SUSE-SU-2026:1135-1: important: Security update for govulncheck-vulndb
openSUSE-SU-2026:0109-1: moderate: Security update for obs-service-recompress, obs-service-tar_scm
openSUSE-SU-2026:0108-1: moderate: Security update for obs-service-set_version
openSUSE-SU-2026:0107-1: moderate: Security update for libjxl
openSUSE-SU-2026:0106-1: moderate: Security update for libjxl
openSUSE-SU-2026:10443-1: moderate: libsuricata8_0_4-8.0.4-1.1 on GA media
openSUSE-SU-2026:10446-1: moderate: ImageMagick-7.1.2.18-1.1 on GA media
openSUSE-SU-2026:10440-1: moderate: jupyter-nbclassic-1.3.3-1.1 on GA media
openSUSE-SU-2026:10445-1: moderate: traefik2-2.11.42-1.1 on GA media
openSUSE-SU-2026:10442-1: moderate: dovecot24-2.4.3-1.1 on GA media
openSUSE-SU-2026:10444-1: moderate: traefik-3.6.12-1.1 on GA media
openSUSE-SU-2026:10441-1: moderate: strongswan-6.0.5-1.1 on GA media
openSUSE-SU-2026:10439-1: moderate: plexus-utils-4.0.2-2.1 on GA media
openSUSE-SU-2026:10438-1: moderate: openbao-2.5.2-1.1 on GA media
openSUSE-SU-2026:0110-1: important: Security update for perl-Crypt-URandom
SUSE-SU-2026:1135-1: important: Security update for govulncheck-vulndb
# Security update for govulncheck-vulndb
Announcement ID: SUSE-SU-2026:1135-1
Release Date: 2026-03-27T17:33:53Z
Rating: important
References:
* jsc#PED-11136
Cross-References:
* CVE-2019-8400
* CVE-2026-21386
* CVE-2026-22545
* CVE-2026-24458
* CVE-2026-24516
* CVE-2026-2455
* CVE-2026-2456
* CVE-2026-2457
* CVE-2026-2458
* CVE-2026-2461
* CVE-2026-2463
* CVE-2026-24692
* CVE-2026-2476
* CVE-2026-2578
* CVE-2026-25780
* CVE-2026-25783
* CVE-2026-26246
* CVE-2026-26304
* CVE-2026-27889
* CVE-2026-29785
* CVE-2026-29794
* CVE-2026-30836
* CVE-2026-30886
* CVE-2026-30924
* CVE-2026-32254
* CVE-2026-32284
* CVE-2026-32285
* CVE-2026-32286
* CVE-2026-32287
* CVE-2026-32301
* CVE-2026-32305
* CVE-2026-32595
* CVE-2026-32606
* CVE-2026-32691
* CVE-2026-32692
* CVE-2026-32693
* CVE-2026-32694
* CVE-2026-32704
* CVE-2026-32720
* CVE-2026-32737
* CVE-2026-32747
* CVE-2026-32749
* CVE-2026-32750
* CVE-2026-32751
* CVE-2026-32758
* CVE-2026-32759
* CVE-2026-32760
* CVE-2026-32767
* CVE-2026-32768
* CVE-2026-32769
* CVE-2026-32771
* CVE-2026-32805
* CVE-2026-32811
* CVE-2026-32815
* CVE-2026-32828
* CVE-2026-32879
* CVE-2026-32937
* CVE-2026-32938
* CVE-2026-32940
* CVE-2026-32941
* CVE-2026-32953
* CVE-2026-33022
* CVE-2026-33062
* CVE-2026-33063
* CVE-2026-33064
* CVE-2026-33065
* CVE-2026-33066
* CVE-2026-33067
* CVE-2026-33081
* CVE-2026-33132
* CVE-2026-33191
* CVE-2026-33192
* CVE-2026-33194
* CVE-2026-33203
* CVE-2026-33211
* CVE-2026-33215
* CVE-2026-33216
* CVE-2026-33217
* CVE-2026-33218
* CVE-2026-33219
* CVE-2026-33221
* CVE-2026-33222
* CVE-2026-33223
* CVE-2026-33246
* CVE-2026-33247
* CVE-2026-33248
* CVE-2026-33249
* CVE-2026-33252
* CVE-2026-33281
* CVE-2026-33282
* CVE-2026-33283
* CVE-2026-33312
* CVE-2026-33313
* CVE-2026-33315
* CVE-2026-33316
* CVE-2026-33320
* CVE-2026-33322
* CVE-2026-33344
* CVE-2026-33353
* CVE-2026-33419
* CVE-2026-33473
* CVE-2026-33474
* CVE-2026-33476
* CVE-2026-33481
* CVE-2026-33494
* CVE-2026-33495
* CVE-2026-33496
* CVE-2026-33503
* CVE-2026-33504
* CVE-2026-33505
* CVE-2026-33525
* CVE-2026-33528
* CVE-2026-33529
* CVE-2026-33619
* CVE-2026-33620
* CVE-2026-33621
* CVE-2026-33622
* CVE-2026-33623
* CVE-2026-33638
* CVE-2026-33668
* CVE-2026-33669
* CVE-2026-33670
* CVE-2026-33675
* CVE-2026-33676
* CVE-2026-33677
* CVE-2026-33678
* CVE-2026-33679
* CVE-2026-33680
* CVE-2026-33700
* CVE-2026-33726
* CVE-2026-33729
* CVE-2026-33757
* CVE-2026-33758
* CVE-2026-33809
* CVE-2026-3864
* CVE-2026-4265
* CVE-2026-4342
* CVE-2026-4404
CVSS scores:
* CVE-2019-8400 ( NVD ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-21386 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-22545 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2026-22545 ( NVD ): 3.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
* CVE-2026-24458 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-24516 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-2455 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-2456 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-2456 ( NVD ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-2457 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-2458 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-2461 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-2463 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-24692 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-2476 ( NVD ): 7.6 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N
* CVE-2026-2476 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-2578 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-25780 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25783 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-26246 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-26304 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-27889 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-27889 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-27889 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-29785 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-29785 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-29785 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-29794 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-30836 ( SUSE ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
* CVE-2026-30836 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
* CVE-2026-30886 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-30924 ( NVD ): 9.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32254 ( NVD ): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-32285 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-32285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-32286 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-32286 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-32301 ( NVD ): 9.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
* CVE-2026-32305 ( NVD ): 7.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32305 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-32595 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32595 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-32606 ( NVD ): 7.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-32691 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-32692 ( NVD ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2026-32692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-32693 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-32694 ( NVD ): 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-32704 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-32720 ( NVD ): 7.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32737 ( NVD ): 7.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32737 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-32747 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
* CVE-2026-32747 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-32749 ( NVD ): 7.6 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:N
* CVE-2026-32749 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-32750 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
* CVE-2026-32751 ( NVD ): 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32751 ( NVD ): 9.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-32758 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-32759 ( NVD ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32759 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-32760 ( NVD ): 10.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32760 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-32767 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-32768 ( NVD ): 7.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32769 ( NVD ): 7.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32771 ( NVD ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32805 ( NVD ): 8.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32805 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-32811 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2026-32815 ( NVD ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32815 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-32828 ( NVD ): 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32879 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-32937 ( NVD ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32937 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-32938 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:H
* CVE-2026-32938 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-32940 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2026-32940 ( NVD ): 9.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
* CVE-2026-32941 ( NVD ): 5.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32941 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-32953 ( NVD ): 4.7
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33022 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33022 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33062 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33062 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33063 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33063 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33064 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33064 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33065 ( NVD ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33065 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-33066 ( NVD ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33066 ( NVD ): 9.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-33067 ( NVD ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33067 ( NVD ): 9.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
* CVE-2026-33081 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2026-33081 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-33132 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-33191 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33191 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
* CVE-2026-33192 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33192 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-33194 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
* CVE-2026-33203 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33211 ( NVD ): 9.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
* CVE-2026-33211 ( NVD ): 9.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
* CVE-2026-33215 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L
* CVE-2026-33215 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-33216 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
* CVE-2026-33216 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-33216 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
* CVE-2026-33217 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
* CVE-2026-33217 ( NVD ): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
* CVE-2026-33217 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-33218 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33218 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33219 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33219 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33221 ( NVD ): 2.1
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33222 ( SUSE ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-33222 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-33223 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
* CVE-2026-33223 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
* CVE-2026-33223 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-33246 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
* CVE-2026-33246 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
* CVE-2026-33246 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-33247 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33247 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33247 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-33248 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-33248 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-33249 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-33249 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-33252 ( NVD ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
* CVE-2026-33281 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33281 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33282 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33283 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33283 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33312 ( NVD ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33312 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2026-33313 ( NVD ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33313 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-33315 ( NVD ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33315 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-33316 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33320 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33322 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33322 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33322 ( NVD ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33344 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33353 ( NVD ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33353 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-33419 ( NVD ): 9.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33473 ( NVD ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
* CVE-2026-33474 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33476 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-33481 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-33481 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33481 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-33494 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
* CVE-2026-33495 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-33496 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33503 ( NVD ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33504 ( NVD ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33505 ( NVD ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33525 ( NVD ): 0.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33528 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33529 ( NVD ): 3.3 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-33619 ( NVD ): 4.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N
* CVE-2026-33620 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-33621 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2026-33622 ( NVD ): 6.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33623 ( NVD ): 6.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
* CVE-2026-33638 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-33668 ( NVD ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33668 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33669 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33670 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33675 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L
* CVE-2026-33675 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-33676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-33677 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-33678 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33679 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L
* CVE-2026-33680 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-33700 ( NVD ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33726 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
* CVE-2026-33729 ( NVD ): 5.8
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33757 ( NVD ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L
* CVE-2026-33758 ( NVD ): 9.4
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33809 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-3864 ( SUSE ): 7.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-3864 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-3864 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-4265 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2026-4342 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-4404 ( SUSE ): 9.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-4404 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-4404 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Affected Products:
* openSUSE Leap 15.6
An update that solves 138 vulnerabilities and contains one feature can now be
installed.
