Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-4674 (GCVE-0-2025-4674)
Vulnerability from cvelistv5
Published
2025-07-29 21:19
Modified
2025-08-06 16:06
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via "go get", are not affected.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Go toolchain | cmd/go |
Version: 0 ≤ Version: 1.24.0-0 ≤ |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-4674", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-06T16:03:21.628652Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-73", "description": "CWE-73 External Control of File Name or Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-06T16:06:57.979Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://pkg.go.dev", "defaultStatus": "unaffected", "packageName": "cmd/go", "product": "cmd/go", "vendor": "Go toolchain", "versions": [ { "lessThan": "1.23.11", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThan": "1.24.5", "status": "affected", "version": "1.24.0-0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "value": "RyotaK (https://ryotak.net) of GMO Flatt Security Inc" } ], "descriptions": [ { "lang": "en", "value": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-73: External Control of File Name or Path", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-29T21:19:08.519Z", "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "shortName": "Go" }, "references": [ { "url": "https://go.dev/cl/686515" }, { "url": "https://go.dev/issue/74380" }, { "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "title": "Unexpected command execution in untrusted VCS repositories in cmd/go" } }, "cveMetadata": { "assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "assignerShortName": "Go", "cveId": "CVE-2025-4674", "datePublished": "2025-07-29T21:19:08.519Z", "dateReserved": "2025-05-13T23:31:07.620Z", "dateUpdated": "2025-08-06T16:06:57.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-4674\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2025-07-29T22:15:25.380\",\"lastModified\":\"2025-08-06T16:15:30.087\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \\\"go get\\\", are not affected.\"},{\"lang\":\"es\",\"value\":\"El comando \\\"go\\\" puede ejecutar comandos inesperados al operar en repositorios VCS no confiables. Esto ocurre cuando existe una configuraci\u00f3n de VCS potencialmente peligrosa en los repositorios. Esto puede ocurrir cuando un repositorio se obtuvo mediante un VCS (p. ej., Git), pero contiene metadatos para otro VCS (p. ej., Mercurial). Los m\u00f3dulos obtenidos mediante la l\u00ednea de comandos \\\"go get\\\" no se ven afectados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-73\"}]}],\"references\":[{\"url\":\"https://go.dev/cl/686515\",\"source\":\"security@golang.org\"},{\"url\":\"https://go.dev/issue/74380\",\"source\":\"security@golang.org\"},{\"url\":\"https://groups.google.com/g/golang-announce/c/gTNJnDXmn34\",\"source\":\"security@golang.org\"},{\"url\":\"https://pkg.go.dev/vuln/GO-2025-3828\",\"source\":\"security@golang.org\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.6, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-4674\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-06T16:03:21.628652Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-73\", \"description\": \"CWE-73 External Control of File Name or Path\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-06T16:04:19.737Z\"}}], \"cna\": {\"title\": \"Unexpected command execution in untrusted VCS repositories in cmd/go\", \"credits\": [{\"lang\": \"en\", \"value\": \"RyotaK (https://ryotak.net) of GMO Flatt Security Inc\"}], \"affected\": [{\"vendor\": \"Go toolchain\", \"product\": \"cmd/go\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.23.11\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.24.0-0\", \"lessThan\": \"1.24.5\", \"versionType\": \"semver\"}], \"packageName\": \"cmd/go\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://go.dev/cl/686515\"}, {\"url\": \"https://go.dev/issue/74380\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/gTNJnDXmn34\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2025-3828\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \\\"go get\\\", are not affected.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-73: External Control of File Name or Path\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2025-07-29T21:19:08.519Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-4674\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-06T16:06:57.979Z\", \"dateReserved\": \"2025-05-13T23:31:07.620Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2025-07-29T21:19:08.519Z\", \"assignerShortName\": \"Go\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ghsa-wprm-fgrx-xj42
Vulnerability from github
Published
2025-07-30 00:32
Modified
2025-08-06 18:31
Severity ?
VLAI Severity ?
Details
The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via "go get", are not affected.
