SUSE-SU-2026:2005-1
Vulnerability from csaf_suse - Published: 2026-05-19 08:23 - Updated: 2026-05-19 08:23Summary
Security update for cockpit
Severity
Important
Notes
Title of the patch: Security update for cockpit
Description of the patch: This update for cockpit fixes the following issues
- CVE-2026-0775: npm: loading of modules from an unsecured location can be used for local privilege escalation and
arbitrary code execution in the context of a target user (bsc#1256521).
- CVE-2026-4802: remote command execution via unsanitized user-controlled parameters within crafted links in system logs
UI (bsc#1265040).
- CVE-2026-29074: svgo: no guard against entity expansion or recursion when processing XML with custom entities can lead
to DoS (bsc#1259290).
Patchnames: SUSE-2026-2005,SUSE-SLE-Micro-5.3-2026-2005
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Affected products
Recommended
13 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-networkmanager-251.3-150400.8.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-selinux-251.3-150400.8.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-storaged-251.3-150400.8.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-system-251.3-150400.8.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.5 (High)
Affected products
Recommended
13 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-networkmanager-251.3-150400.8.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-selinux-251.3-150400.8.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-storaged-251.3-150400.8.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-system-251.3-150400.8.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
13 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-networkmanager-251.3-150400.8.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-selinux-251.3-150400.8.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-storaged-251.3-150400.8.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-system-251.3-150400.8.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
16 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for cockpit",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for cockpit fixes the following issues\n\n- CVE-2026-0775: npm: loading of modules from an unsecured location can be used for local privilege escalation and\n arbitrary code execution in the context of a target user (bsc#1256521).\n- CVE-2026-4802: remote command execution via unsanitized user-controlled parameters within crafted links in system logs\n UI (bsc#1265040).\n- CVE-2026-29074: svgo: no guard against entity expansion or recursion when processing XML with custom entities can lead\n to DoS (bsc#1259290).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-2005,SUSE-SLE-Micro-5.3-2026-2005",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_2005-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:2005-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20262005-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:2005-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046576.html"
},
{
"category": "self",
"summary": "SUSE Bug 1256521",
"url": "https://bugzilla.suse.com/1256521"
},
{
"category": "self",
"summary": "SUSE Bug 1259290",
"url": "https://bugzilla.suse.com/1259290"
},
{
"category": "self",
"summary": "SUSE Bug 1265040",
"url": "https://bugzilla.suse.com/1265040"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0775 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-29074 page",
"url": "https://www.suse.com/security/cve/CVE-2026-29074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-4802 page",
"url": "https://www.suse.com/security/cve/CVE-2026-4802/"
}
],
"title": "Security update for cockpit",
"tracking": {
"current_release_date": "2026-05-19T08:23:18Z",
"generator": {
"date": "2026-05-19T08:23:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:2005-1",
"initial_release_date": "2026-05-19T08:23:18Z",
"revision_history": [
{
"date": "2026-05-19T08:23:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cockpit-251.3-150400.8.6.1.aarch64",
"product": {
"name": "cockpit-251.3-150400.8.6.1.aarch64",
"product_id": "cockpit-251.3-150400.8.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "cockpit-bridge-251.3-150400.8.6.1.aarch64",
"product": {
"name": "cockpit-bridge-251.3-150400.8.6.1.aarch64",
"product_id": "cockpit-bridge-251.3-150400.8.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "cockpit-devel-251.3-150400.8.6.1.aarch64",
"product": {
"name": "cockpit-devel-251.3-150400.8.6.1.aarch64",
"product_id": "cockpit-devel-251.3-150400.8.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "cockpit-pcp-251.3-150400.8.6.1.aarch64",
"product": {
"name": "cockpit-pcp-251.3-150400.8.6.1.aarch64",
"product_id": "cockpit-pcp-251.3-150400.8.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "cockpit-tests-251.3-150400.8.6.1.aarch64",
"product": {
"name": "cockpit-tests-251.3-150400.8.6.1.aarch64",
"product_id": "cockpit-tests-251.3-150400.8.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "cockpit-ws-251.3-150400.8.6.1.aarch64",
"product": {
"name": "cockpit-ws-251.3-150400.8.6.1.aarch64",
"product_id": "cockpit-ws-251.3-150400.8.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "cockpit-doc-251.3-150400.8.6.1.noarch",
"product": {
"name": "cockpit-doc-251.3-150400.8.6.1.noarch",
"product_id": "cockpit-doc-251.3-150400.8.6.1.noarch"
}
},
{
"category": "product_version",
"name": "cockpit-kdump-251.3-150400.8.6.1.noarch",
"product": {
"name": "cockpit-kdump-251.3-150400.8.6.1.noarch",
"product_id": "cockpit-kdump-251.3-150400.8.6.1.noarch"
}
},
{
"category": "product_version",
"name": "cockpit-networkmanager-251.3-150400.8.6.1.noarch",
"product": {
"name": "cockpit-networkmanager-251.3-150400.8.6.1.noarch",
"product_id": "cockpit-networkmanager-251.3-150400.8.6.1.noarch"
}
},
{
"category": "product_version",
"name": "cockpit-packagekit-251.3-150400.8.6.1.noarch",
"product": {
"name": "cockpit-packagekit-251.3-150400.8.6.1.noarch",
"product_id": "cockpit-packagekit-251.3-150400.8.6.1.noarch"
}
},
{