## Description:
This update for govulncheck-vulndb fixes the following issues:
Update to version 0.0.20260326T203309 2026-03-26T20:33:09Z (jsc#PED-11136):
Go CVE Numbering Authority IDs added or updated with aliases: * GO-2026-4513
CVE-2026-32284 * GO-2026-4514 CVE-2026-32285 * GO-2026-4518 CVE-2026-32286 *
GO-2026-4526 CVE-2026-32287 * GO-2026-4700 CVE-2026-32704 GHSA-4j3x-hhg2-fm2x *
GO-2026-4701 CVE-2026-32720 GHSA-7x23-j8gv-v54x * GO-2026-4702 CVE-2026-32301
GHSA-j77h-rr39-c552 * GO-2026-4703 GHSA-q926-c743-49qj * GO-2026-4704
CVE-2026-32606 GHSA-wj2j-qwcf-cfcc * GO-2026-4705 CVE-2026-32747
GHSA-h5vh-m7fg-w5h6 * GO-2026-4706 CVE-2026-32751 GHSA-qr46-rcv3-4hq3 *
GO-2026-4707 CVE-2026-32749 GHSA-qvvf-q994-x79v * GO-2026-4708 CVE-2026-32750
GHSA-rjhh-m223-9qqv * GO-2026-4709 CVE-2026-32815 GHSA-xp2m-98x8-rpj6 *
GO-2026-4710 CVE-2026-32760 GHSA-5gg9-5g7w-hm73 * GO-2026-4711 CVE-2026-32758
GHSA-9f3r-2vgw-m8xp * GO-2026-4712 CVE-2026-32771 GHSA-f7cq-gvh6-qr25 *
GO-2026-4713 CVE-2026-32759 GHSA-ffx7-75gc-jg7c * GO-2026-4714 CVE-2026-32737
GHSA-fgm3-q9r5-43v9 * GO-2026-4715 CVE-2026-32769 GHSA-hxm7-9q36-c77f *
GO-2026-4716 CVE-2026-32767 GHSA-j7wh-x834-p3r7 * GO-2026-4717 CVE-2026-32828
GHSA-j94x-8wcp-x7hm * GO-2026-4718 CVE-2026-32768 GHSA-mw24-f3xh-j3qv *
GO-2026-4719 CVE-2026-32805 GHSA-p799-g7vv-f279 * GO-2026-4721 CVE-2026-32940
GHSA-4mx9-3c2h-hwhg * GO-2026-4722 CVE-2026-32938 GHSA-fq2j-j8hc-8vw8 *
GO-2026-4723 CVE-2026-32941 GHSA-97vp-pwqj-46qc * GO-2026-4724 CVE-2026-32254
GHSA-phqm-jgc3-qf8g * GO-2026-4725 CVE-2026-25783 GHSA-2v3w-6g35-5f9v *
GO-2026-4726 CVE-2026-2456 GHSA-34g8-9fpp-46ch * GO-2026-4727 CVE-2026-26246
GHSA-44mv-jq72-gj49 * GO-2026-4728 CVE-2026-32953 GHSA-4w7r-3222-8h6v *
GO-2026-4729 CVE-2026-2458 GHSA-679f-wmrg-qf57 * GO-2026-4730 CVE-2026-33022
GHSA-cv4x-93xx-wgfj * GO-2026-4731 CVE-2026-24458 GHSA-m5rv-56xx-hfc6 *
GO-2026-4732 CVE-2026-2457 GHSA-ph22-fw5m-w2q9 * GO-2026-4733 CVE-2026-25780
GHSA-xv2p-wchj-qjhp * GO-2026-4734 CVE-2026-2578 GHSA-3rhr-jr63-hwq5 *
GO-2026-4735 CVE-2026-2463 GHSA-fx49-m253-27jj * GO-2026-4737
GHSA-594f-3595-c47v * GO-2026-4740 GHSA-h9q6-hc68-35rp * GO-2026-4742
CVE-2026-32811 GHSA-r8x2-fhmf-6mxp * GO-2026-4743 CVE-2026-33066
GHSA-4663-4mpg-879v * GO-2026-4744 CVE-2026-21386 GHSA-5mr9-crcg-8wh2 *
GO-2026-4745 CVE-2026-24692 GHSA-cwfj-642j-gfh4 * GO-2026-4746 CVE-2026-2455
GHSA-gqv7-j2j8-qmwq * GO-2026-4747 CVE-2026-33067 GHSA-mvpm-v6q4-m2pf *
GO-2026-4748 CVE-2026-33081 GHSA-qwxp-6qf9-wr4m * GO-2026-4749 CVE-2026-4265
GHSA-xpvf-6qcc-9jqc * GO-2026-4750 CVE-2026-32937 GHSA-6g43-577r-wf4x *
GO-2026-4751 CVE-2026-33132 GHSA-g2pf-ww5m-2r9m * GO-2026-4752 CVE-2026-33203
GHSA-3g9h-9hp4-654v * GO-2026-4754 CVE-2026-33063 GHSA-4jrw-92fg-4jwx *
GO-2026-4755 CVE-2026-33192 GHSA-5rvc-5cwx-g5x8 * GO-2026-4756 CVE-2026-33062
GHSA-7c47-xr7q-p6hg * GO-2026-4757 CVE-2026-33064 GHSA-7g27-v5wj-jr75 *
GO-2026-4758 CVE-2026-33065 GHSA-958m-gxmc-mccm * GO-2026-4759 CVE-2026-33221
GHSA-g9f6-9775-hffm * GO-2026-4761 CVE-2026-33211 GHSA-j5q5-j9gm-2w5c *
GO-2026-4763 CVE-2026-33191 GHSA-p9hg-pq3q-v9gv * GO-2026-4765 GHSA-
vccx-p757-pv6h * GO-2026-4766 CVE-2026-33194 GHSA-vm69-h85x-8p85 * GO-2026-4768
CVE-2026-33320 GHSA-4fcp-jxh7-23x8 * GO-2026-4769 CVE-2026-32691 GHSA-
gfgr-6hrj-85ww * GO-2026-4770 GHSA-q382-vc8q-7jhj * GO-2026-4773 CVE-2026-33252
GHSA-89xv-2j6f-qhc8 * GO-2026-4774 CVE-2026-30924 GHSA-h8vw-ph9r-xpch *
GO-2026-4775 CVE-2026-30836 GHSA-q4r8-xm5f-56gw * GO-2026-4776 CVE-2026-33283
GHSA-3366-gw57-fcm5 * GO-2026-4777 CVE-2026-32693 GHSA-439w-v2p7-pggc *
GO-2026-4778 CVE-2026-32694 GHSA-5cj2-rqqf-hx9p * GO-2026-4779 CVE-2026-33322
GHSA-5cx5-wh4m-82fh * GO-2026-4780 CVE-2026-33282 GHSA-826q-wrq4-p23x *
GO-2026-4781 CVE-2026-32692 GHSA-89x7-5m5m-mcmm * GO-2026-4782 CVE-2026-2461
GHSA-hf8w-x9h5-5gf9 * GO-2026-4783 CVE-2026-33281 GHSA-q669-4gmv-g8mf *
GO-2026-4784 CVE-2026-2476 GHSA-4ppj-6chv-5pgc * GO-2026-4785 CVE-2026-33344
GHSA-ph8x-4jfv-v9v8 * GO-2026-4786 CVE-2026-22545 GHSA-rv67-7w2g-7976 *
GO-2026-4788 CVE-2026-33353 GHSA-xgxp-f695-6vrp * GO-2026-4791 CVE-2026-29794
GHSA-m547-hp4w-j6jx * GO-2026-4792 CVE-2026-32595 GHSA-g3hg-j4jv-cwfr *
GO-2026-4793 CVE-2026-32305 GHSA-wvvq-wgcr-9q48 * GO-2026-4794 CVE-2026-33315
GHSA-47cr-f226-r4pq * GO-2026-4795 CVE-2026-33312 GHSA-564f-wx8x-878h *
GO-2026-4796 CVE-2026-4342 GHSA-f53h-mxv9-cp98 * GO-2026-4797 CVE-2026-33313
GHSA-mr3j-p26x-72x4 * GO-2026-4798 CVE-2026-33316 GHSA-vq4q-79hh-q767 *
GO-2026-4799 CVE-2026-33496 GHSA-4mq7-pvjg-xp2r * GO-2026-4800 CVE-2026-33505
GHSA-c38g-mx2c-9wf2 * GO-2026-4801 CVE-2026-33503 GHSA-hgx2-28f8-6g2r *
GO-2026-4802 CVE-2026-33476 GHSA-hhgj-gg9h-rjp7 * GO-2026-4803 CVE-2026-33419
GHSA-jv87-32hw-hh99 * GO-2026-4804 CVE-2026-33494 GHSA-p224-6x5r-fjpm *
GO-2026-4805 CVE-2026-33473 GHSA-p747-qc5p-773r * GO-2026-4807 CVE-2026-33504
GHSA-r9w3-57w2-gch2 * GO-2026-4809 CVE-2026-33481 GHSA-rjcw-vg7j-m9rc *
GO-2026-4810 CVE-2026-33495 GHSA-vhr5-ggp3-qq85 * GO-2026-4811 CVE-2026-33474
GHSA-wc83-79hj-hpmq * GO-2026-4812 CVE-2026-26304 GHSA-4pmx-622h-x359 *
GO-2026-4813 CVE-2026-32879 GHSA-5353-f8fq-65vc * GO-2026-4814 CVE-2026-30886
GHSA-f35r-v9x5-r8mc * GO-2026-4815 CVE-2026-33809 * GO-2026-4816 CVE-2026-3864
GHSA-2mjq-54qg-7w6j * GO-2026-4817 CVE-2026-33528 GHSA-4753-cmc8-8j9v *
GO-2026-4818 CVE-2026-33525 GHSA-gmfg-3v4q-9qr4 * GO-2026-4820
GHSA-7789-65hx-f26w * GO-2026-4821 CVE-2026-33621 GHSA-j65m-hv65-r264 *
GO-2026-4822 CVE-2026-33620 GHSA-mrqc-3276-74f8 * GO-2026-4823 CVE-2026-33623
GHSA-p8mm-644p-phmh * GO-2026-4824 CVE-2026-33622 GHSA-w5pc-m664-r62v *
GO-2026-4825 CVE-2026-33619 GHSA-xqq2-4j46-vwp7 * GO-2026-4826 CVE-2026-33249
GHSA-8m2x-3m6q-6w8j * GO-2026-4827 CVE-2026-33247 GHSA-x6g4-f6q3-fqvv *
GO-2026-4828 CVE-2026-33248 GHSA-3f24-pcvm-5jqc * GO-2026-4829 CVE-2026-29785
GHSA-52jh-2xxh-pwh6 * GO-2026-4830 CVE-2026-33246 GHSA-55h8-8g96-x4hj *
GO-2026-4831 CVE-2026-33219 GHSA-8r68-gvr4-jh7j * GO-2026-4832 CVE-2026-33222
GHSA-9983-vrx2-fg9c * GO-2026-4833 CVE-2026-33215 GHSA-fcjp-h8cc-6879 *
GO-2026-4834 CVE-2026-33217 GHSA-jxxm-27vp-c3m5 * GO-2026-4835 CVE-2026-33223
GHSA-pwx7-fx9r-hr4h * GO-2026-4836 CVE-2026-33216 GHSA-v722-jcv5-w7mc *
GO-2026-4837 CVE-2026-33218 GHSA-vprv-35vv-q339 * GO-2026-4838 CVE-2026-33638
GHSA-m983-7426-5hrj * GO-2026-4841 CVE-2026-27889 GHSA-pq2q-rcw4-3hr6 *
GO-2026-4842 CVE-2026-33669 GHSA-34xj-66v3-6j83 * GO-2026-4843 CVE-2026-33670
GHSA-xmw9-6r43-x9ww * GO-2026-4844 CVE-2026-33529 GHSA-7pq3-326h-f8q9 *
GO-2026-4845 CVE-2026-4404 GHSA-hj7x-hmf2-hc2p * GO-2026-4846 CVE-2026-33677
GHSA-7c2g-p23p-4jg3 * GO-2026-4847 CVE-2026-33676 GHSA-8cmm-j6c4-rr8v *
GO-2026-4848 CVE-2026-33680 GHSA-8hp8-9fhr-pfm9 * GO-2026-4849 CVE-2026-33668
GHSA-94xm-jj8x-3cr4 * GO-2026-4850 CVE-2026-33700 GHSA-f95f-77jx-fcjc *
GO-2026-4851 CVE-2026-33675 GHSA-g66v-54v9-52pr * GO-2026-4852 CVE-2026-33679
GHSA-g9xj-752q-xh63 * GO-2026-4853 CVE-2026-33678 GHSA-jfmm-mjcp-8wq2 *
GO-2026-4854 CVE-2026-24516 GHSA-fh3m-562m-w4f6 * GO-2026-4855
GHSA-2pv8-4c52-mf8j * GO-2026-4856 CVE-2026-33726 GHSA-hxv8-4j4r-cqgv *
GO-2026-4857 CVE-2026-33729 GHSA-h6c8-cww8-35hf * GO-2026-4860 CVE-2026-33757
GHSA-7q7g-x6vg-xpc3 * GO-2026-4861 CVE-2019-8400 GHSA-7v6r-w4r6-mhch *
GO-2026-4862 CVE-2026-33758 GHSA-cpj3-3r2f-xj59
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1135=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* govulncheck-vulndb-0.0.20260326T203309-150000.1.155.2
## References:
* https://www.suse.com/security/cve/CVE-2019-8400.html
* https://www.suse.com/security/cve/CVE-2026-21386.html
* https://www.suse.com/security/cve/CVE-2026-22545.html
* https://www.suse.com/security/cve/CVE-2026-24458.html
* https://www.suse.com/security/cve/CVE-2026-24516.html
* https://www.suse.com/security/cve/CVE-2026-2455.html
* https://www.suse.com/security/cve/CVE-2026-2456.html
* https://www.suse.com/security/cve/CVE-2026-2457.html
* https://www.suse.com/security/cve/CVE-2026-2458.html
* https://www.suse.com/security/cve/CVE-2026-2461.html
* https://www.suse.com/security/cve/CVE-2026-2463.html
* https://www.suse.com/security/cve/CVE-2026-24692.html
* https://www.suse.com/security/cve/CVE-2026-2476.html
* https://www.suse.com/security/cve/CVE-2026-2578.html
* https://www.suse.com/security/cve/CVE-2026-25780.html
* https://www.suse.com/security/cve/CVE-2026-25783.html
* https://www.suse.com/security/cve/CVE-2026-26246.html
* https://www.suse.com/security/cve/CVE-2026-26304.html
* https://www.suse.com/security/cve/CVE-2026-27889.html
* https://www.suse.com/security/cve/CVE-2026-29785.html
* https://www.suse.com/security/cve/CVE-2026-29794.html
* https://www.suse.com/security/cve/CVE-2026-30836.html
* https://www.suse.com/security/cve/CVE-2026-30886.html
* https://www.suse.com/security/cve/CVE-2026-30924.html
* https://www.suse.com/security/cve/CVE-2026-32254.html
* https://www.suse.com/security/cve/CVE-2026-32284.html
* https://www.suse.com/security/cve/CVE-2026-32285.html
* https://www.suse.com/security/cve/CVE-2026-32286.html
* https://www.suse.com/security/cve/CVE-2026-32287.html
* https://www.suse.com/security/cve/CVE-2026-32301.html
* https://www.suse.com/security/cve/CVE-2026-32305.html
* https://www.suse.com/security/cve/CVE-2026-32595.html
* https://www.suse.com/security/cve/CVE-2026-32606.html
* https://www.suse.com/security/cve/CVE-2026-32691.html
* https://www.suse.com/security/cve/CVE-2026-32692.html
* https://www.suse.com/security/cve/CVE-2026-32693.html
* https://www.suse.com/security/cve/CVE-2026-32694.html
* https://www.suse.com/security/cve/CVE-2026-32704.html
* https://www.suse.com/security/cve/CVE-2026-32720.html
* https://www.suse.com/security/cve/CVE-2026-32737.html
* https://www.suse.com/security/cve/CVE-2026-32747.html
* https://www.suse.com/security/cve/CVE-2026-32749.html
* https://www.suse.com/security/cve/CVE-2026-32750.html
* https://www.suse.com/security/cve/CVE-2026-32751.html
* https://www.suse.com/security/cve/CVE-2026-32758.html
* https://www.suse.com/security/cve/CVE-2026-32759.html
* https://www.suse.com/security/cve/CVE-2026-32760.html
* https://www.suse.com/security/cve/CVE-2026-32767.html
* https://www.suse.com/security/cve/CVE-2026-32768.html
* https://www.suse.com/security/cve/CVE-2026-32769.html
