SUSE-SU-2026:1205-1: important: Security update for govulncheck-vulndb
SLE-UPDATES
null at suse.de
Tue Apr 7 20:30:15 UTC 2026
# Security update for govulncheck-vulndb
Announcement ID: SUSE-SU-2026:1205-1
Release Date: 2026-04-07T14:18:21Z
Rating: important
References:
* jsc#PED-11136
Cross-References:
* CVE-2026-26060
* CVE-2026-26061
* CVE-2026-26233
* CVE-2026-27018
* CVE-2026-29180
* CVE-2026-32241
* CVE-2026-32286
* CVE-2026-32695
* CVE-2026-33026
* CVE-2026-33027
* CVE-2026-33028
* CVE-2026-33029
* CVE-2026-33030
* CVE-2026-33032
* CVE-2026-33186
* CVE-2026-33433
* CVE-2026-33487
* CVE-2026-33634
* CVE-2026-33747
* CVE-2026-33748
* CVE-2026-33903
* CVE-2026-33904
* CVE-2026-33906
* CVE-2026-33907
* CVE-2026-33990
* CVE-2026-33997
* CVE-2026-34040
* CVE-2026-34041
* CVE-2026-34042
* CVE-2026-34204
* CVE-2026-34385
* CVE-2026-34386
* CVE-2026-34388
* CVE-2026-34389
CVSS scores:
* CVE-2026-26060 ( NVD ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-26060 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-26061 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-26061 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-26233 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-26233 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-27018 ( NVD ): 7.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-29180 ( NVD ): 4.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-29180 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-32241 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-32286 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-32286 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-32286 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-32695 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-32695 ( NVD ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2026-33026 ( NVD ): 9.4
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33026 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-33027 ( NVD ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33027 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33028 ( NVD ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33028 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33029 ( NVD ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33029 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33029 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33030 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-33030 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-33032 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33186 ( SUSE ): 8.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2026-33186 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33186 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33433 ( SUSE ): 5.1
CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N
* CVE-2026-33433 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
* CVE-2026-33433 ( NVD ): 5.1
CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33433 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33487 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-33634 ( SUSE ): 9.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2026-33634 ( SUSE ): 9.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-33634 ( NVD ): 9.4
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33634 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33747 ( SUSE ): 8.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-33747 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33747 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33747 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33748 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-33748 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-33748 ( NVD ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33903 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33904 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33906 ( NVD ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-33907 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-33990 ( NVD ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-33990 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2026-33997 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2026-33997 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2026-34040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-34040 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2026-34041 ( NVD ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34041 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-34042 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
* CVE-2026-34204 ( NVD ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34204 ( NVD ): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-34385 ( NVD ): 6.2
