ESB-2026.4367 PUBLISHED CVSS 8.600000381469727 HIGH

=========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2026.4367 Security update for bouncycastle 29 April 2026 =========================================================================== AUSCERT Security Bulletin Summary --------------------------------- Product: bouncycastle Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2025-14813 CVE-2026-0636 CVE-2026-3505 CVE-2026-5588 CVE-2026-5598 Original Bulletin: https://www.suse.com/support/update/announcement/2026/suse-su-20261639-1 Comment: CVSS (Max): 8.6 CVE-2026-5598 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L EPSS (Max): 0.1% (19th) CVE-2026-0636 2026-04-28 - --------------------------BEGIN INCLUDED TEXT-------------------- Security update for bouncycastle Announcement ID: SUSE-SU-2026:1639-1 Release Date: 2026-04-28T11:10:38Z Rating: important o bsc#1262225 o bsc#1262226 References: o bsc#1262227 o bsc#1262228 o bsc#1262232 o CVE-2025-14813 o CVE-2026-0636 Cross-References: o CVE-2026-3505 o CVE-2026-5588 o CVE-2026-5598 o CVE-2025-14813 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N /UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N o CVE-2025-14813 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N /S:U/C:H/I:L/A:L o CVE-2025-14813 ( NVD ): 9.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/ UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/ MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/ MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:M/U:Red o CVE-2026-0636 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/ UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N o CVE-2026-0636 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/ S:U/C:L/I:N/A:N o CVE-2026-0636 ( NVD ): 5.5 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/ UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/ MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/ MSI:X/MSA:X/S:N/AU:Y/R:A/V:X/RE:M/U:Amber o CVE-2026-3505 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/ UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-3505 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/ S:U/C:N/I:N/A:H CVSS scores: o CVE-2026-3505 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/ UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/ MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/ MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X o CVE-2026-5588 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/ UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N o CVE-2026-5588 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/ S:U/C:L/I:N/A:N o CVE-2026-5588 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/ UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/ MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/ MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Amber o CVE-2026-5598 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/ UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N o CVE-2026-5598 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/ S:U/C:H/I:L/A:L o CVE-2026-5598 ( NVD ): 8.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/ UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:U/CR:X/IR:X/AR:X/ MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/ MSI:X/MSA:X/S:P/AU:Y/R:X/V:X/RE:X/U:Red o Development Tools Module 15-SP7 o SUSE Linux Enterprise Desktop 15 SP7 o SUSE Linux Enterprise High Performance Computing 15 SP4 o SUSE Linux Enterprise High Performance Computing 15 SP5 o SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 o SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 o SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 o SUSE Linux Enterprise High Performance Computing LTSS 15 Affected SP5 Products: o SUSE Linux Enterprise Real Time 15 SP7 o SUSE Linux Enterprise Server 15 SP4 o SUSE Linux Enterprise Server 15 SP4 LTSS o SUSE Linux Enterprise Server 15 SP5 o SUSE Linux Enterprise Server 15 SP5 LTSS o SUSE Linux Enterprise Server 15 SP6 o SUSE Linux Enterprise Server 15 SP6 LTSS o SUSE Linux Enterprise Server 15 SP7 o SUSE Linux Enterprise Server for SAP Applications 15 SP4 o SUSE Linux Enterprise Server for SAP Applications 15 SP5 o SUSE Linux Enterprise Server for SAP Applications 15 SP6 o SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves five vulnerabilities can now be installed. Description: This update for bouncycastle fixes the following