            "wicked2nm": "1.4.1-160000.1.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20575-1.json"

SUSE:Linux Enterprise Server for SAP applications 16.0 / wicked2nm

Package

Name
wicked2nm
Purl
pkg:rpm/suse/wicked2nm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20applications%2016.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.1-160000.1.1

Ecosystem specific

{
    "binaries": [
        {
            "wicked2nm": "1.4.1-160000.1.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20575-1.json"