* https://www.suse.com/security/cve/CVE-2026-32771.html
* https://www.suse.com/security/cve/CVE-2026-32805.html
* https://www.suse.com/security/cve/CVE-2026-32811.html
* https://www.suse.com/security/cve/CVE-2026-32815.html
* https://www.suse.com/security/cve/CVE-2026-32828.html
* https://www.suse.com/security/cve/CVE-2026-32879.html
* https://www.suse.com/security/cve/CVE-2026-32937.html
* https://www.suse.com/security/cve/CVE-2026-32938.html
* https://www.suse.com/security/cve/CVE-2026-32940.html
* https://www.suse.com/security/cve/CVE-2026-32941.html
* https://www.suse.com/security/cve/CVE-2026-32953.html
* https://www.suse.com/security/cve/CVE-2026-33022.html
* https://www.suse.com/security/cve/CVE-2026-33062.html
* https://www.suse.com/security/cve/CVE-2026-33063.html
* https://www.suse.com/security/cve/CVE-2026-33064.html
* https://www.suse.com/security/cve/CVE-2026-33065.html
* https://www.suse.com/security/cve/CVE-2026-33066.html
* https://www.suse.com/security/cve/CVE-2026-33067.html
* https://www.suse.com/security/cve/CVE-2026-33081.html
* https://www.suse.com/security/cve/CVE-2026-33132.html
* https://www.suse.com/security/cve/CVE-2026-33191.html
* https://www.suse.com/security/cve/CVE-2026-33192.html
* https://www.suse.com/security/cve/CVE-2026-33194.html
* https://www.suse.com/security/cve/CVE-2026-33203.html
* https://www.suse.com/security/cve/CVE-2026-33211.html
* https://www.suse.com/security/cve/CVE-2026-33215.html
* https://www.suse.com/security/cve/CVE-2026-33216.html
* https://www.suse.com/security/cve/CVE-2026-33217.html
* https://www.suse.com/security/cve/CVE-2026-33218.html
* https://www.suse.com/security/cve/CVE-2026-33219.html
* https://www.suse.com/security/cve/CVE-2026-33221.html
* https://www.suse.com/security/cve/CVE-2026-33222.html
* https://www.suse.com/security/cve/CVE-2026-33223.html
* https://www.suse.com/security/cve/CVE-2026-33246.html
* https://www.suse.com/security/cve/CVE-2026-33247.html
* https://www.suse.com/security/cve/CVE-2026-33248.html
* https://www.suse.com/security/cve/CVE-2026-33249.html
* https://www.suse.com/security/cve/CVE-2026-33252.html
* https://www.suse.com/security/cve/CVE-2026-33281.html
* https://www.suse.com/security/cve/CVE-2026-33282.html
* https://www.suse.com/security/cve/CVE-2026-33283.html
* https://www.suse.com/security/cve/CVE-2026-33312.html
* https://www.suse.com/security/cve/CVE-2026-33313.html
* https://www.suse.com/security/cve/CVE-2026-33315.html
* https://www.suse.com/security/cve/CVE-2026-33316.html
* https://www.suse.com/security/cve/CVE-2026-33320.html
* https://www.suse.com/security/cve/CVE-2026-33322.html
* https://www.suse.com/security/cve/CVE-2026-33344.html
* https://www.suse.com/security/cve/CVE-2026-33353.html
* https://www.suse.com/security/cve/CVE-2026-33419.html
* https://www.suse.com/security/cve/CVE-2026-33473.html
* https://www.suse.com/security/cve/CVE-2026-33474.html
* https://www.suse.com/security/cve/CVE-2026-33476.html
* https://www.suse.com/security/cve/CVE-2026-33481.html
* https://www.suse.com/security/cve/CVE-2026-33494.html
* https://www.suse.com/security/cve/CVE-2026-33495.html
* https://www.suse.com/security/cve/CVE-2026-33496.html
* https://www.suse.com/security/cve/CVE-2026-33503.html
* https://www.suse.com/security/cve/CVE-2026-33504.html
* https://www.suse.com/security/cve/CVE-2026-33505.html
* https://www.suse.com/security/cve/CVE-2026-33525.html
* https://www.suse.com/security/cve/CVE-2026-33528.html
* https://www.suse.com/security/cve/CVE-2026-33529.html
* https://www.suse.com/security/cve/CVE-2026-33619.html
* https://www.suse.com/security/cve/CVE-2026-33620.html
* https://www.suse.com/security/cve/CVE-2026-33621.html
* https://www.suse.com/security/cve/CVE-2026-33622.html
* https://www.suse.com/security/cve/CVE-2026-33623.html
* https://www.suse.com/security/cve/CVE-2026-33638.html
* https://www.suse.com/security/cve/CVE-2026-33668.html
* https://www.suse.com/security/cve/CVE-2026-33669.html
* https://www.suse.com/security/cve/CVE-2026-33670.html
* https://www.suse.com/security/cve/CVE-2026-33675.html
* https://www.suse.com/security/cve/CVE-2026-33676.html
* https://www.suse.com/security/cve/CVE-2026-33677.html
* https://www.suse.com/security/cve/CVE-2026-33678.html
* https://www.suse.com/security/cve/CVE-2026-33679.html
* https://www.suse.com/security/cve/CVE-2026-33680.html
* https://www.suse.com/security/cve/CVE-2026-33700.html
* https://www.suse.com/security/cve/CVE-2026-33726.html
* https://www.suse.com/security/cve/CVE-2026-33729.html
* https://www.suse.com/security/cve/CVE-2026-33757.html
* https://www.suse.com/security/cve/CVE-2026-33758.html
* https://www.suse.com/security/cve/CVE-2026-33809.html
* https://www.suse.com/security/cve/CVE-2026-3864.html
* https://www.suse.com/security/cve/CVE-2026-4265.html
* https://www.suse.com/security/cve/CVE-2026-4342.html
* https://www.suse.com/security/cve/CVE-2026-4404.html
* https://jira.suse.com/browse/PED-11136
openSUSE-SU-2026:0109-1: moderate: Security update for obs-service-recompress, obs-service-tar_scm
openSUSE Security Update: Security update for obs-service-recompress, obs-service-tar_scm
_______________________________
Announcement ID: openSUSE-SU-2026:0109-1
Rating: moderate
References: #1076410 #1082696 #1105361 #1107507 #1107944
#1127353 #1127907 #1138377 #1168573 #1212476
#1216361 #927120 #967265
Cross-References: CVE-2018-12473 CVE-2018-12474 CVE-2018-12476
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that solves three vulnerabilities and has 10
fixes is now available.
Description:
This update for obs-service-recompress, obs-service-tar_scm fixes the
following issues:
Changes in obs-service-tar_scm:
- Update to version 0.11.0:
* Replace deprecated ConfigParser.readfp() with read_file()
* Remove six from all metadata as well.
* Convert all six.assertRaisesRegex to the standard library self. form.
* Remove encoding of the first parameter of subprocess.Popen
- Update to version 0.10.53:
* Add new --extract-rename option
* debian: recommend on brz instead of depending on bzr
- Update to version 0.10.52:
* [archive] fix include/exclude glob to regex conversion
- Update to version 0.10.51:
* [core] new options `--include-re/--exclude-re`
* [tests] disable test_tar_exclude_re and fix warnings
* [core] revert removal of fnmatch
- Update to version 0.10.50:
* remove check if obsinfo is None from tar service
- Update to version 0.10.49:
* add test case to exclude with regex
* disable partial clone if started by osc
* refactor TarSCM.archive to unify exclude mechanism
* fix testsuite
* Sync spec file with the one in package
* improve doc in *.service
* change python version for github workflow
* fix KankuFile
* disabling test cases for bzr and hg
* fix excludes for obscpio
* Add test for the new changes entry format
* Include real name in generated changelog entries
* unset git global configs
* fix syntax of spec file
- use the python-flavor for requires, not python3 so that build service
can determine dependencies properly
- Update to version 0.10.46:
* [dist] fix BuildRequires for older distros like SLE12
- Update to version 0.10.45:
* [dist] fix shebang substitution in spec for py2
- Update to version 0.10.44:
* import submit request change
* Support updating submodules to main branch
* do not skip "--reference" if package-meta ...
* cpio: Do not follow symlinks in 'touch'
* Support URL hostname in keyring
* gbp: use --git-export
* Update debian/changelog for 0.10.43
* disable compile python in debian package
* update dist/debian.dsc to match debian packaging
* Update debian debhelper dependency
* Fix description-synopsis-starts-with-article
* Fix priority-extra-is-replaced-by-priority-optional
* Debian compat from 8 to 10
* Debian X-Python version no longer needed
* Fix Lintian error about missing python3 dep
* enable the GBP service
* Fixed filtering of include/exclude when topdir has escape characters.
* Fix setting svn credentials in the command line
- update to version 0.10.44:
* Support updating submodules to main branch
* Debian packaging for gbp service
* do not skip "--reference" if package-meta is enabled and git's partial
clone is used.
* Fixed filtering of include/exclude when topdir has escape characters.
* Fix setting svn credentials in the command line
* cpio: Do not follow symlinks in 'touch'
* Support URL hostname in keyring
* debian package updates
- "Downgrade" bzr, mercurial and subversion Recommends to Suggests.
- Fix shebang of the script to use the explicit version of Python
(boo#1212476).
- Update to version 0.10.43:
* Allow to use "tar" service also standalone.
- add support for AL2023
- Update to version 0.10.41:
* fix for python2
- Update to version 0.10.40:
* [dist] updated debian changelog
* Add Python 3.12 to GitHub Actions
* Switch from ConfigParser.readfp to ConfigParser.read_string
- Update to version 0.10.39:
* Add gpg as a dependency (needed for gpg validation)
- Update to version 0.10.38:
* Python 2 is no longer supported by GitHub actions, stop testing it
* FD leak / flake8 / py311 fixes
* updated debian files
* disabled pylint 'no-member' because of false positives in py311
* removed unittest2 from BuildRequires in spec
* fixed fixtures and new Exception class
* updated KankuFile to Tumbleweed and removed python2 tests
- Update to version 0.10.36:
* fix broken tar ball from 0.10.35 release
- Update to version 0.10.35
* Avoid getting confused by _scmsync.obsinfo files
- Update to version 0.10.34.1667392550.026bf0e:
* Fix testing in GH actions
* make linters happy again
* new find_latest_signed_commit algorithm
- Update to version 0.10.33.1664344889.48d1960:
* check if lock is older than 24 hours
- Update to version 0.10.32.1662712308.31d1884:
* [dist] added Requires to python_path
* improve tar service to handle multiple obsinfo files to create tarball
from obscpio
* new ENV 'TAR_SCM_SKIP_CLEANUP' to make test development/debugging
easier
* staple pylint version lower than 2.14 because of breaking changes in
config
* do not use python mock
* fix pylint errors in commontests.py
* Fixed testing
* use extra cache dir for partial clone
* fix cache update in case of partial clone
* disable partial clone when subdir is set
* do not set default subdir to '.'