{ "affected": [], "aliases": [ "CVE-2025-4674" ], "database_specific": { "cwe_ids": [ "CWE-73" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-29T22:15:25Z", "severity": "HIGH" }, "details": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "id": "GHSA-wprm-fgrx-xj42", "modified": "2025-08-06T18:31:12Z", "published": "2025-07-30T00:32:18Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674" }, { "type": "WEB", "url": "https://go.dev/cl/686515" }, { "type": "WEB", "url": "https://go.dev/issue/74380" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "type": "WEB", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
wid-sec-w-2025-1516
Vulnerability from csaf_certbund
Published
2025-07-08 22:00
Modified
2025-09-09 22:00
Summary
Golang Go: Schwachstelle ermöglicht Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Golang Go ist eine Open Source Plattform.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in Golang Go ausnutzen, um Code zur Ausführung zu bringen
Betroffene Betriebssysteme
- Android
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Golang Go ist eine Open Source Plattform.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann eine Schwachstelle in Golang Go ausnutzen, um Code zur Ausf\u00fchrung zu bringen", "title": "Angriff" }, { "category": "general", "text": "- Android\n- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1516 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1516.json" }, { "category": "self", "summary": "WID-SEC-2025-1516 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1516" }, { "category": "external", "summary": "Go 1.24.5 Release Notes vom 2025-07-08", "url": "https://go.dev/doc/devel/release#go1.24.5" }, { "category": "external", "summary": "Go 1.25 Release Notes vom 2025-07-08", "url": "https://tip.golang.org/doc/go1.25" }, { "category": "external", "summary": "golang GitHub Issue #74380 vom 2025-07-08", "url": "https://github.com/golang/go/issues/74380" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15329-1 vom 2025-07-10", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7X46SDCH6UTUTDOQ6JQY5P7LTACN2KXN/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02296-1 vom 2025-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021797.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02295-1 vom 2025-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021798.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-2939 vom 2025-07-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2939.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13939 vom 2025-08-18", "url": "https://access.redhat.com/errata/RHSA-2025:13939" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13940 vom 2025-08-18", "url": "https://access.redhat.com/errata/RHSA-2025:13940" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13941 vom 2025-08-18", "url": "https://access.redhat.com/errata/RHSA-2025:13941" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13935 vom 2025-08-18", "url": "https://access.redhat.com/errata/RHSA-2025:13935" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13936 vom 2025-08-18", "url": "https://access.redhat.com/errata/RHSA-2025:13936" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02812-1 vom 2025-08-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022176.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-13941 vom 2025-08-18", "url": "https://linux.oracle.com/errata/ELSA-2025-13941.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02837-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022191.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-13935 vom 2025-08-18", "url": "https://linux.oracle.com/errata/ELSA-2025-13935.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-13940 vom 2025-08-19", "url": "https://linux.oracle.com/errata/ELSA-2025-13940.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14093 vom 2025-08-19", "url": "https://access.redhat.com/errata/RHSA-2025:14093" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02924-1 vom 2025-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022236.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2025:13940 vom 2025-09-08", "url": "https://errata.build.resf.org/RLSA-2025:13940" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03115-1 vom 2025-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022415.html" } ], "source_lang": "en-US", "title": "Golang Go: Schwachstelle erm\u00f6glicht Codeausf\u00fchrung", "tracking": { "current_release_date": "2025-09-09T22:00:00.000+00:00", "generator": { "date": "2025-09-10T05:06:36.901+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1516", "initial_release_date": "2025-07-08T22:00:00.000+00:00", "revision_history": [ { "date": "2025-07-08T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-07-13T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-08-17T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2025-08-18T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2025-08-19T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Go und Red Hat aufgenommen" }, { "date": "2025-09-08T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2025-09-09T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c1.24.5", "product": { "name": "Golang Go \u003c1.24.5", "product_id": "T045284" } }, { "category": "product_version", "name": "1.24.5", "product": { "name": "Golang Go 1.24.5", "product_id": "T045284-fixed", "product_identification_helper": { "cpe": "cpe:/a:golang:go:1.24.5" } } }, { "category": "product_version_range", "name": "\u003c1.25", "product": { "name": "Golang Go \u003c1.25", "product_id": "T045285" } }, { "category": "product_version", "name": "1.25", "product": { "name": "Golang Go 1.25", "product_id": "T045285-fixed", "product_identification_helper": { "cpe": "cpe:/a:golang:go:1.25" } } } ], "category": "product_name", "name": "Go" } ], "category": "vendor", "name": "Golang" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "product_status": { "known_affected": [ "T002207", "67646", "T027843", "T045284", "398363", "T045285", "T004914", "T032255" ] }, "release_date": "2025-07-08T22:00:00.000+00:00", "title": "CVE-2025-4674" } ] }