issues: Update to version 1.84. Security issues fixed: o CVE-2025-14813: GOSTCTR implementation unable to process more than 255 blocks correctly (bsc#1262225). o CVE-2026-0636: LDAP injection in LDAPStoreHelper.java leads to information disclosure (bsc#1262226). o CVE-2026-3505: unbounded PGP AEAD chunk size leads to pre-auth resource exhaustion (bsc#1262232). o CVE-2026-5588: PKIX draft CompositeVerifier accepts empty signature sequence as valid (bsc#1262228). o CVE-2026-5598: non-constant time comparisons risks private key leakage in FrodoKEM (bsc#1262227). Other updates and bugfixes: o Version 1.84: o In line with JVM changes, KEM support has been backported to Java 17. o BCJSSE: Configurable (client) early key_share groups via BCSSLParameters.earlyKeyShares or 'org.bouncycastle.jsse.client.earlyKeyShares' system property. o BCJSSE: Support for curveSM2MLKEM768 hybrid NamedGroup in TLS 1.3 per draft-yang-tls-hybrid-sm2-mlkem-03. o BCJSSE: Log when default cipher suites are disabled. o BCJSSE: Experimental support for ShangMi crypto in TLS 1.3 per RFC 8998 (not enabled by default). o CMS: Added CMSAuthEnvelopedDataStreamGenerator.open taking an explicit content type. o HKDF: Provider support for HKDFParameterSpec.Expand. o Added initial support for RFC 9380 (Hashing to Elliptic Curves); see org.bouncycastle.crypto.hash2curve . o PKCS12: Added default max iteration count of 5,000,000 (configurable via 'org.bouncycastle.pkcs12.max_it_count' property). o TLS: Use javax.crypto.KEM API (when available) to access ML-KEM implementation (incl. hybrids). o A new KeyStore, PKCS12-PBMAC1, has been added which defaults to using PBMAC1 and supports RFC 9879. o A new property 'org.bouncycastle.asn1.max_cons_depth' has been added to allow setting of the maximum nesting for SETs/SEQUENCESs in ASN.1. Default is 32. o A new property 'org.bouncycastle.asn1.max_limit' has been added to allow setting of the stream size of ASN.1 encodings. The value can be either in bytes, or appended with k (1 kilobyte blocks), m (1 megabyte blocks), or g (1 gigabyte blocks). o Added NTRU+ support to the lightweight PQC API and the BCPQC provider. o Added SM4 key wrap/unwrap mode, SM2 key exchange, and logging to SM2Signer. o OpenPGP: Added encryption-key filtering by purpose, a new OpenPGPKey constructor, KeyPassphraseProvider-based passphrase change, wildcard (anonymous) recipient handling, and Web-of-Trust methods for third-party signature chains and delegations. o CMSSignedDataStreamGenerator can now support the generation of DER/DL encoded SignedData objects (note memory restrictions still apply). o It is now possible to add extra digest alorithm IDs to CMSSignedDataStreamGenerator when required. o Random numbers being generated for DSTU4145 signature calculations were 1 bit shorter than they could be. The code has been corrected to allow the generated numbers to occupy the full numeric range available. o HKDF implementation has been corrected to use multiple IKMs if available. o CompositePublic/PrivateKey builders had an issue identifying brainpool and EdDSA curves from the algorithm names due to an error in the OID mapping table. This has been fixed. o S/MIME: Fix AuthEnveloped support for AES192/GCM and AES256/GCM. o CMS: Use implicit tag for AuthEnvelopedData.authEncryptedContentInfo.encryptedContent. o Fixed Strings.split to handle delimiters at position 0. o Fixed FrodoKEM error sampling to be constant-time. o Fixed PKIXNameConstraintValidator to treat a DNS name as intersecting itself. o Fixed PKCS12 key stores not calling getInstance with the original provider (which was forcing provider registration). o A resource leak due to the SMIMESigned constructor leaving background threads hanging on MessagingException has been fixed. o OpenPGP: Fixed an issue where a custom signature creation time was ignored when generating message signatures. o OpenPGP: Fixed SKESK encoding for direct-S2K-encrypted messages. o Version 1.83: o Attempting to check a password on a stripped PGP would throw an exception. Checking the password on such a key will now always return false. o Fixed an issue in KangarooTwelve where premature absorption caused erroneous 168-byte padding; absorption is now delayed so correct final-byte padding is applied. o BCJSSE: Fix supported_versions creation for renegotiation handshake. o (D)TLS: Reneg info now oly offered with pre-1.3. o A generic "COMPOSITE" algorithm name has been added as a JCA Signature algorithm. The