* fixes to pass pylint
* enable partial clone feature in git scm
* partial clone feature
* simplify locking to avoid race conditions
* TarSCM.cli: set some defaults to make usage in testing easier
* unlink .lock file after unlocking the cache
- Update to version 0.10.30.1641993356.a87e7af:
* Simplifiy conditions for all rhel like distros
* Changed gendered pronoun to be gender neutral
- Update to version 0.10.30.1641990734.bdad8f9:
* fixes for python2.7 compatibility
* fix test cases
* fix various linter problems with pylint 2.11.1
* disable consider-using-f-string in pylint
* added TC for _stash_pop_required
* assertTarIsDeeply now more verbose in case of failure
* remove tearDown/Trace from testenv.py
* fix regression to keep local changes when running in osc
* various fixes to make linter happy
* fix tests for python 2.7
- Update to version 0.10.29.1634038025.85bfc3f:
* fix test cases
* fix various linter problems with pylint 2.11.1
* disable consider-using-f-string in pylint
* added TC for _stash_pop_required
* assertTarIsDeeply now more verbose in case of failure
* remove tearDown/Trace from testenv.py
* fix regression to keep local changes when running in osc
- Update to version 0.10.28.1632141620.a8837d3:
* fix missing "checkout" when running in osc
* fix breakage on version detection
* change locale
- Update to version 0.10.27.1626072657.0fb7a03:
* [ci] enhanced github actions for multiple python versions
* Create main.yml
* Change date format from short to %Y%m%d.
- Update to version 0.10.26.1624258505.aed4969:
* almalinux in spec file
* fix include filters for obscpio files
* fix python interpreter for mageia 8
* TarScm: use owner/group root in .obscpio files
- Update to version 0.10.26.1623775884.87f49a8:
* fixed include/exclude filtering
* add '--' to git log command if file/dir equal revision exists
* add '--source' to git log command
* disabled consider-using-with in .pylint*rc
* package .gitignore files
* Fix version _none_ generate tarball with '-'
* Prevent KeyError in check_for_branch_request method
* removed skipped test case (obsolete since 5 yrs)
* testing for obscpio/obsinfo
* fix regression - obsinfo included the version string
* Revert "remove useless variables"
* remove useless variables
* added param --without-version
* extracted dstname to _dstname
* cleanup TarSCM/tasks.py for pylint
* add date/time to logging output for better debugging
* Fix typos
- Update to version 0.10.22.1615538418.07a353d:
* Fix filelist: align config(noreplace) usage with
obs-service-download_files
* Support gitlab/github merge requests
- Update to version 0.10.21.1612422695.2fdf897:
* fixes boo#1127353
* fixes boo#1168573
* activate pylint3.8 and fixed false positives
* don`t sanitize version if versionrewrite_pattern is set
- Update to version 0.10.20.1606128060.135ac94:
* fix build for CentOS adn RHEL 8
* filter dirs with "include" filter option
- Update to version 0.10.19.1605080719.3b79112:
* [dist] prefer python3 over python2
- Update to version 0.10.18.1600256320.569e5be:
* add license file (issue 257)
* additional option verification
* new option '--maintainers-asc' and '--last-signed-tag'
* new option '--latest-signed-commit'
* Remove superflous ')' in an error message.
- Update to version 0.10.16.1595259906.d3308f5:
* [dist] updated debian control file for use in OBS
- Update to version 0.10.16.1595245235.15a0df2:
* Build with python 3 for Debian and Ubuntu
* [doc] added allowed urls in documentation of tar_scm.service
- remove unused unittest2 dependency
- Update to version 0.10.16.1590752286.5c27247:
* [dist] fix for gbp/fedora (python*-base)
* fix situation when revision has been modified in _service
- Update to version 0.10.15.1588842879.5c43eef:
* dist: Convert to multibuild; run test suite in a separate flavor
- Update to version 0.10.15.1588146746.5cfeeb8:
* fix #boo 1168573 (obsservicerun,obsrun) not exists in client side
installation
* Update debian/changelog for latest version
* Helpers: when a command fail, print the command itself too with its
output
* git: add support for @PARENT_TAG@ in revision
* Fix build on non-openSUSE distro
- Update to version 0.10.14.1584435160.d912143:
* [dist] don't install gbp files by default
* [dist] remove python-keyring* from dependcies
* [dist] make gbp switchable in spec file
- Update to version 0.10.14.1583853599.ccbb399:
* support server side credentials for SCM repos
- Update to version 0.10.12.1582901608.a1c02c1:
* simplify osc git update case a lot
* fixing revision usage on a commit hash
- Update to version 0.10.12.1582709176.d82a692:
* fix lost commits on local run
* fix breakage when working on a specific tag/commit
* git-lfs should not be mandatory as tar_scm will never use it
* Allow use of git-lfs only when running obs_scm
* Document _none_ special version in .service
* Version cleanup: don't strip hyphen when building Debian packages
* Add new archive option for Debian: git-buildpackage
* call git stash with LANG=C
* improved comment for method get_changesrevision
* Add debian package dep to git-lfs
* Implement git LFS blobs retrieval
- Update to version 0.10.11.1579870213.888e79c:
* Add testcase for appimage with empty build section
* Handle missing build entry in appimage.yml
* Fix --mirror argument position for git clone
* Re-enable compatibility with Python 2.6
* fix decoding for locale -a containg non-ASCII
* update_cache in git now does merge
* prefer local branch over remote
* added UnicodeDecodeError to exeption list in archive.py
* fetch rev explicitly if using CACHEDIRECTORY and rev could not be found
* tar_scm.service.in: Add example to match-tag.
- Fix building and installation for CentOS8, RHEL8 and RES8
- Update to version 0.10.10.1566390389.9f923f8:
* Revert "Merge pull request #323 from e4t/master"
* Make service 'tar' work with a cachedir as well
* Fix unit tests for modified scm directory handling
* Append '_service' to repository directory
* separate language and encoding
* git: really print the error message
* tar_scm.service: fix exclude documentation
* Don`t break testsuite if cwd contains colons
* disabling hg tests in travis
- Fixes boo#1138377
- Update to version 0.10.9.1559745964.22c86cd:
* [dist] python3 for SLE12 and openSUSE 42.3
* [dist] enable python3 in SLE >= 12
* fix encoding error for surrogates
* glibc-common was used up to FC23 and RHEL7
* Compile python files before install
* change order in GNUMakefile to prefer python3
* More thorought spec file cleanup
* predefine python version in spec file for GNUMAkefile
* [dist] spec file: python3 only and multidist
* Git also uses the LANGUAGE variable
* centos_version and rhel_version are triple digits
* Minimize diff with the version in openSUSE:Tools
* Fix the logic to pick the locale package on Fedora
* Forgot the guard 0 in one conditional
* Require packages to get the en_US.UTF-8 locales
* enforce bytes for cpio file list
- Update to version 0.10.9.1559647449.d965035:
* [dist] enable python3 in SLE >= 12
- Require external argparse for RHEL6
- Update to version 0.10.9.1557261720.32a1cdb:
* fix encoding error for surrogates
* glibc-common was used up to FC23 and RHEL7
- Update to version 0.10.8.1556896538.0693a62:
* Compile python files before install
* change order in GNUMakefile to prefer python3
* More thorought spec file cleanup
* predefine python version in spec file for GNUMAkefile
- the current guessing code is finding python2 and then uses that, because
python2 still seems to be available in the build env, as we already know
which python version we want we can just pass the path to make and skip
the whole guessing.
- Update to version 0.10.7.1556277536.7e9915a:
* [dist] spec file: python3 only and multidist
* Git also uses the LANGUAGE variable
* centos_version and rhel_version are triple digits
* Minimize diff with the version in openSUSE:Tools
* Fix the logic to pick the locale package on Fedora
* Forgot the guard 0 in one conditional
- centos_version and rhel_version are triple digits
- locally apply fixes from
https://github.com/openSUSE/obs-service-tar_scm/pull/298
- Change requirement locale_package to glibc-common to fix building for
CentOS6 and CentOS7
- Update to version 0.10.6.1551887937.e42c270:
* Require packages to get the en_US.UTF-8 locales
- Update to version 0.10.6.1551448746.2759df2:
* enforce bytes for cpio file list
* fixes boo#1127907
- Update to version 0.10.5.1551309990.79898c7:
* Prefer UTF-8 locale as output format for changes
- Update to version 0.10.4.1551193322.b7a79f4:
* added KankuFile
* fix problems with unicode source files
* added python-six to Requires in specfile
* better encoding handling
- Update to version 0.10.1.1550758451.f88bd41:
* fixes boo#1082696 and boo#1076410
* more fixes py3 unicode
* fix unicode in containers
- Update to version 0.10.0.1550647779.25999e8:
* fix spec for RH/Fedora - glibc-locale -> glibc-common
- Update to version 0.10.0.1550589094.e2ae17d:
* move to python3
* add python 3.6 and 3.7 to testing
* added logging for better debugging changesgenerate
* raise exception if no changesauthor given
* removed python 2.6 from travis
- Update to version 0.9.5.1548407358.b62685b:
* Stop using @opensuse.org addresses to indicate a missing address
* move argparse dep to -common package
* allow submodule and ssl options in appimage
* sync spec file as used in openSUSE:Tools project
- Update to version 0.9.5.1545082095.8dbc95f:
* [dist] fix service files installation in Makefile
- Update to version 0.9.5.1545064321.5c10ac0:
* check encoding problems for svn and print proper error msg
* added new param '--locale'
* separate service file installation in GNUmakefile
* added glibc as Recommends in spec file
* cleanup for broken svn caches
* another fix for unicode problem in obs_scm
- Update to version 0.9.5.1544099104.f52adb7:
* Final fix for unicode in filenames
* Another attempt to fix unicode filenames in prep_tree_for_archive
- Update to version 0.9.5.1544015491.08dd948:
* Another attempt to fix unicode filenames in prep_tree_for_archive
- Update to version 0.9.5.1543865445.4e2fbad:
* fix bug with unicode filenames in prep_tree_for_archive
* reuse _service*_servicedata/changes files from previous service runs
- Update to version 0.9.5.1543588452.b19491f:
* fix problems with unicode characters in commit messages for
changeloggenerate
- Update to version 0.9.5.1543502111.e576bd6:
* fix encoding issues if commit message contains utf8 char
- Update to version 0.9.5.1543424658.8740ef1:
* revert encoding for old changes file
- Update to version 0.9.5.1543418966.30359e4:
* change pylint/flake8 back to 2.7 for now
* remove hardcoded utf-8 encodings
- Update to version 0.9.5.1542905297.a6e346a:
* make code python3 ready
* Add support for extract globbing
- Update to version 0.9.4.1537959361.56833cb:
* enable flake8 in hound
* cleanup for pylint and flake8
* split pylint2 in GNUmakefile
* fix check for "--reproducible"
* create reproducible obscpio archives
* fix flake warning
- Update to version 0.9.3.1537869751.51a17c5:
* fix regression from 44b3bee
* Support also SSH urls for Git
- Update to version 0.9.2.1537788075.fefaa74:
* fix CVE-2018-12473 (boo#1105361)
* fix CVE-2018-12474 (boo#1107507)
* fix CVE-2018-12476 (boo#1107944)
* check name/version option in obsinfo for slashes
* check url for remote url
* check symlinks in subdir parameter
* check filename for slashes
* disable follow_symlinks in extract feature
- switch to obs_scm for this package
- Update to version 0.9.1.1537341862.5348694:
* run download_files in appimage and snapcraft case
* check --extract file path for parent dir
* Fix parameter descriptions
- Update to version 0.9.1.1534504824.0732756:
* changed os.removedirs -> shutil.rmtree
* Adding information regarding the *package-metadata* option for the
*tar* service The tar service is highly useful in combination with the
*obscpio* service. After the fix for the metadata for the latter one,
it is important to inform the users of the *tar* service that metadata
is kept only if the flag *package-metadata* is enabled. Add the flag
to the .service file for mentioning that.