opensuse-su-2025:15405-1
Vulnerability from csaf_opensuse
Published
2025-08-04 00:00
Modified
2025-08-04 00:00
Summary
govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media
Notes
Title of the patch
govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media
Description of the patch
These are all security issues fixed in the govulncheck-vulndb-0.0.20250730T213748-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15405
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the govulncheck-vulndb-0.0.20250730T213748-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15405", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15405-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2024-44905 page", "url": "https://www.suse.com/security/cve/CVE-2024-44905/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-44906 page", "url": "https://www.suse.com/security/cve/CVE-2024-44906/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56731 page", "url": "https://www.suse.com/security/cve/CVE-2024-56731/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-0928 page", "url": "https://www.suse.com/security/cve/CVE-2025-0928/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-1088 page", "url": "https://www.suse.com/security/cve/CVE-2025-1088/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-30086 page", "url": "https://www.suse.com/security/cve/CVE-2025-30086/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-32019 page", "url": "https://www.suse.com/security/cve/CVE-2025-32019/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3227 page", "url": "https://www.suse.com/security/cve/CVE-2025-3227/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3228 page", "url": "https://www.suse.com/security/cve/CVE-2025-3228/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3415 page", "url": "https://www.suse.com/security/cve/CVE-2025-3415/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4563 page", "url": "https://www.suse.com/security/cve/CVE-2025-4563/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4656 page", "url": "https://www.suse.com/security/cve/CVE-2025-4656/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-46702 page", "url": "https://www.suse.com/security/cve/CVE-2025-46702/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47281 page", "url": "https://www.suse.com/security/cve/CVE-2025-47281/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47871 page", "url": "https://www.suse.com/security/cve/CVE-2025-47871/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47943 page", "url": "https://www.suse.com/security/cve/CVE-2025-47943/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4922 page", "url": "https://www.suse.com/security/cve/CVE-2025-4922/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4981 page", "url": "https://www.suse.com/security/cve/CVE-2025-4981/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-49825 page", "url": "https://www.suse.com/security/cve/CVE-2025-49825/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5030 page", "url": "https://www.suse.com/security/cve/CVE-2025-5030/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-51471 page", "url": "https://www.suse.com/security/cve/CVE-2025-51471/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52477 page", "url": "https://www.suse.com/security/cve/CVE-2025-52477/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52889 page", "url": "https://www.suse.com/security/cve/CVE-2025-52889/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52890 page", "url": "https://www.suse.com/security/cve/CVE-2025-52890/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52893 page", "url": "https://www.suse.com/security/cve/CVE-2025-52893/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52894 page", "url": "https://www.suse.com/security/cve/CVE-2025-52894/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52900 page", "url": "https://www.suse.com/security/cve/CVE-2025-52900/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52901 page", "url": "https://www.suse.com/security/cve/CVE-2025-52901/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52902 page", "url": "https://www.suse.com/security/cve/CVE-2025-52902/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52903 page", "url": "https://www.suse.com/security/cve/CVE-2025-52903/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52904 page", "url": "https://www.suse.com/security/cve/CVE-2025-52904/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52995 page", "url": "https://www.suse.com/security/cve/CVE-2025-52995/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52996 page", "url": "https://www.suse.com/security/cve/CVE-2025-52996/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52997 page", "url": "https://www.suse.com/security/cve/CVE-2025-52997/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53512 page", "url": "https://www.suse.com/security/cve/CVE-2025-53512/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53513 page", "url": "https://www.suse.com/security/cve/CVE-2025-53513/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53547 page", "url": "https://www.suse.com/security/cve/CVE-2025-53547/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53632 page", "url": "https://www.suse.com/security/cve/CVE-2025-53632/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53633 page", "url": "https://www.suse.com/security/cve/CVE-2025-53633/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53634 page", "url": "https://www.suse.com/security/cve/CVE-2025-53634/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53826 