SUSE 5556 Published by

A security update for govulncheck-vulndb fixes 76 vulnerabilities and contains one feature, and can be installed on openSUSE Leap 15.6 by running "zypper in -t patch openSUSE-SLE-15.6-2026-403=1". The update includes multiple patches to various packages, including govulncheck-vulndb, chromium, and others. Another security update for chromium fixes two vulnerabilities (CVE-2026-1861 and CVE-2026-1862) in the package, which can be installed on openSUSE Backports SLE-15-SP6 or openSUSE Backports SLE-15-SP7 by running "zypper in -t patch openSUSE-2026-42=1" or "zypper in -t patch openSUSE-2026-41=1", respectively. The updates for chromium fix issues including a heap buffer overflow and type confusion that could be exploited via crafted HTML pages.

SUSE-SU-2026:0403-1: important: Security update for govulncheck-vulndb
openSUSE-SU-2026:0042-1: important: Security update for chromium
openSUSE-SU-2026:0041-1: important: Security update for chromium




SUSE-SU-2026:0403-1: important: Security update for govulncheck-vulndb


# Security update for govulncheck-vulndb

Announcement ID: SUSE-SU-2026:0403-1
Release Date: 2026-02-06T16:58:35Z
Rating: important
References:

* jsc#PED-11136

Cross-References:

* CVE-2023-43630
* CVE-2023-43631
* CVE-2023-43632
* CVE-2023-43633
* CVE-2023-43634
* CVE-2025-14525
* CVE-2025-22873
* CVE-2025-47911
* CVE-2025-58190
* CVE-2025-61732
* CVE-2025-62878
* CVE-2025-67601
* CVE-2025-68121
* CVE-2025-69199
* CVE-2025-69820
* CVE-2025-70849
* CVE-2026-0798
* CVE-2026-1237
* CVE-2026-1580
* CVE-2026-20736
* CVE-2026-20750
* CVE-2026-20800
* CVE-2026-20883
* CVE-2026-20888
* CVE-2026-20897
* CVE-2026-20904
* CVE-2026-20912
* CVE-2026-21696
* CVE-2026-22039
* CVE-2026-22808
* CVE-2026-22822
* CVE-2026-23517
* CVE-2026-23518
* CVE-2026-23645
* CVE-2026-23742
* CVE-2026-23829
* CVE-2026-23831
* CVE-2026-23845
* CVE-2026-23847
* CVE-2026-23849
* CVE-2026-23850
* CVE-2026-23851
* CVE-2026-23881
* CVE-2026-23953
* CVE-2026-23954
* CVE-2026-23960
* CVE-2026-23990
* CVE-2026-23991
* CVE-2026-23992
* CVE-2026-24058
* CVE-2026-24117
* CVE-2026-24124
* CVE-2026-24470
* CVE-2026-24512
* CVE-2026-24513
* CVE-2026-24514
* CVE-2026-24686
* CVE-2026-24735
* CVE-2026-24738
* CVE-2026-24740
* CVE-2026-24748
* CVE-2026-24843
* CVE-2026-24844
* CVE-2026-24846
* CVE-2026-25059
* CVE-2026-25060
* CVE-2026-25121
* CVE-2026-25122
* CVE-2026-25143
* CVE-2026-25145
* CVE-2026-25160
* CVE-2026-25161
* CVE-2026-25499
* CVE-2026-25538
* CVE-2026-25578
* CVE-2026-25579

CVSS scores:

* CVE-2023-43630 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-43631 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-43632 ( NVD ): 9.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-43633 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-43634 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-14525 ( SUSE ): 8.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2025-14525 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2025-14525 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L
* CVE-2025-22873 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-22873 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-22873 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
* CVE-2025-47911 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-47911 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58190 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58190 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-61732 ( SUSE ): 9.4
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-61732 ( SUSE ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2025-61732 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2025-68121 ( SUSE ): 7.6
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-68121 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-69199 ( NVD ): 8.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-69199 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-69820 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-70849 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-0798 ( NVD ): 3.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-1237 ( NVD ): 2.1
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-1580 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-20736 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-20750 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-20800 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-20883 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-20888 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-20897 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-20904 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-20912 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-21696 ( NVD ): 8.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-21696 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22039 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-22039 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-22808 ( NVD ): 5.5
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-22822 ( NVD ): 9.3
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23517 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23518 ( NVD ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23645 ( NVD ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23645 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-23742 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23829 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-23831 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-23831 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-23831 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-23845 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
* CVE-2026-23845 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-23847 ( NVD ): 2.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23847 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-23849 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-23850 ( NVD ): 7.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23850 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-23851 ( NVD ): 8.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23851 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-23881 ( NVD ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2026-23881 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23953 ( NVD ): 8.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
* CVE-2026-23954 ( NVD ): 8.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
* CVE-2026-23960 ( NVD ): 7.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-23990 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-23991 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23991 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-23991 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23992 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23992 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2026-23992 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-24058 ( NVD ): 8.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-24117 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-24117 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-24117 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-24124 ( NVD ): 8.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-24470 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-24512 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-24513 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-24514 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-24686 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-24686 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-24735 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-24738 ( NVD ): 5.9
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-24740 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-24748 ( NVD ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-24843 ( NVD ): 8.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H
* CVE-2026-24844 ( NVD ): 7.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
* CVE-2026-24846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2026-25059 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-25060 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-25121 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-25122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-25143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-25145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2026-25160 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-25161 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-25499 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-25538 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-25578 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
* CVE-2026-25579 ( NVD ): 9.2
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Leap 15.6

An update that solves 76 vulnerabilities and contains one feature can now be
installed.

## Description:

This update for govulncheck-vulndb fixes the following issues:

* Update to version 0.0.20260205T172317 2026-02-05T17:23:17Z. Refs
jsc#PED-11136 Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2026-4337 CVE-2025-68121
* GO-2026-4357 CVE-2026-23954 GHSA-7f67-crqm-jgh7
* GO-2026-4359 CVE-2026-23953 GHSA-x6jc-phwx-hp32
* GO-2026-4395 CVE-2026-25499 GHSA-gwch-7m8v-7544
* GO-2026-4396 CVE-2026-25059 GHSA-qmj2-8r24-xxcq
* GO-2026-4397 CVE-2026-25060 GHSA-wf93-3ghh-h389
* GO-2026-4398 GHSA-grh9-37g7-53mj
* GO-2026-4403 CVE-2025-22873
* GO-2026-4404 CVE-2025-70849 GHSA-mw8w-q3f7-2v85
* GO-2026-4405 CVE-2026-25121 GHSA-5g94-c2wx-8pxw
* GO-2026-4406 CVE-2026-25122 GHSA-6p9p-q6wh-9j89
* GO-2026-4407 CVE-2026-24843 GHSA-qxx2-7h4c-83f4
* GO-2026-4408 CVE-2026-24844 GHSA-vqqr-rmpc-hhg2
* GO-2026-4409 CVE-2026-25145 GHSA-2w4f-9fgg-q2v9
* GO-2026-4411 CVE-2026-25579 GHSA-hrr4-3wgr-68x3
* GO-2026-4412 CVE-2026-25143 GHSA-rf4g-89h5-crcr
* GO-2026-4413 CVE-2026-25578 GHSA-rh3r-8pxm-hg4w
* GO-2026-4414 CVE-2026-25160 GHSA-8jmm-3xwx-w974
* GO-2026-4415 CVE-2026-25161 GHSA-x4q4-7phh-42j9
* GO-2026-4416 CVE-2026-25538 GHSA-8wpc-j9q9-j5m2
* GO-2026-4417 CVE-2026-24514 GHSA-2pf9-vr92-6h3v
* GO-2026-4418 CVE-2023-43631 GHSA-3mq9-xhgq-r7gj
* GO-2026-4419 CVE-2026-24513 GHSA-4g2f-xcph-2335
* GO-2026-4421 CVE-2026-24735 GHSA-5w5r-8xc6-2xhw
* GO-2026-4422 CVE-2023-43632 GHSA-6jp5-grgh-jw42
* GO-2026-4423 CVE-2026-1580 GHSA-9h3p-52vh-959w
* GO-2026-4425 CVE-2025-62878 GHSA-jr3w-9vfr-c746
* GO-2026-4426 CVE-2026-24512 GHSA-jx8c-56mg-h6vp
* GO-2026-4428 CVE-2023-43633 GHSA-4c4v-42hc-72p6
* GO-2026-4430 CVE-2023-43630 GHSA-phcg-h58r-gmcq
* GO-2026-4432 CVE-2023-43634 GHSA-wc42-fcjp-v8vq
* GO-2026-4433 CVE-2025-61732
* GO-2026-4440 CVE-2025-47911
* GO-2026-4441 CVE-2025-58190