* Allow metadata packing for CPIO archives when desired As of now,
metadata are always excluded from *obscpio* packages. This is because
the *package-metadata* flag is ignored; this change (should) make
*obscpio* aware of it.
- Update to version 0.9.1.1530616709.1329314:
* improve handling of corrupt git cache directories
* only do git stash save/pop if we have a non-empty working tree (#228)
* sort imports
* don't allow DEBUG_TAR_SCM to change behaviour (#240)
* add stub user docs in lieu of something proper (#238)
* [dist] fix build for distros not yet supporting Recommends tag
* Remove clone_dir if clone fails
* python-unittest2 is only required for the optional make check
* move python-unittest2 dep to test suite only part (submission by olh)
- Update to version v0.9.0.1523267117.de861d8:
* Removing redundant pass statement
* fixing indentation warnings from flake8
* fixing flake8 warnings, missing imports
* missing import for logging functions.
* [backend] Adding http proxy support
- python-unittest2 is only required for the optional make check
- Update to version 0.8.0.1520581079.e26b0ae:
* make installation of scm's optional
* add a lot more detail to README
* Git clone with --no-checkout in prepare_working_copy
* Refactor and simplify git prepare_working_copy
* Cleanup flake8 checks
* Only use current dir if it actually looks like git (Fixes #202)
* reactivate test_obscpio_extract_d
* fix broken test create_archive
* fix broken tests for broken-links
* changed PREFIX in Gnumakefile to /usr
* new cli option --skip-cleanup
* fix for broken links
* fix reference to snapcraft YAML file
* fix docstring typo in TarSCM.scm.tar.fetch_upstream
* acknowledge deficiencies in dev docs
* wrap long lines in README
- Update to version 0.8.0.1507129410.0cb2d44:
* mention _none_ version string for people who need it for kiwi root
archives for example
* git: Support url change
* change ordering so that latest change is on top
* also override timestamps of files in cpio
* Sort cpio file list
* [dist] fix spec file py_compile for fedora
* Sort tar file list
- Update to version 0.8.0.1499787575.2419460:
* [test] refactor of fake classes
* [bugfix] fix UnboundLocalError: local variable 'parent_tag'
- Update to version 0.8.0.1499787575.2419460:
* [dist] changed to %py_compile in spec file
* [bugfix] fixes issue #173
* [bugfix] Decoupled self.scm from class name in TarSCM/scm/*
* [lint] make tests/unittestcases.py flake8 ready
* [lint] more fixes for pylint readiness
* [lint] refactor unittestcases.py
* [test] increase cov for TarSCM.archive from 61% to 92%
* [doc] added comment to --use-obs-scm
* [test] refactor of fake classes
* [bugfix] fix UnboundLocalError: local variable 'parent_tag'
- hotfix runtime of obs_scm
- Update to version 0.8.0.1498846582.8799787:
* fix for gh issue #169
* new version placeholder for empty version string
* fix for bzr locale problem in testsuite
* pylint and flake8 in testsuite for better code quality
* code cleanup to be more pylint and flake8 compatible
- Update to version 0.7.0.1497261741.b1aa4cb:
* Move spec file to git
- Update to version 0.7.0.1496831936.d960322:
* fix for nonexistant build section in appimage.yml
* more documentation for README.md
* Update control
- add python-yaml for debian distros
- added Requires: python2 for Fedora >= 25
- Only BuildRequire packages needed for testsuite if the testsuite is
enabled
- Update to version 0.7.0.1492101301.747de50:
* skip broken tests temporarily
- Update to version 0.7.0.1492095435.eda090e:
* revision, repodir and repocachedir as attribute for TarSCM.
* new class TarSCM.cli to make testing easier
* testing script name more reliable
* fixed arguments for singletask in case of snapcraft
* refactored snapcraft code + first tests for snapcraft
* added testcase for snapcraft finalize
* split classes into several files
* track module dependencies in requirements.txt
* use unittest2 in Python 2.6
* more testing for TarSCM.tasks
* clone_dir/repodir/arch_dir(tar_dir)/args now attributes of scm objects
* test case for save_run
* major refactor of git cache handling
* consolidation of archive.obscpio and archive.tar parameters
* next test cases
* unset CACHEDIRECTORY env variable in unit tests
* update atime/mtime of repocachedir if already exists
* prevent key errors when $HOME is not set
* fix PEP8 problems and reenable PEP8 testing
* keep checkout while running with osc
* fix local checkout when running in osc
* force remove of files while 'make clean'
* fix: also exclude directories when called .git
* fix problems with generatechanges when ~/.obs/tar_scm exists
* initial appimage support
* Provide version rewrite using a regex pattern and replacement.
* new parameter --match-tag to filter tags
* keep .gitlab/.github directories
- Update to version 0.7.0.1491998613.3890456:
* refactor of detect_changes into classes
* url as attribute of TarSCM.scm
* run_cmd and safe_run moved into class helpers
* combine os.path.join statement
* refactoring fetch_upstream to be part of TarSCM.scm
* new classes for archives
* common method 'get_current_commit' to get rid of exception for git
* refactored detect_changes to get rid of changesgenerate exception
* get_repocachedir -> TarSCM.scm
* Add description to the README.md file
- split services into own rpms
- Update to version 0.7.0.1490358243.8de854e:
* keep .gitlab/.github directories
- Update to version 0.7.0.1490263157.682db30:
* Provide version rewrite using a regex pattern and replacement.
* initial appimage support
* make pep8 happy again
* test cases for version rewrite
* new parameter --match-tag to filter tags
- Replayce python-yaml Requires/Buildrequires with python-PyYAML, which is
actually its correct name.
- Update to version 0.7.0.1484082405.7671be8:
* fix problems with generatechanges when ~/.obs/tar_scm exists
- Update to version 0.7.0.1481203567.804351a:
* fix: also exclude directories when called .git
- Update to version 0.7.0.1480953937.a4b8b09:
* fix local checkout when running in osc
* force remove of files while 'make clean'
- Update to version 0.7.0.1480000004.4027270:
* fixed pip8 problems
* keep checkout while running with osc
- Update to version 0.7.0.1478249268.e162c66:
* prevent key errors when $HOME is not set
- Update to version 0.7.0.1477858520.51a62fb:
* added locking for cachedir in jailed mode
* removed setup_tracking_branches and '--dissociate'
* inital version of TarSCM classes
* scm_object generation moved to singletask
* FETCH_UPSTREAM_COMMANDS into classes
* moved update_cache_* to classes
* moved detect_version into classes and refactored calls of
get_timestamp_*
* moved get_timestamp functions into scm classes
* git_ref_exists -> TarSCM.git._ref_exists
* fetch_upstream_git_submodules -> fetch_submodules to get rid of
exceptions for git
* just moved some functions for better overview
* refactor of detect_changes into classes
* url as attribute of TarSCM.scm
* run_cmd and safe_run moved into class helpers
* combine os.path.join statement
* refactoring fetch_upstream to be part of TarSCM.scm
* new classes for archives
* common method 'get_current_commit' to get rid of execption for git
* refactored detect_changes to get rid of changesgenerate exception
* get_repocachedir -> TarSCM.scm
* revision, repodir and repocachedir as attribute for TarSCM.
* new class TarSCM.cli to make testing easier
* testing script name more reliable
* fixed arguments for singletask in case of snapcraft
* refactored snapcraft code + first tests for snapcraft
* added testcase for snapcraft finalize
* split classes into serveral files
* more testing for TarSCM.tasks
* clone_dir/repodir/arch_dir(tar_dir) now attributes of scm objects
* test case for save_run
* major refactor of git cache handling
* consolidation of archive.obscpio and archive.tar parameters
* next test cases
* sytnax fix for "tar" service
* fixed tests for tar
* unset CACHEDIRECTORY env variable in unit tests
* update atime/mtime of repocachedir if already exists
- Update to version 0.7.0.1474270818.3e05f80:
*
- Update to version 0.7.0.1477567374.d44d677:
* use '--dissociate' for git if package-meta is set
* added locking for cachedir in jailed mode
* removed setup_tracking_branches and '--dissociate'
* inital version of TarSCM classes
* scm_object generation moved to singletask
* FETCH_UPSTREAM_COMMANDS into classes
* moved update_cache_* to classes
* moved detect_version into classes and refactored calls of
get_timestamp_*
* moved get_timestamp functions into scm classes
* git_ref_exists -> TarSCM.git._ref_exists
* fetch_upstream_git_submodules -> fetch_submodules to get rid of
exceptions for git
* just moved some functions for better overview
* refactor of detect_changes into classes
* url as attribute of TarSCM.scm
* run_cmd and safe_run moved into class helpers
* combine os.path.join statement
* refactoring fetch_upstream to be part of TarSCM.scm
* new classes for archives
* common method 'get_current_commit' to get rid of execption for git
* refactored detect_changes to get rid of changesgenerate exception
* get_repocachedir -> TarSCM.scm
* revision, repodir and repocachedir as attribute for TarSCM.
* new class TarSCM.cli to make testing easier
* testing script name more reliable
* fixed arguments for singletask in case of snapcraft
* refactored snapcraft code + first tests for snapcraft
* added testcase for snapcraft finalize
* split classes into serveral files
* more testing for TarSCM.tasks
* clone_dir/repodir/arch_dir(tar_dir) now attributes of scm objects
* test case for save_run
* major refactor of git cache handling
* consolidation of archive.obscpio and archive.tar parameters
* next test cases
* sytnax fix for "tar" service
- Update to version 0.7.0.1476904507.e88eed1:
* fixed arguments for singletask in case of snapcraft
* refactored snapcraft code + first tests for snapcraft
* added testcase for snapcraft finalize
* split classes into serveral files
* more testing for TarSCM.tasks
* clone_dir/repodir/arch_dir(tar_dir) now attributes of scm objects
* test case for save_run
* major refactor of git cache handling
* consolidation of archive.obscpio and archive.tar parameters
* next test cases
- Update to version 0.6.1.1473925745.c5264bb:
* jailed mode for docker integration
* added setup of remote branches in jailed mode
* new handling for remote/local branches when caching
* fix permission problem of .changes files when running jailed in docker
* fix problem with outdated git refs in cache
- Update to version 0.6.1.1472657181.ff9a5ca:
* make yaml dependency optional for travis
* Add an option 'master' to submodules to fetch the latest mater branch.
* tar_scm.py: Always use an absolute path for the 'output' directory
* do not set files back to 1970...
* transfer mtime via obsinfo
* create needed sub directories for cache handling
* prefer local cache directory
* - weak dependency to mercurial for debian
* add python-dateutil require for debian
* testing on debian is broken atm
- Update to version 0.6.1.1472656157.58c52d8:
* make yaml dependency optional for travis
* Add an option 'master' to submodules to fetch the latest mater branch.
* tar_scm.py: Always use an absolute path for the 'output' directory
* do not set files back to 1970...
* transfer mtime via obsinfo
* create needed sub directories for cache handling
* prefer local cache directory
* - weak dependency to mercurial for debian
* add python-dateutil require for debian
* testing on debian is broken atm
- Update to version 0.6.1.1472655284.4930b81:
* add python-dateutil require for debian
* testing on debian is broken atm
- fix debian builds
- Update to version 0.6.1.1472636708.355b59a:
* fix some more merge regressions
* pep8 fixes/workarounds
* make yaml dependency optional for travis
* Add an option 'master' to submodules to fetch the latest mater branch.
* tar_scm.py: Always use an absolute path for the 'output' directory
* do not set files back to 1970...
* transfer mtime via obsinfo
* create needed sub directories for cache handling
* prefer local cache directory
* - weak dependency to mercurial for debian
- Update to version 0.6.1.1471594222.d257927:
* prefer local cache directory
* jailed mode for docker integration
* added setup of remote branches in jailed mode
* new handling for remote/local branches when caching
- cache handling will be refactored to have only one implementation in
future.
- fix mtime handling
- Update to version 0.6.0.1469628830.67456b7:
* pep8 fixes/workarounds
* make yaml dependency optional for travis
* Add an option 'master' to submodules to fetch the latest mater branch.
