Security update for terraform-provider-local, terraform-provider-random, terraform-provider-tls
| Announcement ID: | SUSE-SU-2026:1411-1 |
|---|---|
| Release Date: | 2026-04-16T12:57:18Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves two vulnerabilities can now be installed.
Description:
This update for terraform-provider-local, terraform-provider-random, terraform-provider-tls fixes the following issue:
- CVE-2026-25934: github.com/go-git/go-git/v5: improper verification of data integrity values for
.packand.idxfiles can lead to the consumption of corrupted files (bsc#1258097). - CVE-2026-33186: google.golang.org/grpc: improper validation of the HTTP/2
:pathpseudo-header can lead to authorization bypass (bsc#1260218).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-1411=1 -
Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-1411=1 -
Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2026-1411=1
Package List:
-
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
- terraform-provider-local-2.0.0-150200.6.8.1
- terraform-provider-null-3.0.0-150200.6.12.1
- terraform-provider-random-3.0.0-150200.6.6.2
- terraform-provider-tls-3.0.0-150200.5.6.2
-
Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
- terraform-provider-local-2.0.0-150200.6.8.1
- terraform-provider-null-3.0.0-150200.6.12.1
- terraform-provider-random-3.0.0-150200.6.6.2
- terraform-provider-tls-3.0.0-150200.5.6.2
-
Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64)
- terraform-provider-local-2.0.0-150200.6.8.1
- terraform-provider-null-3.0.0-150200.6.12.1
- terraform-provider-random-3.0.0-150200.6.6.2
- terraform-provider-tls-3.0.0-150200.5.6.2