page", "url": "https://www.suse.com/security/cve/CVE-2025-53826/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53893 page", "url": "https://www.suse.com/security/cve/CVE-2025-53893/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53945 page", "url": "https://www.suse.com/security/cve/CVE-2025-53945/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-54059 page", "url": "https://www.suse.com/security/cve/CVE-2025-54059/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-54379 page", "url": "https://www.suse.com/security/cve/CVE-2025-54379/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5689 page", "url": "https://www.suse.com/security/cve/CVE-2025-5689/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5981 page", "url": "https://www.suse.com/security/cve/CVE-2025-5981/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6023 page", "url": "https://www.suse.com/security/cve/CVE-2025-6023/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6032 page", "url": "https://www.suse.com/security/cve/CVE-2025-6032/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6224 page", "url": "https://www.suse.com/security/cve/CVE-2025-6224/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6226 page", "url": "https://www.suse.com/security/cve/CVE-2025-6226/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6227 page", "url": "https://www.suse.com/security/cve/CVE-2025-6227/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6233 page", "url": "https://www.suse.com/security/cve/CVE-2025-6233/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6264 page", "url": "https://www.suse.com/security/cve/CVE-2025-6264/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6624 page", "url": "https://www.suse.com/security/cve/CVE-2025-6624/" } ], "title": "govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media", "tracking": { "current_release_date": "2025-08-04T00:00:00Z", "generator": { "date": "2025-08-04T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15405-1", "initial_release_date": "2025-08-04T00:00:00Z", "revision_history": [ { "date": "2025-08-04T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-44905", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-44905" } ], "notes": [ { "category": "general", "text": "go-pg pg v10.13.0 was discovered to contain a SQL injection vulnerability via the component /types/append_value.go.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-44905", "url": "https://www.suse.com/security/cve/CVE-2024-44905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-44905" }, { "cve": "CVE-2024-44906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-44906" } ], "notes": [ { "category": "general", "text": "uptrace pgdriver v1.2.1 was discovered to contain a SQL injection vulnerability via the appendArg function in /pgdriver/format.go. The maintainer has stated that the issue is fixed in v1.2.15.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-44906", "url": "https://www.suse.com/security/cve/CVE-2024-44906" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-44906" }, { "cve": "CVE-2024-56731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56731" } ], "notes": [ { "category": "general", "text": "Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it\u0027s still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users\u0027 code hosted on the same instance. This issue has been patched in version 0.13.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56731", "url": "https://www.suse.com/security/cve/CVE-2024-56731" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2024-56731" }, { "cve": "CVE-2025-0928", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-0928" } ], "notes": [ { "category": "general", "text": "In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-0928", "url": "https://www.suse.com/security/cve/CVE-2025-0928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-0928" }, { "cve": "CVE-2025-1088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-1088" } ], "notes": [ { "category": "general", "text": "In Grafana, an excessively long dashboard title or panel name will cause Chromium browsers to become unresponsive due to Improper Input Validation vulnerability in Grafana.\nThis issue affects Grafana: before 11.6.2 and is fixed in 11.6.2 and higher.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-1088", "url": "https://www.suse.com/security/cve/CVE-2025-1088" }, { "category": "external", "summary": "SUSE Bug 1245224 for CVE-2025-1088", "url": "https://bugzilla.suse.com/1245224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-1088" }, { "cve": "CVE-2025-30086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-30086" } ], "notes": [ { "category": "general", "text": "CNCF Harbor 2.13.x before 2.13.1 and 2.12.x before 2.12.4 allows information disclosure by administrators who can exploit an ORM Leak present in the /api/v2.0/users endpoint to leak users\u0027 password hash and salt values. The q URL parameter allows a user to filter users by any column, and filter password=~ could be abused to leak out a user\u0027s password hash character by character. An attacker with administrator access could exploit this to leak highly sensitive information stored in the Harbor database. All endpoints that support the q URL parameter are vulnerable to this ORM leak attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-30086", "url": "https://www.suse.com/security/cve/CVE-2025-30086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-30086" }, { "cve": "CVE-2025-32019", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-32019" } ], "notes": [ { "category": "general", "text": "Harbor is an open source trusted cloud native registry project that stores, signs, and scans content. Versions 2.11.2 and below, as well as versions 2.12.0-rc1 and 2.13.0-rc1, contain a vulnerability where the markdown field in the info tab page can be exploited to inject XSS code. This is fixed in versions 2.11.3 and 2.12.