* Update to version 0.0.20260204T190754 2026-02-04T19:07:54Z. Refs
jsc#PED-11136 Go CVE Numbering Authority IDs added or updated with aliases:

* GO-2026-4324 CVE-2026-23645 GHSA-pcjq-j3mq-jv5j
* GO-2026-4327 CVE-2026-23742 GHSA-cc8m-98fm-rc9g
* GO-2026-4329 CVE-2026-21696 GHSA-2497-gp99-2m74
* GO-2026-4330 CVE-2026-22822 GHSA-77v3-r3jw-j2v2
* GO-2026-4331 CVE-2025-69199 GHSA-8w7m-w749-rx98
* GO-2026-4333 CVE-2026-23829 GHSA-54wq-72mp-cq7c
* GO-2026-4334 CVE-2026-23517 GHSA-4r5r-ccr6-q6f6
* GO-2026-4335 CVE-2026-23518 GHSA-63m5-974w-448v
* GO-2026-4336 CVE-2026-22808 GHSA-gfpw-jgvr-cw4j
* GO-2026-4343 CVE-2026-23847 GHSA-w836-5gpm-7r93
* GO-2026-4344 CVE-2026-23849 GHSA-43mm-m3h2-3prc
* GO-2026-4345 CVE-2026-23845 GHSA-6jxm-fv7w-rw5j
* GO-2026-4346 CVE-2026-23851 GHSA-94c7-g2fj-7682
* GO-2026-4347 CVE-2026-23850 GHSA-cv54-7wv7-qxcw
* GO-2026-4348 CVE-2026-23991 GHSA-846p-jg2w-w324
* GO-2026-4349 CVE-2026-23992 GHSA-fphv-w9fq-2525
* GO-2026-4350 CVE-2026-23960 GHSA-cv78-6m8q-ph82
* GO-2026-4351 CVE-2026-23990 GHSA-4xh5-jcj2-ch8q
* GO-2026-4352 GHSA-r92c-9c7f-3pj8
* GO-2026-4353 CVE-2026-24058 GHSA-pchf-49fh-w34r
* GO-2026-4354 CVE-2026-23831 GHSA-273p-m2cw-6833
* GO-2026-4355 CVE-2026-24117 GHSA-4c4x-jm2x-pf9j
* GO-2026-4356 CVE-2026-24124 GHSA-j8hf-cp34-g4j7
* GO-2026-4362 CVE-2026-20800 GHSA-2vgv-hgv4-22mh
* GO-2026-4363 CVE-2026-20897 GHSA-393c-qgvj-3xph
* GO-2026-4364 CVE-2026-20912 GHSA-4xx9-vc8v-87hv
* GO-2026-4365 CVE-2026-0798 GHSA-8fwc-qjw5-rvgp
* GO-2026-4366 CVE-2026-20888 GHSA-9cgq-wp42-4rpq
* GO-2026-4367 CVE-2026-20736 GHSA-hgr3-x44x-33hx
* GO-2026-4368 CVE-2026-20883 GHSA-j8xr-c56q-m8jj
* GO-2026-4369 CVE-2026-20904 GHSA-qqgv-v353-cv8p
* GO-2026-4370 CVE-2026-20750 GHSA-rw22-5hhq-pfpf
* GO-2026-4377 CVE-2026-24686 GHSA-jqc5-w2xx-5vq4
* GO-2026-4378 CVE-2026-24470 GHSA-mxxc-p822-2hx9
* GO-2026-4379 CVE-2026-24738 GHSA-j49h-6577-5xwq
* GO-2026-4380 CVE-2026-24740 GHSA-m855-r557-5rc5
* GO-2026-4381 CVE-2026-22039 GHSA-8p9x-46gm-qfx2
* GO-2026-4382 CVE-2026-23881 GHSA-r2rj-wwm5-x6mq
* GO-2026-4384 CVE-2025-14525 GHSA-25mh-hp8x-cgrv
* GO-2026-4385 CVE-2026-24748 GHSA-w5wv-wvrp-v5m5
* GO-2026-4386 GHSA-f72r-2h5j-7639
* GO-2026-4387 GHSA-c4jr-5q7w-f6r9
* GO-2026-4388 CVE-2026-1237 GHSA-j477-6vpg-6c8x
* GO-2026-4390 CVE-2025-69820 GHSA-73jg-4qh6-3f4g
* GO-2026-4391 CVE-2026-24846 GHSA-923j-vrcg-hxwh
* GO-2026-4393 CVE-2025-67601 GHSA-mc24-7m59-4q5p

