ESB-2026.4367
PUBLISHED
CVSS 8.600000381469727 HIGH
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2026.4367
Security update for bouncycastle
29 April 2026
===========================================================================
AUSCERT Security Bulletin Summary
---------------------------------
Product: bouncycastle
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2025-14813 CVE-2026-0636 CVE-2026-3505
CVE-2026-5588 CVE-2026-5598
Original Bulletin:
https://www.suse.com/support/update/announcement/2026/suse-su-20261639-1
Comment: CVSS (Max): 8.6 CVE-2026-5598 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)
CVSS Source: SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
EPSS (Max): 0.1% (19th) CVE-2026-0636 2026-04-28
- --------------------------BEGIN INCLUDED TEXT--------------------
Security update for bouncycastle
Announcement ID: SUSE-SU-2026:1639-1
Release Date: 2026-04-28T11:10:38Z
Rating: important
o bsc#1262225
o bsc#1262226
References: o bsc#1262227
o bsc#1262228
o bsc#1262232
o CVE-2025-14813
o CVE-2026-0636
Cross-References: o CVE-2026-3505
o CVE-2026-5588
o CVE-2026-5598
o CVE-2025-14813 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N
/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N
o CVE-2025-14813 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N
/S:U/C:H/I:L/A:L
o CVE-2025-14813 ( NVD ): 9.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/
UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/
MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/
MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:M/U:Red
o CVE-2026-0636 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/
UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
o CVE-2026-0636 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/
S:U/C:L/I:N/A:N
o CVE-2026-0636 ( NVD ): 5.5 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/
UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/
MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/
MSI:X/MSA:X/S:N/AU:Y/R:A/V:X/RE:M/U:Amber
o CVE-2026-3505 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/
UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-3505 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/
S:U/C:N/I:N/A:H
CVSS scores: o CVE-2026-3505 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/
UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/
MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/
MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
o CVE-2026-5588 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/
UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
o CVE-2026-5588 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/
S:U/C:L/I:N/A:N
o CVE-2026-5588 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/
UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/
MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/
MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Amber
o CVE-2026-5598 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/
UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N
o CVE-2026-5598 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/
S:U/C:H/I:L/A:L
o CVE-2026-5598 ( NVD ): 8.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/
UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:U/CR:X/IR:X/AR:X/
MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/
MSI:X/MSA:X/S:P/AU:Y/R:X/V:X/RE:X/U:Red
o Development Tools Module 15-SP7
o SUSE Linux Enterprise Desktop 15 SP7
o SUSE Linux Enterprise High Performance Computing 15 SP4
o SUSE Linux Enterprise High Performance Computing 15 SP5
o SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4
o SUSE Linux Enterprise High Performance Computing ESPOS 15
SP5
o SUSE Linux Enterprise High Performance Computing LTSS 15
SP4
o SUSE Linux Enterprise High Performance Computing LTSS 15
Affected SP5
Products: o SUSE Linux Enterprise Real Time 15 SP7
o SUSE Linux Enterprise Server 15 SP4
o SUSE Linux Enterprise Server 15 SP4 LTSS
o SUSE Linux Enterprise Server 15 SP5
o SUSE Linux Enterprise Server 15 SP5 LTSS
o SUSE Linux Enterprise Server 15 SP6
o SUSE Linux Enterprise Server 15 SP6 LTSS
o SUSE Linux Enterprise Server 15 SP7
o SUSE Linux Enterprise Server for SAP Applications 15 SP4
o SUSE Linux Enterprise Server for SAP Applications 15 SP5
o SUSE Linux Enterprise Server for SAP Applications 15 SP6
o SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves five vulnerabilities can now be installed.
Description:
This update for bouncycastle fixes the following issues:
Update to version 1.84.
Security issues fixed:
o CVE-2025-14813: GOSTCTR implementation unable to process more than 255
blocks correctly (bsc#1262225).
o CVE-2026-0636: LDAP injection in LDAPStoreHelper.java leads to information
disclosure (bsc#1262226).
o CVE-2026-3505: unbounded PGP AEAD chunk size leads to pre-auth resource
exhaustion (bsc#1262232).
o CVE-2026-5588: PKIX draft CompositeVerifier accepts empty signature
sequence as valid (bsc#1262228).
o CVE-2026-5598: non-constant time comparisons risks private key leakage in
FrodoKEM (bsc#1262227).