"category": "product_version",
"name": "cockpit-selinux-251.3-150400.8.6.1.noarch",
"product": {
"name": "cockpit-selinux-251.3-150400.8.6.1.noarch",
"product_id": "cockpit-selinux-251.3-150400.8.6.1.noarch"
}
},
{
"category": "product_version",
"name": "cockpit-storaged-251.3-150400.8.6.1.noarch",
"product": {
"name": "cockpit-storaged-251.3-150400.8.6.1.noarch",
"product_id": "cockpit-storaged-251.3-150400.8.6.1.noarch"
}
},
{
"category": "product_version",
"name": "cockpit-system-251.3-150400.8.6.1.noarch",
"product": {
"name": "cockpit-system-251.3-150400.8.6.1.noarch",
"product_id": "cockpit-system-251.3-150400.8.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cockpit-251.3-150400.8.6.1.ppc64le",
"product": {
"name": "cockpit-251.3-150400.8.6.1.ppc64le",
"product_id": "cockpit-251.3-150400.8.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cockpit-bridge-251.3-150400.8.6.1.ppc64le",
"product": {
"name": "cockpit-bridge-251.3-150400.8.6.1.ppc64le",
"product_id": "cockpit-bridge-251.3-150400.8.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cockpit-devel-251.3-150400.8.6.1.ppc64le",
"product": {
"name": "cockpit-devel-251.3-150400.8.6.1.ppc64le",
"product_id": "cockpit-devel-251.3-150400.8.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cockpit-pcp-251.3-150400.8.6.1.ppc64le",
"product": {
"name": "cockpit-pcp-251.3-150400.8.6.1.ppc64le",
"product_id": "cockpit-pcp-251.3-150400.8.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cockpit-tests-251.3-150400.8.6.1.ppc64le",
"product": {
"name": "cockpit-tests-251.3-150400.8.6.1.ppc64le",
"product_id": "cockpit-tests-251.3-150400.8.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cockpit-ws-251.3-150400.8.6.1.ppc64le",
"product": {
"name": "cockpit-ws-251.3-150400.8.6.1.ppc64le",
"product_id": "cockpit-ws-251.3-150400.8.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cockpit-251.3-150400.8.6.1.s390x",
"product": {
"name": "cockpit-251.3-150400.8.6.1.s390x",
"product_id": "cockpit-251.3-150400.8.6.1.s390x"
}
},
{
"category": "product_version",
"name": "cockpit-bridge-251.3-150400.8.6.1.s390x",
"product": {
"name": "cockpit-bridge-251.3-150400.8.6.1.s390x",
"product_id": "cockpit-bridge-251.3-150400.8.6.1.s390x"
}
},
{
"category": "product_version",
"name": "cockpit-devel-251.3-150400.8.6.1.s390x",
"product": {
"name": "cockpit-devel-251.3-150400.8.6.1.s390x",
"product_id": "cockpit-devel-251.3-150400.8.6.1.s390x"
}
},
{
"category": "product_version",
"name": "cockpit-pcp-251.3-150400.8.6.1.s390x",
"product": {
"name": "cockpit-pcp-251.3-150400.8.6.1.s390x",
"product_id": "cockpit-pcp-251.3-150400.8.6.1.s390x"
}
},
{
"category": "product_version",
"name": "cockpit-tests-251.3-150400.8.6.1.s390x",
"product": {
"name": "cockpit-tests-251.3-150400.8.6.1.s390x",
"product_id": "cockpit-tests-251.3-150400.8.6.1.s390x"
}
},
{
"category": "product_version",
"name": "cockpit-ws-251.3-150400.8.6.1.s390x",
"product": {
"name": "cockpit-ws-251.3-150400.8.6.1.s390x",
"product_id": "cockpit-ws-251.3-150400.8.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cockpit-251.3-150400.8.6.1.x86_64",
"product": {
"name": "cockpit-251.3-150400.8.6.1.x86_64",
"product_id": "cockpit-251.3-150400.8.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "cockpit-bridge-251.3-150400.8.6.1.x86_64",
"product": {
"name": "cockpit-bridge-251.3-150400.8.6.1.x86_64",
"product_id": "cockpit-bridge-251.3-150400.8.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "cockpit-devel-251.3-150400.8.6.1.x86_64",
"product": {
"name": "cockpit-devel-251.3-150400.8.6.1.x86_64",
"product_id": "cockpit-devel-251.3-150400.8.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "cockpit-pcp-251.3-150400.8.6.1.x86_64",
"product": {
"name": "cockpit-pcp-251.3-150400.8.6.1.x86_64",
"product_id": "cockpit-pcp-251.3-150400.8.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "cockpit-tests-251.3-150400.8.6.1.x86_64",
"product": {
"name": "cockpit-tests-251.3-150400.8.6.1.x86_64",
"product_id": "cockpit-tests-251.3-150400.8.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "cockpit-ws-251.3-150400.8.6.1.x86_64",
"product": {
"name": "cockpit-ws-251.3-150400.8.6.1.x86_64",
"product_id": "cockpit-ws-251.3-150400.8.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-251.3-150400.8.6.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.aarch64"
},
"product_reference": "cockpit-251.3-150400.8.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-251.3-150400.8.6.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.s390x"
},
"product_reference": "cockpit-251.3-150400.8.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-251.3-150400.8.6.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.x86_64"
},
"product_reference": "cockpit-251.3-150400.8.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-bridge-251.3-150400.8.6.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.aarch64"
},
"product_reference": "cockpit-bridge-251.3-150400.8.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-bridge-251.3-150400.8.6.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.s390x"
},
"product_reference": "cockpit-bridge-251.3-150400.8.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-bridge-251.3-150400.8.6.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.x86_64"
},
"product_reference": "cockpit-bridge-251.3-150400.8.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-networkmanager-251.3-150400.8.6.1.noarch as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:cockpit-networkmanager-251.3-150400.8.6.1.noarch"
},
"product_reference": "cockpit-networkmanager-251.3-150400.8.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-selinux-251.3-150400.8.6.1.noarch as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:cockpit-selinux-251.3-150400.8.6.1.noarch"
},
"product_reference": "cockpit-selinux-251.3-150400.8.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-storaged-251.3-150400.8.6.1.noarch as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:cockpit-storaged-251.3-150400.8.6.1.noarch"
},