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-403=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* govulncheck-vulndb-0.0.20260205T172317-150000.1.146.1

## References:

* https://www.suse.com/security/cve/CVE-2023-43630.html
* https://www.suse.com/security/cve/CVE-2023-43631.html
* https://www.suse.com/security/cve/CVE-2023-43632.html
* https://www.suse.com/security/cve/CVE-2023-43633.html
* https://www.suse.com/security/cve/CVE-2023-43634.html
* https://www.suse.com/security/cve/CVE-2025-14525.html
* https://www.suse.com/security/cve/CVE-2025-22873.html
* https://www.suse.com/security/cve/CVE-2025-47911.html
* https://www.suse.com/security/cve/CVE-2025-58190.html
* https://www.suse.com/security/cve/CVE-2025-61732.html
* https://www.suse.com/security/cve/CVE-2025-62878.html
* https://www.suse.com/security/cve/CVE-2025-67601.html
* https://www.suse.com/security/cve/CVE-2025-68121.html
* https://www.suse.com/security/cve/CVE-2025-69199.html
* https://www.suse.com/security/cve/CVE-2025-69820.html
* https://www.suse.com/security/cve/CVE-2025-70849.html
* https://www.suse.com/security/cve/CVE-2026-0798.html
* https://www.suse.com/security/cve/CVE-2026-1237.html
* https://www.suse.com/security/cve/CVE-2026-1580.html
* https://www.suse.com/security/cve/CVE-2026-20736.html
* https://www.suse.com/security/cve/CVE-2026-20750.html
* https://www.suse.com/security/cve/CVE-2026-20800.html
* https://www.suse.com/security/cve/CVE-2026-20883.html
* https://www.suse.com/security/cve/CVE-2026-20888.html
* https://www.suse.com/security/cve/CVE-2026-20897.html
* https://www.suse.com/security/cve/CVE-2026-20904.html
* https://www.suse.com/security/cve/CVE-2026-20912.html
* https://www.suse.com/security/cve/CVE-2026-21696.html
* https://www.suse.com/security/cve/CVE-2026-22039.html
* https://www.suse.com/security/cve/CVE-2026-22808.html
* https://www.suse.com/security/cve/CVE-2026-22822.html
* https://www.suse.com/security/cve/CVE-2026-23517.html
* https://www.suse.com/security/cve/CVE-2026-23518.html
* https://www.suse.com/security/cve/CVE-2026-23645.html
* https://www.suse.com/security/cve/CVE-2026-23742.html
* https://www.suse.com/security/cve/CVE-2026-23829.html
* https://www.suse.com/security/cve/CVE-2026-23831.html
* https://www.suse.com/security/cve/CVE-2026-23845.html
* https://www.suse.com/security/cve/CVE-2026-23847.html
* https://www.suse.com/security/cve/CVE-2026-23849.html
* https://www.suse.com/security/cve/CVE-2026-23850.html
* https://www.suse.com/security/cve/CVE-2026-23851.html
* https://www.suse.com/security/cve/CVE-2026-23881.html
* https://www.suse.com/security/cve/CVE-2026-23953.html
* https://www.suse.com/security/cve/CVE-2026-23954.html
* https://www.suse.com/security/cve/CVE-2026-23960.html
* https://www.suse.com/security/cve/CVE-2026-23990.html
* https://www.suse.com/security/cve/CVE-2026-23991.html
* https://www.suse.com/security/cve/CVE-2026-23992.html
* https://www.suse.com/security/cve/CVE-2026-24058.html
* https://www.suse.com/security/cve/CVE-2026-24117.html
* https://www.suse.com/security/cve/CVE-2026-24124.html
* https://www.suse.com/security/cve/CVE-2026-24470.html
* https://www.suse.com/security/cve/CVE-2026-24512.html
* https://www.suse.com/security/cve/CVE-2026-24513.html
* https://www.suse.com/security/cve/CVE-2026-24514.html
* https://www.suse.com/security/cve/CVE-2026-24686.html
* https://www.suse.com/security/cve/CVE-2026-24735.html
* https://www.suse.com/security/cve/CVE-2026-24738.html
* https://www.suse.com/security/cve/CVE-2026-24740.html
* https://www.suse.com/security/cve/CVE-2026-24748.html
* https://www.suse.com/security/cve/CVE-2026-24843.html
* https://www.suse.com/security/cve/CVE-2026-24844.html
* https://www.suse.com/security/cve/CVE-2026-24846.html
* https://www.suse.com/security/cve/CVE-2026-25059.html
* https://www.suse.com/security/cve/CVE-2026-25060.html
* https://www.suse.com/security/cve/CVE-2026-25121.html
* https://www.suse.com/security/cve/CVE-2026-25122.html
* https://www.suse.com/security/cve/CVE-2026-25143.html
* https://www.suse.com/security/cve/CVE-2026-25145.html
* https://www.suse.com/security/cve/CVE-2026-25160.html
* https://www.suse.com/security/cve/CVE-2026-25161.html
* https://www.suse.com/security/cve/CVE-2026-25499.html
* https://www.suse.com/security/cve/CVE-2026-25538.html
* https://www.suse.com/security/cve/CVE-2026-25578.html
* https://www.suse.com/security/cve/CVE-2026-25579.html
* https://jira.suse.com/browse/PED-11136