Other updates and bugfixes:
o Version 1.84:
o In line with JVM changes, KEM support has been backported to Java 17.
o BCJSSE: Configurable (client) early key_share groups via
BCSSLParameters.earlyKeyShares or
'org.bouncycastle.jsse.client.earlyKeyShares' system property.
o BCJSSE: Support for curveSM2MLKEM768 hybrid NamedGroup in TLS 1.3 per
draft-yang-tls-hybrid-sm2-mlkem-03.
o BCJSSE: Log when default cipher suites are disabled.
o BCJSSE: Experimental support for ShangMi crypto in TLS 1.3 per RFC 8998
(not enabled by default).
o CMS: Added CMSAuthEnvelopedDataStreamGenerator.open taking an explicit
content type.
o HKDF: Provider support for HKDFParameterSpec.Expand.
o Added initial support for RFC 9380 (Hashing to Elliptic Curves); see
org.bouncycastle.crypto.hash2curve .
o PKCS12: Added default max iteration count of 5,000,000 (configurable via
'org.bouncycastle.pkcs12.max_it_count' property).
o TLS: Use javax.crypto.KEM API (when available) to access ML-KEM
implementation (incl. hybrids).
o A new KeyStore, PKCS12-PBMAC1, has been added which defaults to using
PBMAC1 and supports RFC 9879.
o A new property 'org.bouncycastle.asn1.max_cons_depth' has been added to
allow setting of the maximum nesting for SETs/SEQUENCESs in ASN.1. Default
is 32.
o A new property 'org.bouncycastle.asn1.max_limit' has been added to allow
setting of the stream size of ASN.1 encodings. The value can be either in
bytes, or appended with k (1 kilobyte blocks), m (1 megabyte blocks), or g
(1 gigabyte blocks).
o Added NTRU+ support to the lightweight PQC API and the BCPQC provider.
o Added SM4 key wrap/unwrap mode, SM2 key exchange, and logging to SM2Signer.
o OpenPGP: Added encryption-key filtering by purpose, a new OpenPGPKey
constructor, KeyPassphraseProvider-based passphrase change, wildcard
(anonymous) recipient handling, and Web-of-Trust methods for third-party
signature chains and delegations.
o CMSSignedDataStreamGenerator can now support the generation of DER/DL
encoded SignedData objects (note memory restrictions still apply).
o It is now possible to add extra digest alorithm IDs to
CMSSignedDataStreamGenerator when required.
o Random numbers being generated for DSTU4145 signature calculations were 1
bit shorter than they could be. The code has been corrected to allow the
generated numbers to occupy the full numeric range available.
o HKDF implementation has been corrected to use multiple IKMs if available.
o CompositePublic/PrivateKey builders had an issue identifying brainpool and
EdDSA curves from the algorithm names due to an error in the OID mapping
table. This has been fixed.
o S/MIME: Fix AuthEnveloped support for AES192/GCM and AES256/GCM.
o CMS: Use implicit tag for
AuthEnvelopedData.authEncryptedContentInfo.encryptedContent.
o Fixed Strings.split to handle delimiters at position 0.
o Fixed FrodoKEM error sampling to be constant-time.
o Fixed PKIXNameConstraintValidator to treat a DNS name as intersecting
itself.
o Fixed PKCS12 key stores not calling getInstance with the original provider
(which was forcing provider registration).
o A resource leak due to the SMIMESigned constructor leaving background
threads hanging on MessagingException has been fixed.
o OpenPGP: Fixed an issue where a custom signature creation time was ignored
when generating message signatures.
o OpenPGP: Fixed SKESK encoding for direct-S2K-encrypted messages.
o Version 1.83:
o Attempting to check a password on a stripped PGP would throw an exception.