"product_reference": "cockpit-storaged-251.3-150400.8.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-system-251.3-150400.8.6.1.noarch as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:cockpit-system-251.3-150400.8.6.1.noarch"
},
"product_reference": "cockpit-system-251.3-150400.8.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-ws-251.3-150400.8.6.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.aarch64"
},
"product_reference": "cockpit-ws-251.3-150400.8.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-ws-251.3-150400.8.6.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.s390x"
},
"product_reference": "cockpit-ws-251.3-150400.8.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-ws-251.3-150400.8.6.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.x86_64"
},
"product_reference": "cockpit-ws-251.3-150400.8.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-0775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0775"
}
],
"notes": [
{
"category": "general",
"text": "npm cli Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of npm cli. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the handling of modules. The application loads modules from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of a target user. Was ZDI-CAN-25430.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-networkmanager-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-selinux-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-storaged-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-system-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0775",
"url": "https://www.suse.com/security/cve/CVE-2026-0775"
},
{
"category": "external",
"summary": "SUSE Bug 1256519 for CVE-2026-0775",
"url": "https://bugzilla.suse.com/1256519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-networkmanager-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-selinux-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-storaged-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-system-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-networkmanager-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-selinux-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-storaged-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-system-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-19T08:23:18Z",
"details": "important"
}
],
"title": "CVE-2026-0775"
},
{
"cve": "CVE-2026-29074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-29074"
}
],
"notes": [
{
"category": "general",
"text": "SVGO, short for SVG Optimizer, is a Node.js library and command-line application for optimizing SVG files. From version 2.1.0 to before version 2.8.1, from version 3.0.0 to before version 3.3.3, and before version 4.0.1, SVGO accepts XML with custom entities, without guards against entity expansion or recursion. This can result in a small XML file (811 bytes) stalling the application and even crashing the Node.js process with JavaScript heap out of memory. This issue has been patched in versions 2.8.1, 3.3.3, and 4.0.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-networkmanager-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-selinux-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-storaged-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-system-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-29074",
"url": "https://www.suse.com/security/cve/CVE-2026-29074"
},
{
"category": "external",
"summary": "SUSE Bug 1259289 for CVE-2026-29074",
"url": "https://bugzilla.suse.com/1259289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-networkmanager-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-selinux-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-storaged-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-system-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-networkmanager-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-selinux-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-storaged-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-system-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-19T08:23:18Z",
"details": "important"
}
],
"title": "CVE-2026-29074"
},
{
"cve": "CVE-2026-4802",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-4802"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Cockpit. This vulnerability allows a remote attacker to achieve arbitrary command execution on the host by exploiting unsanitized user-controlled parameters within crafted links in the system logs user interface (UI). An attacker can inject shell metacharacters and command substitutions into these parameters, leading to the execution of arbitrary shell commands on the affected system. This could result in a complete system compromise.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-networkmanager-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-selinux-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-storaged-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-system-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-4802",
"url": "https://www.suse.com/security/cve/CVE-2026-4802"
},
{
"category": "external",
"summary": "SUSE Bug 1265040 for CVE-2026-4802",
"url": "https://bugzilla.suse.com/1265040"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-networkmanager-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-selinux-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-storaged-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-system-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-bridge-251.3-150400.8.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:cockpit-networkmanager-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-selinux-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-storaged-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-system-251.3-150400.8.6.1.noarch",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:cockpit-ws-251.3-150400.8.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-19T08:23:18Z",
"details": "important"
}
],
"title": "CVE-2026-4802"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…