algorithm will identify the composite signature to use from the composite key passed in. o The composite signatures implementation has been updated to the final draft and now follows the submitted standard. o Support for the generation and use as trust anchors has been added for certificate signatures with id-alg-unsigned as the signature type. o Support for CMP direct POP for encryption keys using challenge/response has been added to the CMP/CRMF APIs. o Support for SupportedCurves attribute to the BC provider o BCJSSE: Added support for SLH-DSA signature schemes in TLS 1.3 per draft-reddy-tls-slhdsa-01. o Support has been added for the Java 25 KDF API (current algorithms, PBKDF2, SCRYPT, and HKDF). o Support for composite signatures is now included in CMS and timestamping. o It is now possible to disable the Lenstra check in RSA where the public key is not available via the system/security property "org.bouncycastle.rsa.no_lenstra_check". o Version 1.82: o SNOVA and MAYO are now correctly added to the JCA provider module-info file. o TLS: Avoid nonce reuse error in JCE AEAD workaround for pre-Java7. o BCJSSE: Session binding map is now shared across all stages of the session lifecycle (SunJSSE compatibility). o The CMCEPrivateKeyParameters#reconstructPublicKey method was returning an empty byte array. It now returns an encoding of the public key. o CBZip2InputStream no longer auto-closes at end-of-contents. o The BC CertPath implementation was eliminating certificates on the bases of the Key-ID. This is not in accordance with RFC 4158. o Support for the previous set of libOQS Falcon OIDs has been restored. o The BC CipherInputStream could throw an exception if asked to handle an AEAD stream consisting of the MAC only. o Some KeyAgreement classes were missing in the Java 11 class hierarchy. o Fix typo in a constant name in the HPKE class and deprecate the old constant. o Fuzzing analysis has been done on the OpenPGP API and additional code has been added to prevent escaping exceptions. o SHA3Digest, CSHAKE, TupleHash, KMAC now provide support for Memoable and EncodableService. o BCJSSE: Added support for integrity-only cipher suites in TLS 1.3 per RFC 9150. o BCJSSE: Added support for system properties "jdk.tls. {client,server}.maxInboundCertificateChainLength" o BCJSSE: Added support for ML-DSA signature schemes in TLS 1.3 per draft-ietf-tls-mldsa-00. o The Composite post-quantum signatures implementation has been updated to the latest draft (07) draft-ietf-lamps-pq-composite-sigs. o "_PREHASH" implementations are now provided for all composite signatures to allow the hash of the date to be used instead of the actual data in signature calculation. o The gradle build can now be used to generate an Bill of Materials (BOM) file. o It is now possible to configure the SignerInfoVerifierBuilder used by the SignedMailValidator class. o The Ascon family of algorithms has been updated with the latest published changes. o Composite signature keys can now be constructed from the individual keys of the algorithms composing the composite. o PGPSecretKey, PGPSignatureGenerator now support version 6. o Further optimisation work has been done on ML-KEM public key validation. o Zeroization of passwords in the JCA PKCS12 key store has been improved. o The "org.bouncycastle.drbg.effective_256bits_entropy" property has been added for platforms where the entropy source is not producing 1 full bit of entropy per bit and additional bits are required (default value 282). o OpenPGPKeyGenerator now allows for the use of empty UserIDs (version 4 compatibility). o The HQC KEM has been updated with the latest draft updates. o The legacy post-quantum package has now been removed. o Version 1.81: o A potention NullPointerException in the KEM KDF KemUtil class has been removed. o Overlapping input/output buffers in doFinal could result in data corruption. o Fixed Grain-128AEAD decryption incorrectly handle MAC verification. o Add configurable header validation to prevent malicious header injection in PGP cleartext signed messages; Fix signature packet encoding issues in PGPSignature.join() and embedded signatures while phasing out legacy format. o Fixed ParallelHash initialization stall when using block size B=0. o The PRF from the PBKDF2 function was been lost when PBMAC1 was initialized from protectionAlgorithm. This has been fixed. o The lowlevel DigestFactory was cloning MD5 when being asked to clone SHA1. o XWing