Checking the password on such a key will now always return false.
o Fixed an issue in KangarooTwelve where premature absorption caused
erroneous 168-byte padding; absorption is now delayed so correct final-byte
padding is applied.
o BCJSSE: Fix supported_versions creation for renegotiation handshake.
o (D)TLS: Reneg info now oly offered with pre-1.3.
o A generic "COMPOSITE" algorithm name has been added as a JCA Signature
algorithm. The algorithm will identify the composite signature to use from
the composite key passed in.
o The composite signatures implementation has been updated to the final draft
and now follows the submitted standard.
o Support for the generation and use as trust anchors has been added for
certificate signatures with id-alg-unsigned as the signature type.
o Support for CMP direct POP for encryption keys using challenge/response has
been added to the CMP/CRMF APIs.
o Support for SupportedCurves attribute to the BC provider
o BCJSSE: Added support for SLH-DSA signature schemes in TLS 1.3 per
draft-reddy-tls-slhdsa-01.
o Support has been added for the Java 25 KDF API (current algorithms, PBKDF2,
SCRYPT, and HKDF).
o Support for composite signatures is now included in CMS and timestamping.
o It is now possible to disable the Lenstra check in RSA where the public key
is not available via the system/security property
"org.bouncycastle.rsa.no_lenstra_check".
o Version 1.82:
o SNOVA and MAYO are now correctly added to the JCA provider module-info
file.
o TLS: Avoid nonce reuse error in JCE AEAD workaround for pre-Java7.
o BCJSSE: Session binding map is now shared across all stages of the session
lifecycle (SunJSSE compatibility).
o The CMCEPrivateKeyParameters#reconstructPublicKey method was returning an
empty byte array. It now returns an encoding of the public key.
o CBZip2InputStream no longer auto-closes at end-of-contents.
o The BC CertPath implementation was eliminating certificates on the bases of
the Key-ID. This is not in accordance with RFC 4158.
o Support for the previous set of libOQS Falcon OIDs has been restored.
o The BC CipherInputStream could throw an exception if asked to handle an
AEAD stream consisting of the MAC only.
o Some KeyAgreement classes were missing in the Java 11 class hierarchy.
o Fix typo in a constant name in the HPKE class and deprecate the old
constant.
o Fuzzing analysis has been done on the OpenPGP API and additional code has
been added to prevent escaping exceptions.
o SHA3Digest, CSHAKE, TupleHash, KMAC now provide support for Memoable and
EncodableService.
o BCJSSE: Added support for integrity-only cipher suites in TLS 1.3 per RFC
9150.
o BCJSSE: Added support for system properties "jdk.tls.
{client,server}.maxInboundCertificateChainLength"
o BCJSSE: Added support for ML-DSA signature schemes in TLS 1.3 per
draft-ietf-tls-mldsa-00.
o The Composite post-quantum signatures implementation has been updated to
the latest draft (07) draft-ietf-lamps-pq-composite-sigs.
o "_PREHASH" implementations are now provided for all composite signatures to
allow the hash of the date to be used instead of the actual data in
signature calculation.
o The gradle build can now be used to generate an Bill of Materials (BOM)
file.
o It is now possible to configure the SignerInfoVerifierBuilder used by the
SignedMailValidator class.
o The Ascon family of algorithms has been updated with the latest published
changes.
o Composite signature keys can now be constructed from the individual keys of
the algorithms composing the composite.
o PGPSecretKey, PGPSignatureGenerator now support version 6.
o Further optimisation work has been done on ML-KEM public key validation.
o Zeroization of passwords in the JCA PKCS12 key store has been improved.
o The "org.bouncycastle.drbg.effective_256bits_entropy" property has been
added for platforms where the entropy source is not producing 1 full bit of
entropy per bit and additional bits are required (default value 282).
o OpenPGPKeyGenerator now allows for the use of empty UserIDs (version 4
compatibility).
o The HQC KEM has been updated with the latest draft updates.
o The legacy post-quantum package has now been removed.
o Version 1.81:
o A potention NullPointerException in the KEM KDF KemUtil class has been
removed.
o Overlapping input/output buffers in doFinal could result in data
corruption.
o Fixed Grain-128AEAD decryption incorrectly handle MAC verification.
o Add configurable header validation to prevent malicious header injection in
PGP cleartext signed messages; Fix signature packet encoding issues in
PGPSignature.join() and embedded signatures while phasing out legacy
format.
o Fixed ParallelHash initialization stall when using block size B=0.
o The PRF from the PBKDF2 function was been lost when PBMAC1 was initialized
from protectionAlgorithm. This has been fixed.
o The lowlevel DigestFactory was cloning MD5 when being asked to clone SHA1.
o XWing implementation updated to draft-connolly-cfrg-xwing-kem/07/
o Further support has been added for generation and use of PGP V6 keys
o Additional validation has been added for armored headers in Cleartext
Signed Messages.