openSUSE-SU-2026:0042-1: important: Security update for chromium


openSUSE Security Update: Security update for chromium
_______________________________

Announcement ID: openSUSE-SU-2026:0042-1
Rating: important
References: #1257650
Cross-References: CVE-2026-1861 CVE-2026-1862
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for chromium fixes the following issues:

- Chromium 144.0.7559.132 (boo#1257650)
* CVE-2026-1861: Heap buffer overflow in libvpx in Google Chrome prior
to 144.0.7559.132 allowed a remote attacker to potentially exploit
heap corruption via a crafted HTML page.
* CVE-2026-1862: Type Confusion in V8 in Google Chrome prior to
144.0.7559.132 allowed a remote attacker to potentially exploit heap
corruption via a crafted HTML page.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2026-42=1

Package List:

- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le x86_64):

chromedriver-144.0.7559.132-bp156.2.224.1
chromium-144.0.7559.132-bp156.2.224.1

References:

https://www.suse.com/security/cve/CVE-2026-1861.html
https://www.suse.com/security/cve/CVE-2026-1862.html
https://bugzilla.suse.com/1257650



openSUSE-SU-2026:0041-1: important: Security update for chromium


openSUSE Security Update: Security update for chromium
_______________________________

Announcement ID: openSUSE-SU-2026:0041-1
Rating: important
References: #1257650
Cross-References: CVE-2026-1861 CVE-2026-1862
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for chromium fixes the following issues:

- Chromium 144.0.7559.132 (boo#1257650)
* CVE-2026-1861: Heap buffer overflow in libvpx in Google Chrome prior
to 144.0.7559.132 allowed a remote attacker to potentially exploit
heap corruption via a crafted HTML page.
* CVE-2026-1862: Type Confusion in V8 in Google Chrome prior to
144.0.7559.132 allowed a remote attacker to potentially exploit heap
corruption via a crafted HTML page.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP7:

zypper in -t patch openSUSE-2026-41=1

Package List:

- openSUSE Backports SLE-15-SP7 (aarch64 ppc64le x86_64):

chromedriver-144.0.7559.132-bp157.2.109.1
chromium-144.0.7559.132-bp157.2.109.1

References:

https://www.suse.com/security/cve/CVE-2026-1861.html
https://www.suse.com/security/cve/CVE-2026-1862.html
https://bugzilla.suse.com/1257650