Security update for rekor
| Announcement ID: | SUSE-SU-2026:0383-1 |
|---|---|
| Release Date: | 2026-02-04T12:46:33Z |
| Rating: | moderate |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves two vulnerabilities and contains one feature can now be installed.
Description:
This update for rekor fixes the following issues:
Security fixes:
- CVE-2025-58058: Fixed github.com/ulikunitz/xz leaks memory (bsc#1248910)
- CVE-2025-29923: Fixed potential out of order responses when
CLIENT SETINFOtimes out during connection establishment (bsc#1241153)
Other fixes:
- Update to version 1.4.3
- Update to version 1.4.2
- Update to version 1.4.1 (jsc#SLE-23476)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-383=1 -
openSUSE Leap 15.4
zypper in -t patch SUSE-2026-383=1 -
openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-383=1
Package List:
-
Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
- rekor-1.4.3-150400.4.28.1
- rekor-debuginfo-1.4.3-150400.4.28.1
-
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
- rekor-1.4.3-150400.4.28.1
- rekor-debuginfo-1.4.3-150400.4.28.1
-
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
- rekor-1.4.3-150400.4.28.1
- rekor-debuginfo-1.4.3-150400.4.28.1