* do not set files back to 1970...
* transfer mtime via obsinfo
* create needed sub directories for cache handling
- update to official version 0.6.0 (latest package became official)
- Update to version 0.6.0.1467889501.49c9462:
+ very first obs_scm implementation
+ allow extracting of (spec) files
+ allow to include local changes when using "obs_scm" service via local
osc commands.
+ make obsinfo parameter for tar service optional
+ support filtering on creation of cpio archives
+ - add debian provides
+ - make cleaning message a debug message
+ report error when specified revision got not found
+ add snapcraft.yaml support
+ merge upstream
+ minor cleanup
+ fix typo, wrong file name of new snapcraft.yaml
+ fix some more merge regressions
+ pep8 fixes/workarounds
+ make yaml dependency optional for travis
- added snapcraft support via own service
- Update to version 0.6.0~pre.1467126663.ec976d1:
* Allow to manually specify a base for @TAG_OFFSET@
* - make cleaning message a debug message
* Honour "subdir" param for changesgenerate
* report error when specified revision got not found
* Extend fixture to create commits with a specific timestamp
* Use commit timestamp as mtime for files and directories in tarball
* Workaround bug in Mercurial localdate filter
* fix breakage from conflict of #63 and #85
* Provide test for git tag fetching
* Add ability to generate changes file when using svn
* add snapcraft.yaml support
- Update to version 0.6.0~pre.1461678268.e8b5d73:
* fix TESTING.md link in CONTRIBUTING.md
* Use correct level 2 bullet point (*)
* very first obs_scm implementation
* allow extracting of (spec) files
* allow to include local changes when using "obs_scm" service via local
osc commands.
* make obsinfo parameter for tar service optional
* support filtering on creation of cpio archives
* - add debian provides
- add debian provides
- fix dependency on SLE 11 to python-argparse
- Correctly reference patch in previous entry
- Update to version 0.6.0~pre.1460377105.35a4ea4:
* support filtering on creation of cpio archives
- Update to version 0.6.0~pre.1460098798.dda5411:
+ make obsinfo parameter for tar service optional
- Update to version 0.6.0.1460017418.4e4b2d6:
+ Correct error message about lack of git tags
+ GNUmakefile: Use default python in $PATH unless it is a python 3.
+ fix TESTING.md link in CONTRIBUTING.md
+ Use correct level 2 bullet point (*)
+ very first obs_scm implementation
+ allow extracting of (spec) files
+ allow to include local changes when using "obs_scm" service via local
osc commands.
- building this pre-version currently from private branch as discussed
with Adam
- only require git-core to not pull in git-web and gitk
- Fix build on Ubuntu by disabling mercurial tests
* 0001-Debianization-disable-running-mercurial-tests.patch
- Update to version 0.5.3.1434983686.0b4ce51:
+ Add missing extension parameter to service file
+ Fix build on Debian 7.0/8.0
- Update to version 0.5.3.1433158390.b0e72e1:
+ use the same Python interpreter for testing tar_scm
+ Split up the steps of git cloning and submodule initialization
+ fix Makefile test runner for Debian
- Update to version 0.5.2.1432717816.cff60cf:
+ be explicit about python2, python may be python3
+ Fix newline at the end of @PARENT_TAG@
+ Fix Mercurial version format strings in unittest
+ Refactoring of package metadata regex matching
+ Refactor resetting of uid/gid so that it is reusable
+ Fix handling of --include option
+ Fix handling of --exclude option
+ Refactor subdir handling of tarchecker's to prevent code duplication
+ ignore PEP8's E731 check for lambdas
+ PEP8 E402 fix: set PYTHONPATH outside code
+ add @TAG_OFFSET@ support in versionformat for git
+ fix inconsistencies in tar_scm.service
+ - fix .service file syntax (OBS 2.6.1 is checking now)
+ mention need to set PYTHONPATH when running tests
+ keep STDERR separate
+ don't allow --subdir to wander outside repo (boo#927120, #71)
- Update to version 0.5.1.1426664483.de67b88:
+ be explicit about python2, python may be python3
+ Fix newline at the end of @PARENT_TAG@
+ Fix Mercurial version format strings in unittest
+ Refactoring of package metadata regex matching
+ Refactor resetting of uid/gid so that it is reusable
+ Fix handling of --include option
+ Fix handling of --exclude option
+ Refactor subdir handling of tarchecker's to prevent code duplication
+ ignore PEP8's E731 check for lambdas
+ PEP8 E402 fix: set PYTHONPATH outside code
+ add @TAG_OFFSET@ support in versionformat for git
+ fix inconsistencies in tar_scm.service
+ - fix .service file syntax (OBS 2.6.1 is checking now)
- Update to version 0.5.0.1412769870.6cda976:
+ change default git versionformat to %ct.%h
+ fix changes generation when version is blank
+ lots of refactoring
+ add info and caveats about data persisting between tests
+ gittests: give default author test a unique name
- Update to version 0.4.2.1412467141.df3329e. Many changes, including:
+ Retrieve tags for a cached git repo
+ Add PEP8 checking everywhere
+ Significantly improved tests
+ Fixed checkout of a hg url that ends with a trailing slash
+ Fix Debian build dependencies for python
+ Change Debian package format to 3.0 (native)
+ Install into /usr on Debian
+ Honor submodules=disable as before (fixes #38)
+ Fix directory name of repository clone
+ Fix handling of symbolic links
+ Fix crash when changesrevision is missing
+ Improved usage text
+ Store git and hg hashes in full
+ Fix crash during copy of _servicedata
+ Fix format of new changes to match old shell tar_scm
+ Fix bug when temp file is on a different filesystem
+ Fix change generation bug introduced by Python rewrite
+ Fix retrieval of email address from ~/.oscrc
+ Refactor changesgenerate code
- Update to version 0.4.0.1410288598.7f38281:
+ Python rewrite of tar_scm
+ Make pep8 happy (except for regex in tar_scm:299)
+ Address some feedback from pylint
+ make Python version PEP8-compliant
+ Let Travis execute pep8
+ Strip newline ('\n') characters from safe_run output in
detect_version()
+ Make potentially long-running tasks print output in real-time
+ Improve efficiency of stdout handling in safe_run()
+ Release obs-service-tar_scm 0.4.0
- Update to version 0.3.2.1404723797.745a470:
+ Initial debianization
+ switch git submodule versions correctly
+ add some basic documentation to the tests
+ split off info into TESTING.md
+ add CONTRIBUTING.md
+ improve formatting
+ whitelist accepted chars in arguments.
+ Correct/update install information
+ Reverse changes lines again with tac
- Update to version 0.3.2.1386694317.b85b342:
+ Fix adding to already existing _servicedata case
+ Don't reverse changes lines with 'tac'
+ Fix Python FutureWarning about comparison with None
+ Improve description of the versionformat parameter.
- Enable changes generation
- Bump version to 0.3.2
* changes file generation support written by Sascha
- Bump version to 0.3.1
* do not execute tar base file name
- Bump version to 0.3.0 and include git timestamp / SHA1 in version.
- Update to latest git (9de0986):
+ add git submodule update test
+ extract submodule_path() method
+ allow git commands to run from cwd
+ rename opts to args
+ annotate cwd
+ ensure all scm invocations succeed when expected
+ record revisions per repository path
+ allow creation of git submodules
+ Fixtures.create_commits(): add repository path parameter
+ GitFixtures.create_repo(): add repository path parameter
+ fix hg tests when run in timezone east of UTC
+ add hint about running tests quicker
+ don't hardcode revision in helper method
+ quoting tweak
+ make test output more consistent
+ get line spacing right
+ Travis: also test with Python 2.6
+ tweak debugging for mv invocations
+ a bit more info on the test suite
+ leave temporary files behind on failure, for debugging
+ add some docstrings to a few of the more complex tests
+ make switching to a given git revision more robust
+ try to make test output a little easier to understand
+ improve README.md
+ switch README to markdown and add Travis build status icon
+ replace XML entities with dollar-curlies
+ Properly encode XML reserved entities (&,)
+ add better revision description/documentation for git
+ We are still not allowed to have dashes inside version. Fix for
mercurial.
+ allow-different-naming-schemes-for-resulting-tar-files
+ Fix breakage when LANG is not English (issue #8)
+ Make test.py executable
+ README: add information about the test suite
+ Don't rely on git error codes for "git describe", catch all
+ Better error handling for @PARENT_TAG@ expansion
+ the correct tag is 'param', 'parameter' won't work
+ Tell Travis where to find the tests
+ Cleanup testing tmp_dir afterwards
+ Add description for @PARENT_TAG@
+ Ignore .coverage
+ Move tests into sub-directory
+ Last change for some bonus points
+ Naa, typo
+ Update package database before installing dependencies
+ Add initial Travis-CI configuration
+ Add .gitignore file
+ Add test for @PARENT_TAG@
- Pass --tags to "git describe" for @PARENT_TAG@
- Disable testsuite on SLE_11_SP2 to fix build
- Use upstream github repository and download via _service file
- Add custom git versionformat extensions:
+ @PARENT_TAG@: Replaced by first tag that is reachable from the current
commit (see 'git describe') Future custom additions could follow the
@NAME@ scheme
- Fix usage text for submodules option
- change default versionformat from author date (%at) to commiter date
(%ct) for git, to fix issues with cherry-picked commits resulting in
decreased version
- add --date=short to get_vesion of git and remove '-' chars by sed. This
allows us to use %ad as versionformat and have something like "20120916"
as version instead of terrible Unix timestamps.
- Prevent local users from appearing as user/group owner in generated tar
files (thanks bmwiedemann for this)
- fix option for submodule update
- Fixed error with cache
- Added an option to disable git submodules
- Replaced --exclude=.$MYSCM with --exclude-vcs tar option
- Added support for git submodules
- Re-iterating the last change once again, 'git rev-parse --verify $REV'
will return false even if $REV is a normal branch upon first clone
of the repo. Thus 'git fetch $URL +$REV:$REV" is run initially. However,
the 'git checkout $REV' then fails because it's missing tracking
information. Therefore, try a normal checkout first and fetch the
specific $REV only when that fails (due to reasons described below).
- Allow git revision to refer to revisions not available from a default
clone/fetch (i.e. refs other than refs/heads/* or refs/tags/*)
- Check that git pull succeeds
- Remove accidental reference to keep-source parameter which was never
pushed upstream (obsoleted by new cache).
- When the cache is used, output location of repo in the cache
- add new 'versionformat' option to determine how version is extracted via
git show --pretty=...
- support caching of cloned repositories to speed up fetch from upstream
Mon Feb 13 15:52:19 GMT 2012 - aspiers@suse.com
- Add test suite
- Fix --subdir with --scm svn
- Fix --scm bzr
- patch license to follow spdx.org standard
- add new option to specify a subset of files/subdirectories to pack in
the tar ball
- Checking out a specific revision cannot work when only the latest
version is cloned.
- make svn checkout --trust-server-cert option conditional, since this
option is not supported by versions prior to subversion 1.6.
- Trim user prefix from tarball filename. This enables tar_scm service to
be used with git and ssh transport (in conjuction with a passphrase less
ssh-pubkey). Example Git URL: git@gitrepo.tld:foobar.git
- git 1.6.x and very likely other version only support "show
--pretty=format:%at" as parameter with "format:" prefix. git show
--pretty=%at is also support by recent git versions.
- make it possible to create tar balls without version tag (#714542)
- support old tar bar lookup also for OBS 2.3 bs_service using .old/
directory
- drop broken code for same-commit-detection as suggested by Markus
- history-depth parameter: use hackish depth=999999999 if "full" is given
so that a shallow clone will be fully deepened if the _service file is
changed. Also, fix git clone cmd line (remove a pair of quotes that
cause problems).
- add support for (git) checkout depth, original patch by Markus Lehtonen
[markus.lehtonen@linux.intel.com]
- make packaging of meta data optional to reduce tar ball size
- fix exclude expansion
- add support for bzr
- Fix: recompressed tars were never reused
- cleanup mercurial commands
- always trust svn server certificate. We don't have a secure handling for
it anyway. Trust needs to established via extra service.