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-32019", "url": "https://www.suse.com/security/cve/CVE-2025-32019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-32019" }, { "cve": "CVE-2025-3227", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3227" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly enforce channel member management permissions in playbook runs, allowing authenticated users without the \u0027Manage Channel Members\u0027 permission to add or remove users from public and private channels by manipulating playbook run participants when the run is linked to a channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3227", "url": "https://www.suse.com/security/cve/CVE-2025-3227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3227" }, { "cve": "CVE-2025-3228", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3228" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly retrieve requestorInfo from playbooks handler for guest users which allows an attacker access to the playbook run.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3228", "url": "https://www.suse.com/security/cve/CVE-2025-3228" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3228" }, { "cve": "CVE-2025-3415", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3415" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3415", "url": "https://www.suse.com/security/cve/CVE-2025-3415" }, { "category": "external", "summary": "SUSE Bug 1245302 for CVE-2025-3415", "url": "https://bugzilla.suse.com/1245302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3415" }, { "cve": "CVE-2025-4563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4563" } ], "notes": [ { "category": "general", "text": "A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4563", "url": "https://www.suse.com/security/cve/CVE-2025-4563" }, { "category": "external", "summary": "SUSE Bug 1245185 for CVE-2025-4563", "url": "https://bugzilla.suse.com/1245185" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-4563" }, { "cve": "CVE-2025-4656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4656" } ], "notes": [ { "category": "general", "text": "Vault Community and Vault Enterprise rekey and recovery key operations can lead to a denial of service due to uncontrolled cancellation by a Vault operator. This vulnerability (CVE-2025-4656) has been remediated in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11, 1.17.17, and 1.16.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4656", "url": "https://www.suse.com/security/cve/CVE-2025-4656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "low" } ], "title": "CVE-2025-4656" }, { "cve": "CVE-2025-46702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-46702" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly enforce channel member management permissions when adding participants to playbook runs. This allows authenticated users with member-level permissions to bypass system admin restrictions and add or remove users to/from private channels via the playbook run participants feature, even when the \u0027Manage Members\u0027 permission has been explicitly removed. This can lead to unauthorized access to sensitive channel content and allow guest users to gain channel management privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-46702", "url": "https://www.suse.com/security/cve/CVE-2025-46702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-46702" }, { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4674" }, { "cve": "CVE-2025-47281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47281" } ], "notes": [ { "category": "general", "text": "Kyverno is a policy engine designed for cloud native platform engineering teams. In versions 1.14.1 and below, a Denial of Service (DoS) vulnerability exists due to improper handling of JMESPath variable substitutions. Attackers with permissions to create or update Kyverno policies can craft expressions using the {{@}} variable combined with a pipe and an invalid JMESPath function (e.g., {{@ | non_existent_function }}). This leads to a nil value being substituted into the policy structure. Subsequent processing by internal functions, specifically getValueAsStringMap, which expect string values, results in a panic due to a type assertion failure (interface {} is nil, not string). This crashes Kyverno worker threads in the admission controller and causes continuous crashes of the reports controller pod. This is fixed in version 1.14.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47281", "url": "https://www.suse.com/security/cve/CVE-2025-47281" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-47281" }, { "cve": "CVE-2025-47871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47871" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly validate channel membership when retrieving playbook run metadata, allowing authenticated users who are playbook members but not channel members to access sensitive information about linked private channels including channel name, display name, and participant count through the run metadata API endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47871", "url": "https://www.suse.com/security/cve/CVE-2025-47871" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-47871" }, { "cve": "CVE-2025-47943", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47943" } ], "notes": [ { "category": "general", "text": "Gogs is an open source self-hosted Git service. In application version 0.14.0+dev and prior, there is a stored cross-site scripting (XSS) vulnerability present in Gogs, which allows client-side Javascript code execution. The vulnerability is caused by the usage of a vulnerable and outdated component: pdfjs-1.4.20 under public/plugins/. This issue has been fixed for gogs.io/gogs in version 0.13.