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34386 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34386 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-34388 ( NVD ): 6.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34388 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-34389 ( NVD ): 4.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-34389 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Leap 15.6
An update that solves 34 vulnerabilities and contains one feature can now be
installed.
## Description:
This update for govulncheck-vulndb fixes the following issues:
Update to version 0.0.20260402T184258 2026-04-02T18:42:58Z (jsc#PED-11136).
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2026-4518 CVE-2026-32286 GHSA-jqcq-xjh3-6g23
* GO-2026-4753 CVE-2026-33487 GHSA-479m-364c-43vc
* GO-2026-4760 GHSA-hwqm-qvj9-4jr2
* GO-2026-4762 CVE-2026-33186 GHSA-p77j-4mvh-x3m3
* GO-2026-4764 GHSA-pcgw-qcv5-h8ch
* GO-2026-4858 CVE-2026-33747 GHSA-4c29-8rgm-jvjj
* GO-2026-4859 CVE-2026-33748 GHSA-4vrq-3vrq-g6gg
* GO-2026-4863 GHSA-g9ww-x58f-9g6m
* GO-2026-4872 CVE-2026-33907 GHSA-55q8-2gwx-29pc
* GO-2026-4873 CVE-2026-33906 GHSA-87j9-m7x6-hvw2
* GO-2026-4874 CVE-2026-33904 GHSA-9h59-p45g-445h
* GO-2026-4875 CVE-2026-33903 GHSA-f2f3-9cx3-wcmf
* GO-2026-4876 GHSA-prh4-vhfh-24mj
* GO-2026-4880 CVE-2026-32695 GHSA-67jx-r9pv-98rj
* GO-2026-4883 CVE-2026-33997 GHSA-pxq6-2prw-chj9
* GO-2026-4887 CVE-2026-34040 GHSA-x744-4wpc-v9h2
* GO-2026-4888 CVE-2026-26060 GHSA-3458-r943-hmx4
* GO-2026-4889 CVE-2026-26061 GHSA-99hj-44vg-hfcp
* GO-2026-4890 CVE-2026-34042 GHSA-x34h-54cw-9825
* GO-2026-4891 CVE-2026-34041 GHSA-xmgr-9pqc-h5vw
* GO-2026-4892 CVE-2026-29180 GHSA-m2h6-4xpq-qw3m
* GO-2026-4893 CVE-2026-33433 GHSA-qr99-7898-vr7c
* GO-2026-4894 CVE-2026-32241 GHSA-vchx-5pr6-ffx2
* GO-2026-4896 CVE-2026-34204 GHSA-3rh2-v3gr-35p9
* GO-2026-4897 GHSA-46wh-3698-f2cx
* GO-2026-4899 GHSA-c279-989m-238f
* GO-2026-4901 CVE-2026-33030 GHSA-5hf2-vhj6-gj9m
* GO-2026-4902 CVE-2026-33029 GHSA-cp8r-8jvw-v3qg
* GO-2026-4903 CVE-2026-33026 GHSA-fhh2-gg7w-gwpq
* GO-2026-4904 CVE-2026-33032 GHSA-h6c2-x2m2-mwhf
* GO-2026-4905 CVE-2026-27018 GHSA-jjwv-57xh-xr6r
* GO-2026-4906 CVE-2026-33028 GHSA-m468-xcm6-fxg4
* GO-2026-4907 CVE-2026-33027 GHSA-m8p8-53vf-8357
* GO-2026-4911 CVE-2026-33990 GHSA-x2f5-332j-9xwq
* GO-2026-4912 CVE-2026-34389 GHSA-4f9r-x588-pp2h
* GO-2026-4913 CVE-2026-34386 GHSA-9p23-p2m4-2r4m
* GO-2026-4914 CVE-2026-34385 GHSA-v895-833r-8c45
* GO-2026-4915 CVE-2026-34388 GHSA-w254-4hp5-7cvv
* GO-2026-4916 CVE-2026-26233 GHSA-247x-7qw8-fp98
* GO-2026-4919 CVE-2026-33634 GHSA-69fq-xp46-6x23
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1205=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* govulncheck-vulndb-0.0.20260402T184258-150000.1.158.1
## References:
* https://www.suse.com/security/cve/CVE-2026-26060.html
* https://www.suse.com/security/cve/CVE-2026-26061.html
* https://www.suse.com/security/cve/CVE-2026-26233.html
* https://www.suse.com/security/cve/CVE-2026-27018.html
* https://www.suse.com/security/cve/CVE-2026-29180.html
* https://www.suse.com/security/cve/CVE-2026-32241.html
* https://www.suse.com/security/cve/CVE-2026-32286.html
* https://www.suse.com/security/cve/CVE-2026-32695.html
* https://www.suse.com/security/cve/CVE-2026-33026.html
* https://www.suse.com/security/cve/CVE-2026-33027.html
* https://www.suse.com/security/cve/CVE-2026-33028.html
* https://www.suse.com/security/cve/CVE-2026-33029.html
* https://www.suse.com/security/cve/CVE-2026-33030.html
* https://www.suse.com/security/cve/CVE-2026-33032.html
* https://www.suse.com/security/cve/CVE-2026-33186.html
* https://www.suse.com/security/cve/CVE-2026-33433.html
* https://www.suse.com/security/cve/CVE-2026-33487.html
* https://www.suse.com/security/cve/CVE-2026-33634.html
* https://www.suse.com/security/cve/CVE-2026-33747.html
* https://www.suse.com/security/cve/CVE-2026-33748.html
* https://www.suse.com/security/cve/CVE-2026-33903.html
* https://www.suse.com/security/cve/CVE-2026-33904.html
* https://www.suse.com/security/cve/CVE-2026-33906.html
* https://www.suse.com/security/cve/CVE-2026-33907.html
* https://www.suse.com/security/cve/CVE-2026-33990.html
* https://www.suse.com/security/cve/CVE-2026-33997.html
* https://www.suse.com/security/cve/CVE-2026-34040.html
* https://www.suse.com/security/cve/CVE-2026-34041.html
* https://www.suse.com/security/cve/CVE-2026-34042.html
* https://www.suse.com/security/cve/CVE-2026-34204.html
* https://www.suse.com/security/cve/CVE-2026-34385.html
* https://www.suse.com/security/cve/CVE-2026-34386.html
* https://www.suse.com/security/cve/CVE-2026-34388.html
* https://www.suse.com/security/cve/CVE-2026-34389.html
* https://jira.suse.com/browse/PED-11136
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20260407/27d5b825/attachment.htm>
More information about the sle-updates
mailing list