- fix subdir usage for git
- add option exclude files/directories when creating the tar ball
- git clone runs now with --depth 1 option
- support mercurial repositories
- Fix --filename parameter use
- initial version to checkout/update svn or git repos and create a tar
Changes in obs-service-recompress:
- zstd is now available on SLE 15 SP0 Adding dependency there as well to
fix boo#1216361
- update to version 0.5.2:
* zstd compression with rsyncable and higher compression
- disable zstd on RHEL, the package is not available on OBS
- use filebased requires on gzip so that zstd can supplement it as well
- Fixed checking for zstd support on different distributions
- Update to version 0.5.1:
* Use at least 2 threads for xz compression
- Update to version 0.5.0:
* do not follow symlinks (issue 9)
* add license file
* compression using # of core threads for zstd and xz
* Add support for keeping of original file
* use --threads=0
- Update to version 0.4.0+git20200123.696d003:
* run test suite during build
- Update to version 0.4.0+git20200123.946b23f:
* add zstd compression support
- Update to version 0.3.1+git20170704.59bf231:
* Add README.md file
* [dist] added spec file to git
- Update to version 0.3.1+git20160217.7897d3f:
+ security fixes (boo#967265)
- Fix build for Debian 8.0
- Use install target from Makefile
- Include git revision in version number
- Update to version 0.3.1+git20150622.d908b54:
+ Tell rm not to prompt
+ Change debian source format to 'native'
+ Add Makefile with install target
- Update to version 0.3.1:
+ debian: use install-file to simplify rules-file
+ Initial debianization
+ - avoid problematic quoting
+ Fix typo
- Update to version 0.3.1:
+ Fix diffing uncompressed files
- Update to version 0.3:
+ Don't overwrite identical files
- Move service to github.com/openSUSE/obs-service-recompress
- Add _service file to update package from there
- Drop local sources and use tarball from source services
- Display message on successful (re)compression.
- always remove uncompressed files
- fix rpmlint warnings
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-109=1
Package List:
- openSUSE Backports SLE-15-SP7 (noarch):
obs-service-appimage-0.11.0-bp157.2.1
obs-service-obs_scm-0.11.0-bp157.2.1
obs-service-obs_scm-common-0.11.0-bp157.2.1
obs-service-recompress-0.5.2-bp157.2.1
obs-service-snapcraft-0.11.0-bp157.2.1
obs-service-tar-0.11.0-bp157.2.1
obs-service-tar_scm-0.11.0-bp157.2.1
References:
https://www.suse.com/security/cve/CVE-2018-12473.html
https://www.suse.com/security/cve/CVE-2018-12474.html
https://www.suse.com/security/cve/CVE-2018-12476.html
https://bugzilla.suse.com/1076410
https://bugzilla.suse.com/1082696
https://bugzilla.suse.com/1105361
https://bugzilla.suse.com/1107507
https://bugzilla.suse.com/1107944
https://bugzilla.suse.com/1127353
https://bugzilla.suse.com/1127907
https://bugzilla.suse.com/1138377
https://bugzilla.suse.com/1168573
https://bugzilla.suse.com/1212476
https://bugzilla.suse.com/1216361
https://bugzilla.suse.com/927120
https://bugzilla.suse.com/967265
openSUSE-SU-2026:0108-1: moderate: Security update for obs-service-set_version
openSUSE Security Update: Security update for obs-service-set_version
_______________________________
Announcement ID: openSUSE-SU-2026:0108-1
Rating: moderate
References: #1072359 #1212476 #866966
Cross-References: CVE-2014-0593
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that solves one vulnerability and has two fixes
is now available.
Description:
This update for obs-service-set_version fixes the following issues:
- Update to version 0.6.6:
* Hardcode "0" as release for PKGBUILD as well
- expand __python3 with python3 to work outside suse rpm packaging
- Update to version 0.6.5:
* Update spec file to the one used in the packaging
* Move revision detection into _revision_detect
- Fix shebang of the script to use the explicit version of Python
(boo#1212476).
- Update to version 0.6.4:
* Treat LegacyVersion as InvalidVersion
* Add testing python 3.10 - 3.12
- Update to version 0.6.3:
* [dist] import spec file from O:S:U
* Mute warning about missing EMAIL env variable in unit tests
* Fix unit tests
* Replace invalid use of os.errno with errno module
* Replace @VERSION@ placeholders in .dsc files
* Remove usage of deprecated imp module with importlib
* Detect revision and set pkgrel for Arch packages
- add support for AL2023
- Builds on CentOS_[5678] and possibly other distros failed because their
'rpm' didn't recognize the "Recommends:" tag. I've wrapped that tag in
an "%if 0%{?suse_version}" to work around it. Build is now passing on
the CentOS distros.
- Update to version 0.6.2:
* Avoid the Flake8 warning and restore conditional import
- Update to version 0.6.1:
* Handle already converted versions gracefully
* Flake8 fixes (missing import)
* Test python3 by default
- Update to version 0.6.0:
* Test against Python 3.10 which is the Tumbleweed default
* Remove TravisCI - we switched to GitHub Actions
* handle removed packaging.version.LegacyVersion (Fixes #83)
- simplifiy conditions for all rhel like distros to skip testsuite
- Update to version 0.5.14:
* changed debugging output to logging module
* Explicitely specifying --fromfile should win over .obsinfo
* Add new switch --fromfile
* Add zst to recognized suffixes (zstd support)
- Update to version 0.5.13:
* add license file
* fixing suffixes - remove backslashes
* fix suffixes to begin with a dot
* enhanced debug mode
* tests for directory pristine-tar
- Update to version 0.5.12:
* debian: set script shebang to python3
* debian: add python3 as a runtime dependency
* conditionally define PYTHON in Makefile
* debian: use python3 for building
* try to fix set_version:157:13: E117 over-indented (comment)
- Modified .spec file to better suit Fedora OS (let's just assume all
Fedora versions has python 3)
- Update to version 0.5.11:
* try to fix set_version:157:13: E117 over-indented (comment)
- enable test suite by default
* if it does not build, it can also not be executed on the distro
- fix requires for SLE 12 distro
- Changed source files to support python 3
- fix for Fedora 30/Rawhide
- for now obs_scm_testsuite only for > 1315, needed python stuff not
available otherwise
- Update to version 0.5.11:
* fix code to pass flake8 tests for python3
* fix zipfile crash also for python2.7
* avoid error with latest flake8 about unused variable
* allow running tests with python3
* second place where zip file handling can crash
* avoid crashes due to false is_zipfile() response
* Add python-flake8 to test suite package list
* Fix indentation of condition
* Fix basename to match documentation (#54)
- Update to version 0.5.10:
* fix zipfile crash also for python2.7
- Wrap make check in bcond obs_scm_testsuite
- Update to version 0.5.9:
* avoid crashes due to false is_zipfile() response
- enable test suite
- Update to version 0.5.8:
* fixes boo#1072359
* code cleanup and some refactoring
* cli options --debug and --regex
* new targets (test/clean) for Makefile
* initial .gitignore
* Mention that tests may take some time in README.md
* Fix pip/zypper tests for python3
* enforce files to be decoded as UTF-8
* Don't let version check get beyond path boundary
* Slightly reorganize README.md file
- add requires to python3, since Leap 15.0 still does not have the
fileprovides
- Update to version 0.5.7:
* added gitignore
* added target 'clean' in Makefile
* Added new target 'test' to Makefile
* fix flake8 error 'do not use bare except'
* Reverting patch for setlocale as it breaks in containers
- Update to version 0.5.7:
* workaround for python3 locale problems in factory
* add a hint to flake8
* satisfy flake8
* skip also sha256sums check for Arch
- switch to python3 for less ancient distros
- Avoid half-converting Debian native pkgs to non-native pkgs
- Simplify the pip version handling
- travis: Do not use "--use-mirrors" when using pip
- travis: Test python 3.6
- try to avoid python-packaging to support non-SUSE distros
- Update to version 0.5.6:
* strip \n from version in obsinfo
- Update to version 0.5.5:
* read version from .obsinfo file if available
* Add support for Collax build recipes
- Update to version 0.5.4:
* support obscpio archives
* do not strip release number in debian, but setting it back
- Update to version 0.5.3:
* VersionDetector._autodetect: prioritize the directory name over the
file name
- Update to version 0.5.3:
* Don't add unconverted_version unconditionally
- Update to version 0.5.3:
+ Use old version from testing data instead of hardcoding
+ Fix replacement of empty tags
+ Fix empty version checks for debian/changelog
+ fix when switching from .dev to non-dev version
- Update to version 0.5.3:
+ Set pkgver and pkgrel for PKGBUILD files (fixes #21)
+ Fix python3 compat
- Update to version 0.5.2:
+ fix it ... it only worked with "disabledrun" mode by luck
- Update to version 0.5.1:
+ Make python-packaging runtime dep optional
+ Fix %setup handling for python spec files
- Recommends python-packaging
- Require python-packaging
- Update to version 0.5.0:
+ Add Makefile with install target
+ Change debian source format to 'native'
+ Fix tar file detection for PKGBUILD
+ Add Testsuite and README.md
+ - empty dummy commit to test travis hook
+ Disable py26, enable py{33,34} for tests
+ Add basic test for debian changelogs
+ Add travis build status image to README
+ Also do negative test for debian/changelog
+ Move testdata to .json files
+ Move _write_tarfile() to base test class
+ Remove python 2.6 compat import
+ Reuse test data for debian changelog tests
+ Rewrite set_version in python
+ Install devscripts in travis-ci test env
+ Restructure version detection code
+ Allow files in test tarballs
+ Add package type detection for python
+ Add version converter for python packages
+ Run python version converter tests with dpkg
+ Add function to add or replace a %define
+ Fix problem with replacing tags in spec files
+ Add function to replace %{version} in %setup
+ Add custom line support for _write_specfile func
+ Finally use version conversion for python packages
+ Skip some tests if zypper or dpkg are unavailable
+ Use python binary from virtualenv
- Update to version 0.4.2:
+ Release 0.4.2 - Update Debian changelog
- Update to version 0.4.2:
+ the extension needs to be \.
+ test with defined() at ./set_version line 118.
+ Fix processing of --file parameter
+ Add support for setting the version in debian.changelog
+ Sort local file list based on modification time (newest first)
- Update to version 0.4.1:
+ Add support to automatically detect version based on Debian changelog
file
+ Initial debianization
+ Handle PKGBUILD files generated by services
- Update to version 0.4.1:
+ - drop old bash version
+ - fix PKGBUILD version setting
+ fix help text
+ support detection from tar ball content
+ use warnings pragma
+ - replace bash script with a more secure perl version
+ fix urgent quoting bugs
+ Be more liberal in root-dir version detection
- Update to version 0.4.1:
+ - drop old bash version
+ - fix PKGBUILD version setting
+ fix help text
- Update to version 0.4.0:
+ support detection from tar ball content
+ use warnings pragma
- Update to version 0.4.0: This is a rewrite in perl This fixes also a sed
commandline injection (boo#866966 CVE-2014-0593)
- Update to version 0.3.3:
+ ERROR: git log --pretty=format:%s --no-merges 4b090f0cad..4fc9fcb0c2
failed; aborting!
- Update to version 0.3.3:
+ - drop two echo lines which can be used to run random commands
- Update to version 0.3.2:
+ Be more liberal in root-dir version detection
- Update to version 0.3.1:
+ Check tarball content's root-dir for version
+ Use a for-loop for different endings
- Move service to github.com/openSUSE/obs-service-set_version
- Add _service file to update package from there
- Drop local sources and use tarball from source services
- Take Debian version and revision number from debian.changelog file
- add support for PKGBUILD aka Arch Linux files
- Preserve whitespaces in Version: and Requires: lines
- only change the first occurrence of Version: header
- output useful info during run
- when auto-detecting the version, use the newest matching file
- patch License to follow spdx.org standard
- add --basename to usage help text
- do not delete mandriva/fedora macros in release when reset the release
number
- support detecting the version from *.tbz2 files
- initial package of service
- fix set version, when also release number is reset
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-108=1
Package List:
- openSUSE Backports SLE-15-SP7 (noarch):
obs-service-set_version-0.6.6-bp157.2.1
References:
https://www.suse.com/security/cve/CVE-2014-0593.html
https://bugzilla.suse.com/1072359
https://bugzilla.suse.com/1212476
https://bugzilla.suse.com/866966
openSUSE-SU-2026:0107-1: moderate: Security update for libjxl
openSUSE Security Update: Security update for libjxl
_______________________________
Announcement ID: openSUSE-SU-2026:0107-1
Rating: moderate
References: #1258090
Cross-References: CVE-2025-12474
CVSS scores:
CVE-2025-12474 (SUSE): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________
An update that fixes one vulnerability is now available.