o The PQC signature algorithm proposal Mayo has been added to the low-level
API and the BCPQC provider.
o The PQC signature algorithm proposal Snova has been added to the low-level
API and the BCPQC provider.
o Support for ChaCha20-Poly1305 has been added to the CMS/SMIME APIs.
o The Falcon implementation has been updated to the latest draft.
o Support has been added for generating keys which encode as seed-only and
expanded-key-only for ML-KEM and ML-DSA private keys.
o Private key encoding of ML-DSA and ML-KEM private keys now follows the
latest IETF draft.
o The Ascon family of algorithms has been updated to the initial draft of SP
800-232. Some additional optimisation work has been done.
o Support for ML-DSA's external-mu calculation and signing has been added to
the BC provider.
o CMS now supports ML-DSA for SignedData generation.
o Introduce high-level OpenPGP API for message creation/consumption and
certificate evaluation.
o Added JDK21 KEM API implementation for HQC algorithm.
o BCJSSE: Strip trailing dot from hostname for SNI, endpointID checks.
o BCJSSE: Draft support for ML-KEM updated
(draft-connolly-tls-mlkem-key-agreement-05).
o BCJSSE: Draft support for hybrid ECDHE-MLKEM
(draft-ietf-tls-ecdhe-mlkem-00).
o BCJSSE: Optionally prefer TLS 1.3 server's supported_groups order
(BCSSLParameters.useNamedGroupsOrder).
o Version 1.80:
o A splitting issue for ML-KEM led to an incorrect size for kemct in
KEMRecipientInfos. This has been fixed.
o The PKCS12 KeyStore has been adjusted to prevent accidental doubling of the
Oracle trusted certificate attribute (results in an IOException when used
with the JVM PKCS12 implementation).
o The SignerInfoGenerator copy constructor was ignoring the certHolder field.
o The getAlgorithm() method return value for a CompositePrivateKey was not
consistent with the corresponding getAlgorithm() return value for the
CompositePrivateKey. This has been fixed.
o The international property files were missing from the bcjmail
distribution.
o Issues with ElephantEngine failing on processing large/multi-block messages
have been addressed.
o GCFB mode now fully resets on a reset.
o The lightweight algorithm contestants: Elephant, ISAP, PhotonBeetle,
Xoodyak now support the use of the AEADParameters class and provide
accurate update/doFinal output lengths.
o An unnecessary downcast in CertPathValidatorUtilities was resulting in the
ignoring of URLs for FTP based CRLs.
o A regression in the OpenPGP API could cause NoSuchAlgorithmException to be
thrown when attempting to use SHA-256 in some contexts.
o EtsiTs1029411TypesAuthorization was missing an extension field.
o Interoperability issues with single depth LMS keys have been addressed.
o CompositeSignatures now updated to draft-ietf-lamps-pq-composite-sigs-03.
o ML-KEM, ML-DSA, SLH-DSA, and Composite private keys now use raw encodings
as per the latest drafts from IETF 121:
draft-ietf-lamps-kyber-certificates-06,
draft-ietf-lamps-dilithium-certificates-05, and
draft-ietf-lamps-x509-slhdsa.
o Initial support has been added for RFC 9579 PBMAC1 in the PKCS API.
o Support has been added for EC-JPAKE to the lightweight API.
o Support has been added for the direct construction of S/MIME
AuthEnvelopedData objects, via the SMIMEAuthEnvelopedData class.
o An override "org.bouncycastle.asn1.allow_wrong_oid_enc" property has been
added to disable new OID encoding checks (use with caution).
o Support has been added for the PBEParemeterSpec.getParameterSpec() method
where supported by the JVM.
o ML-DSA/SLH-DSA now return null for Signature.getParameters() if no context
is provided. This allows the algorithms to be used with the existing Java
key tool.
o HQC has been updated to reflect the reference implementation released on
2024-10-30.
o Support has been added to the low-level APIs for the OASIS Shamir Secret
Splitting algorithms.
o BCJSSE: System property "org.bouncycastle.jsse.fips.allowGCMCiphersIn12" no
longer used. FIPS TLS 1.2 GCM suites can now be enabled according to
JcaTlsCrypto#getFipsGCMNonceGeneratorFactory (see JavaDoc for details) if
done in alignment with FIPS requirements.
o Support has been added for OpenPGP V6 PKESK and message encryption.
o PGPSecretKey.copyWithNewPassword() now includes AEAD support.
o The ASCON family of algorithms have been updated in accordance with the
published FIPS SP 800-232 draft.
Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-1639=1
o SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1639=1
o SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1639=1
o SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1639=1
o SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1639=1
o SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1639=1
o SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1639=1
o SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1639=1
o SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1639=1
o SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1639=1
o SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1639=1
Package List:
o Development Tools Module 15-SP7 (noarch)
bouncycastle-1.84-150200.3.35.1
bouncycastle-pkix-1.84-150200.3.35.1
bouncycastle-util-1.84-150200.3.35.1
bouncycastle-pg-1.84-150200.3.35.1
o SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
bouncycastle-1.84-150200.3.35.1
bouncycastle-pkix-1.84-150200.3.35.1
bouncycastle-util-1.84-150200.3.35.1
bouncycastle-pg-1.84-150200.3.35.1
o SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
bouncycastle-1.84-150200.3.35.1
bouncycastle-pkix-1.84-150200.3.35.1
bouncycastle-util-1.84-150200.3.35.1
bouncycastle-pg-1.84-150200.3.35.1
o SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
bouncycastle-1.84-150200.3.35.1
bouncycastle-pkix-1.84-150200.3.35.1
bouncycastle-util-1.84-150200.3.35.1
bouncycastle-pg-1.84-150200.3.35.1
o SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
bouncycastle-1.84-150200.3.35.1
bouncycastle-pkix-1.84-150200.3.35.1
bouncycastle-util-1.84-150200.3.35.1
bouncycastle-pg-1.84-150200.3.35.1
o SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
bouncycastle-1.84-150200.3.35.1
bouncycastle-pkix-1.84-150200.3.35.1
bouncycastle-util-1.84-150200.3.35.1
bouncycastle-pg-1.84-150200.3.35.1
o SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
bouncycastle-1.84-150200.3.35.1
bouncycastle-pkix-1.84-150200.3.35.1
bouncycastle-util-1.84-150200.3.35.1
bouncycastle-pg-1.84-150200.3.35.1
o SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
bouncycastle-1.84-150200.3.35.1
bouncycastle-pkix-1.84-150200.3.35.1
bouncycastle-util-1.84-150200.3.35.1
bouncycastle-pg-1.84-150200.3.35.1
o SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
bouncycastle-1.84-150200.3.35.1
bouncycastle-pkix-1.84-150200.3.35.1
bouncycastle-util-1.84-150200.3.35.1
bouncycastle-pg-1.84-150200.3.35.1
o SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
bouncycastle-1.84-150200.3.35.1
bouncycastle-pkix-1.84-150200.3.35.1
bouncycastle-util-1.84-150200.3.35.1
bouncycastle-pg-1.84-150200.3.35.1
o SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
bouncycastle-1.84-150200.3.35.1
bouncycastle-pkix-1.84-150200.3.35.1
bouncycastle-util-1.84-150200.3.35.1
bouncycastle-pg-1.84-150200.3.35.1
References:
o https://www.suse.com/security/cve/CVE-2025-14813.html
o https://www.suse.com/security/cve/CVE-2026-0636.html
o https://www.suse.com/security/cve/CVE-2026-3505.html
o https://www.suse.com/security/cve/CVE-2026-5588.html
o https://www.suse.com/security/cve/CVE-2026-5598.html
o https://bugzilla.suse.com/show_bug.cgi?id=1262225
o https://bugzilla.suse.com/show_bug.cgi?id=1262226
o https://bugzilla.suse.com/show_bug.cgi?id=1262227
o https://bugzilla.suse.com/show_bug.cgi?id=1262228
o https://bugzilla.suse.com/show_bug.cgi?id=1262232
- --------------------------END INCLUDED TEXT----------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AUSCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AUSCERT's members. As
AUSCERT did not write the document quoted above, AUSCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AUSCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://portal.auscert.org.au/bulletins/
===========================================================================
AUSCERT
The University of Queensland, Brisbane QLD 4072 Australia
e: auscert@auscert.org.au
t: +61 (0)7 3365 4417
Allies in Cyber Security
===========================================================================