implementation updated to draft-connolly-cfrg-xwing-kem/07/ o Further support has been added for generation and use of PGP V6 keys o Additional validation has been added for armored headers in Cleartext Signed Messages. o The PQC signature algorithm proposal Mayo has been added to the low-level API and the BCPQC provider. o The PQC signature algorithm proposal Snova has been added to the low-level API and the BCPQC provider. o Support for ChaCha20-Poly1305 has been added to the CMS/SMIME APIs. o The Falcon implementation has been updated to the latest draft. o Support has been added for generating keys which encode as seed-only and expanded-key-only for ML-KEM and ML-DSA private keys. o Private key encoding of ML-DSA and ML-KEM private keys now follows the latest IETF draft. o The Ascon family of algorithms has been updated to the initial draft of SP 800-232. Some additional optimisation work has been done. o Support for ML-DSA's external-mu calculation and signing has been added to the BC provider. o CMS now supports ML-DSA for SignedData generation. o Introduce high-level OpenPGP API for message creation/consumption and certificate evaluation. o Added JDK21 KEM API implementation for HQC algorithm. o BCJSSE: Strip trailing dot from hostname for SNI, endpointID checks. o BCJSSE: Draft support for ML-KEM updated (draft-connolly-tls-mlkem-key-agreement-05). o BCJSSE: Draft support for hybrid ECDHE-MLKEM (draft-ietf-tls-ecdhe-mlkem-00). o BCJSSE: Optionally prefer TLS 1.3 server's supported_groups order (BCSSLParameters.useNamedGroupsOrder). o Version 1.80: o A splitting issue for ML-KEM led to an incorrect size for kemct in KEMRecipientInfos. This has been fixed. o The PKCS12 KeyStore has been adjusted to prevent accidental doubling of the Oracle trusted certificate attribute (results in an IOException when used with the JVM PKCS12 implementation). o The SignerInfoGenerator copy constructor was ignoring the certHolder field. o The getAlgorithm() method return value for a CompositePrivateKey was not consistent with the corresponding getAlgorithm() return value for the CompositePrivateKey. This has been fixed. o The international property files were missing from the bcjmail distribution. o Issues with ElephantEngine failing on processing large/multi-block messages have been addressed. o GCFB mode now fully resets on a reset. o The lightweight algorithm contestants: Elephant, ISAP, PhotonBeetle, Xoodyak now support the use of the AEADParameters class and provide accurate update/doFinal output lengths. o An unnecessary downcast in CertPathValidatorUtilities was resulting in the ignoring of URLs for FTP based CRLs. o A regression in the OpenPGP API could cause NoSuchAlgorithmException to be thrown when attempting to use SHA-256 in some contexts. o EtsiTs1029411TypesAuthorization was missing an extension field. o Interoperability issues with single depth LMS keys have been addressed. o CompositeSignatures now updated to draft-ietf-lamps-pq-composite-sigs-03. o ML-KEM, ML-DSA, SLH-DSA, and Composite private keys now use raw encodings as per the latest drafts from IETF 121: draft-ietf-lamps-kyber-certificates-06, draft-ietf-lamps-dilithium-certificates-05, and draft-ietf-lamps-x509-slhdsa. o Initial support has been added for RFC 9579 PBMAC1 in the PKCS API. o Support has been added for EC-JPAKE to the lightweight API. o Support has been added for the direct construction of S/MIME AuthEnvelopedData objects, via the SMIMEAuthEnvelopedData class. o An override "org.bouncycastle.asn1.allow_wrong_oid_enc" property has been added to disable new OID encoding checks (use with caution). o Support has been added for the PBEParemeterSpec.getParameterSpec() method where supported by the JVM. o ML-DSA/SLH-DSA now return null for Signature.getParameters() if no context is provided. This allows the algorithms to be used with the existing Java key tool. o HQC has been updated to reflect the reference implementation released on 2024-10-30. o Support has been added to the low-level APIs for the OASIS Shamir Secret Splitting algorithms. o BCJSSE: System property "org.bouncycastle.jsse.fips.allowGCMCiphersIn12" no longer used. FIPS TLS 1.2 GCM suites can now be enabled according to JcaTlsCrypto#getFipsGCMNonceGeneratorFactory (see JavaDoc for details) if done in alignment with FIPS requirements. o Support has been added for OpenPGP V6 PKESK and message encryption. o PGPSecretKey.copyWithNewPassword() now includes AEAD support. o The ASCON family of algorithms have been updated in accordance with the published FIPS SP 800-232 draft. Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-1639=1 o SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1639=1 o SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1639=1 o SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1639=1 o SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1639=1 o SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1639=1 o SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1639=1 o SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1639=1 o SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1639=1 o SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1639=1 o SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1639=1 Package List: o Development Tools Module 15-SP7 (noarch) bouncycastle-1.84-150200.3.35.1 bouncycastle-pkix-1.84-150200.3.35.1 bouncycastle-util-1.84-150200.3.35.1 bouncycastle-pg-1.84-150200.3.35.1 o SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) bouncycastle-1.84-150200.3.35.1 bouncycastle-pkix-1.84-150200.3.35.1 bouncycastle-util-1.84-150200.3.35.1 bouncycastle-pg-1.84-150200.3.35.1 o SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) bouncycastle-1.84-150200.3.35.1 bouncycastle-pkix-1.84-150200.3.35.1 bouncycastle-util-1.84-150200.3.35.1 bouncycastle-pg-1.84-150200.3.35.1 o SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) bouncycastle-1.84-150200.3.35.1 bouncycastle-pkix-1.84-150200.3.35.1 bouncycastle-util-1.84-150200.3.35.1 bouncycastle-pg-1.84-150200.3.35.1 o SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) bouncycastle-1.84-150200.3.35.1 bouncycastle-pkix-1.84-150200.3.35.1 bouncycastle-util-1.84-150200.3.35.1 bouncycastle-pg-1.84-150200.3.35.1 o SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) bouncycastle-1.84-150200.3.35.1 bouncycastle-pkix-1.84-150200.3.35.1 bouncycastle-util-1.84-150200.3.35.1 bouncycastle-pg-1.84-150200.3.35.1 o SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) bouncycastle-1.84-150200.3.35.1 bouncycastle-pkix-1.84-150200.3.35.1 bouncycastle-util-1.84-150200.3.35.1 bouncycastle-pg-1.84-150200.3.35.1 o SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) bouncycastle-1.84-150200.3.35.1 bouncycastle-pkix-1.84-150200.3.35.1 bouncycastle-util-1.84-150200.3.35.1 bouncycastle-pg-1.84-150200.3.35.1 o SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) bouncycastle-1.84-150200.3.35.1 bouncycastle-pkix-1.84-150200.3.35.1 bouncycastle-util-1.84-150200.3.35.1 bouncycastle-pg-1.84-150200.3.35.1 o SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) bouncycastle-1.84-150200.3.35.1 bouncycastle-pkix-1.84-150200.3.35.1 bouncycastle-util-1.84-150200.3.35.1 bouncycastle-pg-1.84-150200.3.35.1 o SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) bouncycastle-1.84-150200.3.35.1 bouncycastle-pkix-1.84-150200.3.35.1 bouncycastle-util-1.84-150200.3.35.1 bouncycastle-pg-1.84-150200.3.35.1 References: o https://www.suse.com/security/cve/CVE-2025-14813.html o https://www.suse.com/security/cve/CVE-2026-0636.html o https://www.suse.com/security/cve/CVE-2026-3505.html o https://www.suse.com/security/cve/CVE-2026-5588.html o https://www.suse.com/security/cve/CVE-2026-5598.html o https://bugzilla.suse.com/show_bug.cgi?id=1262225 o https://bugzilla.suse.com/show_bug.cgi?id=1262226 o https://bugzilla.suse.com/show_bug.cgi?id=1262227 o https://bugzilla.suse.com/show_bug.cgi?id=1262228 o https://bugzilla.suse.com/show_bug.cgi?id=1262232 - --------------------------END INCLUDED TEXT---------------------- You have received this e-mail bulletin as a result of your organisation's registration with AUSCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AUSCERT's members. As AUSCERT did not write the document quoted above, AUSCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AUSCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://portal.auscert.org.au/bulletins/ =========================================================================== AUSCERT The University of Queensland, Brisbane QLD 4072 Australia e: auscert@auscert.org.au t: +61 (0)7 3365 4417 Allies in Cyber Security ===========================================================================

Risk Scores

CVSS v3.1
8.600000381469727
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

Affected Products

VendorProductVersions
SUSEbouncycastle

Timeline

References

Open in Interactive Console →