Description:
This update for libjxl fixes the following issues:
- Update to release 0.8.5 (boo#1258090):
* fix tile dimension in low memory rendering pipeline [CVE-2025-12474].
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2026-107=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 s390x x86_64):
gdk-pixbuf-loader-jxl-0.8.5-bp156.3.6.1
gimp-plugin-jxl-0.8.5-bp156.3.6.1
libjxl-devel-0.8.5-bp156.3.6.1
libjxl-tools-0.8.5-bp156.3.6.1
libjxl0_8-0.8.5-bp156.3.6.1
- openSUSE Backports SLE-15-SP6 (aarch64_ilp32):
libjxl0_8-64bit-0.8.5-bp156.3.6.1
- openSUSE Backports SLE-15-SP6 (x86_64):
libjxl0_8-32bit-0.8.5-bp156.3.6.1
- openSUSE Backports SLE-15-SP6 (noarch):
jxl-thumbnailer-0.8.5-bp156.3.6.1
References:
https://www.suse.com/security/cve/CVE-2025-12474.html
https://bugzilla.suse.com/1258090
openSUSE-SU-2026:0106-1: moderate: Security update for libjxl
openSUSE Security Update: Security update for libjxl
_______________________________
Announcement ID: openSUSE-SU-2026:0106-1
Rating: moderate
References: #1233763 #1233783 #1258090
Cross-References: CVE-2024-11403 CVE-2024-11498 CVE-2025-12474
CVSS scores:
CVE-2024-11403 (SUSE): 6.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L
CVE-2024-11498 (SUSE): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
CVE-2025-12474 (SUSE): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for libjxl fixes the following issues:
- Update to release 0.8.5 (boo#1258090):
* fix tile dimension in low memory rendering pipeline [CVE-2025-12474].
- Update to release 0.8.4
* Huffman lookup table size fix [CVE-2024-11403]
* Check height limit in modular trees [CVE-2024-11498]
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-106=1
Package List:
- openSUSE Backports SLE-15-SP7 (aarch64 i586 s390x x86_64):
gdk-pixbuf-loader-jxl-0.8.5-bp157.2.3.1
gimp-plugin-jxl-0.8.5-bp157.2.3.1
libjxl-devel-0.8.5-bp157.2.3.1
libjxl-tools-0.8.5-bp157.2.3.1
libjxl0_8-0.8.5-bp157.2.3.1
- openSUSE Backports SLE-15-SP7 (aarch64_ilp32):
libjxl0_8-64bit-0.8.5-bp157.2.3.1
- openSUSE Backports SLE-15-SP7 (noarch):
jxl-thumbnailer-0.8.5-bp157.2.3.1
- openSUSE Backports SLE-15-SP7 (x86_64):
libjxl0_8-32bit-0.8.5-bp157.2.3.1
References:
https://www.suse.com/security/cve/CVE-2024-11403.html
https://www.suse.com/security/cve/CVE-2024-11498.html
https://www.suse.com/security/cve/CVE-2025-12474.html
https://bugzilla.suse.com/1233763
https://bugzilla.suse.com/1233783
https://bugzilla.suse.com/1258090
openSUSE-SU-2026:10443-1: moderate: libsuricata8_0_4-8.0.4-1.1 on GA media
# libsuricata8_0_4-8.0.4-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10443-1
Rating: moderate
Cross-References:
* CVE-2026-31931
* CVE-2026-31932
* CVE-2026-31933
* CVE-2026-31934
* CVE-2026-31935
* CVE-2026-31937
Affected Products:
* openSUSE Tumbleweed
An update that solves 6 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the libsuricata8_0_4-8.0.4-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libsuricata8_0_4 8.0.4-1.1
* suricata 8.0.4-1.1
* suricata-devel 8.0.4-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-31931.html
* https://www.suse.com/security/cve/CVE-2026-31932.html
* https://www.suse.com/security/cve/CVE-2026-31933.html
* https://www.suse.com/security/cve/CVE-2026-31934.html
* https://www.suse.com/security/cve/CVE-2026-31935.html
* https://www.suse.com/security/cve/CVE-2026-31937.html
openSUSE-SU-2026:10446-1: moderate: ImageMagick-7.1.2.18-1.1 on GA media
# ImageMagick-7.1.2.18-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10446-1
Rating: moderate
Cross-References:
* CVE-2026-32636
CVSS scores:
* CVE-2026-32636 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-32636 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the ImageMagick-7.1.2.18-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* ImageMagick 7.1.2.18-1.1
* ImageMagick-config-7-SUSE 7.1.2.18-1.1
* ImageMagick-devel 7.1.2.18-1.1
* ImageMagick-devel-32bit 7.1.2.18-1.1
* ImageMagick-doc 7.1.2.18-1.1
* ImageMagick-extra 7.1.2.18-1.1
* libMagick++-7_Q16HDRI5 7.1.2.18-1.1
* libMagick++-7_Q16HDRI5-32bit 7.1.2.18-1.1
* libMagick++-devel 7.1.2.18-1.1
* libMagick++-devel-32bit 7.1.2.18-1.1
* libMagickCore-7_Q16HDRI10 7.1.2.18-1.1
* libMagickCore-7_Q16HDRI10-32bit 7.1.2.18-1.1
* libMagickWand-7_Q16HDRI10 7.1.2.18-1.1
* libMagickWand-7_Q16HDRI10-32bit 7.1.2.18-1.1
* perl-PerlMagick 7.1.2.18-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-32636.html
openSUSE-SU-2026:10440-1: moderate: jupyter-nbclassic-1.3.3-1.1 on GA media
# jupyter-nbclassic-1.3.3-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10440-1
Rating: moderate
Cross-References:
* CVE-2026-27601
CVSS scores:
* CVE-2026-27601 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-27601 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the jupyter-nbclassic-1.3.3-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* jupyter-nbclassic 1.3.3-1.1
* python311-nbclassic 1.3.3-1.1
* python313-nbclassic 1.3.3-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-27601.html
openSUSE-SU-2026:10445-1: moderate: traefik2-2.11.42-1.1 on GA media
# traefik2-2.11.42-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10445-1
Rating: moderate
Cross-References:
* CVE-2026-32305
* CVE-2026-32595
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the traefik2-2.11.42-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* traefik2 2.11.42-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-32305.html
* https://www.suse.com/security/cve/CVE-2026-32595.html
openSUSE-SU-2026:10442-1: moderate: dovecot24-2.4.3-1.1 on GA media
# dovecot24-2.4.3-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10442-1
Rating: moderate
Cross-References:
* CVE-2025-59028
* CVE-2025-59031
* CVE-2025-59032
* CVE-2026-24031
* CVE-2026-27855
* CVE-2026-27856
* CVE-2026-27857
* CVE-2026-27858
* CVE-2026-27859
* CVE-2026-27860
CVSS scores:
* CVE-2025-59028 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-59031 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-59031 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-59032 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59032 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-24031 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
* CVE-2026-24031 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2026-27855 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2026-27855 ( SUSE ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-27856 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-27856 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-27857 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-27857 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-27858 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-27858 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-27859 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-27859 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-27860 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-27860 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 10 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the dovecot24-2.4.3-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* dovecot24 2.4.3-1.1
* dovecot24-backend-mysql 2.4.3-1.1
* dovecot24-backend-pgsql 2.4.3-1.1
* dovecot24-backend-sqlite 2.4.3-1.1
* dovecot24-devel 2.4.3-1.1
* dovecot24-fts 2.4.3-1.1
* dovecot24-fts-flatcurve 2.4.3-1.1
* dovecot24-fts-solr 2.4.3-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-59028.html
* https://www.suse.com/security/cve/CVE-2025-59031.html
* https://www.suse.com/security/cve/CVE-2025-59032.html
* https://www.suse.com/security/cve/CVE-2026-24031.html
* https://www.suse.com/security/cve/CVE-2026-27855.html
* https://www.suse.com/security/cve/CVE-2026-27856.html
* https://www.suse.com/security/cve/CVE-2026-27857.html
* https://www.suse.com/security/cve/CVE-2026-27858.html
* https://www.suse.com/security/cve/CVE-2026-27859.html
* https://www.suse.com/security/cve/CVE-2026-27860.html
openSUSE-SU-2026:10444-1: moderate: traefik-3.6.12-1.1 on GA media
# traefik-3.6.12-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10444-1
Rating: moderate
Cross-References:
* CVE-2026-32305
* CVE-2026-32595
* CVE-2026-32695
Affected Products:
* openSUSE Tumbleweed
An update that solves 3 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the traefik-3.6.12-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* traefik 3.6.12-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-32305.html
* https://www.suse.com/security/cve/CVE-2026-32595.html
* https://www.suse.com/security/cve/CVE-2026-32695.html
openSUSE-SU-2026:10441-1: moderate: strongswan-6.0.5-1.1 on GA media
# strongswan-6.0.5-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10441-1
Rating: moderate
Cross-References:
* CVE-2026-25075
CVSS scores:
* CVE-2026-25075 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25075 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the strongswan-6.0.5-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* strongswan 6.0.5-1.1
* strongswan-doc 6.0.5-1.1
* strongswan-fips 6.0.5-1.1
* strongswan-ipsec 6.0.5-1.1
* strongswan-mysql 6.0.5-1.1
* strongswan-nm 6.0.5-1.1
* strongswan-sqlite 6.0.5-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-25075.html
openSUSE-SU-2026:10439-1: moderate: plexus-utils-4.0.2-2.1 on GA media
# plexus-utils-4.0.2-2.1 on GA media
Announcement ID: openSUSE-SU-2026:10439-1
Rating: moderate
Cross-References:
* CVE-2025-67030
CVSS scores:
* CVE-2025-67030 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-67030 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the plexus-utils-4.0.2-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* plexus-utils 4.0.2-2.1
* plexus-utils-javadoc 4.0.2-2.1
## References:
* https://www.suse.com/security/cve/CVE-2025-67030.html
openSUSE-SU-2026:10438-1: moderate: openbao-2.5.2-1.1 on GA media
# openbao-2.5.2-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10438-1
Rating: moderate
Cross-References:
* CVE-2026-33757
* CVE-2026-33758
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the openbao-2.5.2-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* openbao 2.5.2-1.1
* openbao-agent 2.5.2-1.1
* openbao-cassandra-database-plugin 2.5.2-1.1
* openbao-influxdb-database-plugin 2.5.2-1.1
* openbao-mysql-database-plugin 2.5.2-1.1
* openbao-mysql-legacy-database-plugin 2.5.2-1.1
* openbao-postgresql-database-plugin 2.5.2-1.1
* openbao-server 2.5.2-1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-33757.html
* https://www.suse.com/security/cve/CVE-2026-33758.html
openSUSE-SU-2026:0110-1: important: Security update for perl-Crypt-URandom
openSUSE Security Update: Security update for perl-Crypt-URandom
_______________________________
Announcement ID: openSUSE-SU-2026:0110-1
Rating: important
References: #1258266
Cross-References: CVE-2026-2474
CVSS scores:
CVE-2026-2474 (SUSE): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that fixes one vulnerability is now available.
Description:
This update for perl-Crypt-URandom fixes the following issues:
- updated to 0.550.0 (0.55) see
/usr/share/doc/packages/perl-Crypt-URandom/Changes 0.55 Tue Feb 17
07:01:43 2026
- Fix for sysread/read failures. Thanks to Miha Purg for GH#20
- Fix for test suite failures on STDOUT encoding. Thanks to Lukas
Mai for GH#19
- CVE-2026-2474: Fix for heap buffer overflow in the XS function
crypt_urandom_getrandom() (boo#1258266)
- updated to 0.540.0 (0.54) see
/usr/share/doc/packages/perl-Crypt-URandom/Changes 0.54 Sat Mar 15
20:37:13 2025
- Reverse solaris changes and remove errstr checks. Thanks to
eserte for GH#18
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2026-110=1
Package List:
- openSUSE Backports SLE-15-SP7 (aarch64 i586 ppc64le s390x x86_64):
perl-Crypt-URandom-0.550.0-bp157.2.3.1
References:
https://www.suse.com/security/cve/CVE-2026-2474.html
https://bugzilla.suse.com/1258266