Security update for vexctl
| Announcement ID: | SUSE-SU-2026:0592-1 |
|---|---|
| Release Date: | 2026-02-20T14:27:29Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves nine vulnerabilities can now be installed.
Description:
This update for vexctl fixes the following issues:
- Update to version 0.4.1+git78.f951e3a:
- CVE-2025-22868: Unexpected memory consumption during token parsing in golang.org/x/oauth2. (bsc#1239186)
- CVE-2024-45337: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto. (bsc#1234486)
- CVE-2025-27144: Go JOSE's Parsing Vulnerable to Denial of Service. (bsc#1237611)
- CVE-2025-22870: proxy bypass using IPv6 zone IDs. (bsc#1238683)
- CVE-2025-22869: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh. (bsc#1239323)
- CVE-2025-30204: jwt-go allows excessive memory allocation during header parsing. (bsc#1240444)
- CVE-2025-58181: invalidated number of mechanisms can cause unbounded memory consumption. (bsc#1253802)
- CVE-2026-22772: MetaIssuer URL validation bypass can trigger SSRF to arbitrary internal services. (bsc#1256535)
- CVE-2026-24137: legacy TUF client allows for arbitrary file writes with target cache path traversal. (bsc#1257138)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-592=1
Package List:
-
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
- vexctl-debuginfo-0.4.1+git78.f951e3a-150000.1.11.1
- vexctl-0.4.1+git78.f951e3a-150000.1.11.1
References:
- https://www.suse.com/security/cve/CVE-2024-45337.html
- https://www.suse.com/security/cve/CVE-2025-22868.html
- https://www.suse.com/security/cve/CVE-2025-22869.html
- https://www.suse.com/security/cve/CVE-2025-22870.html
- https://www.suse.com/security/cve/CVE-2025-27144.html
- https://www.suse.com/security/cve/CVE-2025-30204.html
- https://www.suse.com/security/cve/CVE-2025-58181.html
- https://www.suse.com/security/cve/CVE-2026-22772.html
- https://www.suse.com/security/cve/CVE-2026-24137.html
- https://bugzilla.suse.com/show_bug.cgi?id=1234486
- https://bugzilla.suse.com/show_bug.cgi?id=1237611
- https://bugzilla.suse.com/show_bug.cgi?id=1238683
- https://bugzilla.suse.com/show_bug.cgi?id=1239186
- https://bugzilla.suse.com/show_bug.cgi?id=1239323
- https://bugzilla.suse.com/show_bug.cgi?id=1240444
- https://bugzilla.suse.com/show_bug.cgi?id=1253802
- https://bugzilla.suse.com/show_bug.cgi?id=1256535
- https://bugzilla.suse.com/show_bug.cgi?id=1257138