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47943", "url": "https://www.suse.com/security/cve/CVE-2025-47943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-47943" }, { "cve": "CVE-2025-4922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4922" } ], "notes": [ { "category": "general", "text": "Nomad Community and Nomad Enterprise (\"Nomad\") prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in Nomad Community Edition 1.10.2 and Nomad Enterprise 1.10.2, 1.9.10, and 1.8.14.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4922", "url": "https://www.suse.com/security/cve/CVE-2025-4922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4922" }, { "cve": "CVE-2025-4981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4981" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4981", "url": "https://www.suse.com/security/cve/CVE-2025-4981" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-4981" }, { "cve": "CVE-2025-49825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-49825" } ], "notes": [ { "category": "general", "text": "Teleport provides connectivity, authentication, access controls and audit for infrastructure. Community Edition versions before and including 17.5.1 are vulnerable to remote authentication bypass. At time of posting, there is no available open-source patch.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-49825", "url": "https://www.suse.com/security/cve/CVE-2025-49825" }, { "category": "external", "summary": "SUSE Bug 1244718 for CVE-2025-49825", "url": "https://bugzilla.suse.com/1244718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-49825" }, { "cve": "CVE-2025-5030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5030" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Ackites KillWxapkg up to 2.4.1. It has been declared as critical. This vulnerability affects the function processFile of the file internal/unpack/unpack.go of the component wxapkg File Parser. The manipulation leads to os command injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5030", "url": "https://www.suse.com/security/cve/CVE-2025-5030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-5030" }, { "cve": "CVE-2025-51471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-51471" } ], "notes": [ { "category": "general", "text": "Cross-Domain Token Exposure in server.auth.getAuthorizationToken in Ollama 0.6.7 allows remote attackers to steal authentication tokens and bypass access controls via a malicious realm value in a WWW-Authenticate header returned by the /api/pull endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-51471", "url": "https://www.suse.com/security/cve/CVE-2025-51471" }, { "category": "external", "summary": "SUSE Bug 1246915 for CVE-2025-51471", "url": "https://bugzilla.suse.com/1246915" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-51471" }, { "cve": "CVE-2025-52477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52477" } ], "notes": [ { "category": "general", "text": "Octo-STS is a GitHub App that acts like a Security Token Service (STS) for the GitHub API. Octo-STS versions before v0.5.3 are vulnerable to unauthenticated SSRF by abusing fields in OpenID Connect tokens. Malicious tokens were shown to trigger internal network requests which could reflect error logs with sensitive information. Upgrade to v0.5.3 to resolve this issue. This version includes patch sets to sanitize input and redact logging.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52477", "url": "https://www.suse.com/security/cve/CVE-2025-52477" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52477" }, { "cve": "CVE-2025-52889", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52889" } ], "notes": [ { "category": "general", "text": "Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus version 6.12 and 6.13 generates nftables rules for local services (DHCP, DNS...) that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to DHCP pool exhaustion and opens the door for other attacks. A patch is available at commit 2516fb19ad8428454cb4edfe70c0a5f0dc1da214.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52889", "url": "https://www.suse.com/security/cve/CVE-2025-52889" }, { "category": "external", "summary": "SUSE Bug 1245365 for CVE-2025-52889", "url": "https://bugzilla.suse.com/1245365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52889" }, { "cve": "CVE-2025-52890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52890" } ], "notes": [ { "category": "general", "text": "Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus versions 6.12 and 6.13generates nftables rules that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to ARP spoofing on the bridge and to fully spoof another VM/container on the same bridge. Commit 254dfd2483ab8de39b47c2258b7f1cf0759231c8 contains a patch for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52890", "url": "https://www.suse.com/security/cve/CVE-2025-52890" }, { "category": "external", "summary": "SUSE Bug 1245367 for CVE-2025-52890", "url": "https://bugzilla.suse.com/1245367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52890" }, { "cve": "CVE-2025-52893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52893" } ], "notes": [ { "category": "general", "text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 may leak sensitive information in logs when processing malformed data. This is separate from the earlier HCSEC-2025-09 / CVE-2025-4166. This issue has been fixed in OpenBao v2.3.0 and later. Like with HCSEC-2025-09, there is no known workaround except to ensure properly formatted requests from all clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52893", "url": "https://www.suse.com/security/cve/CVE-2025-52893" }, { "category": "external", "summary": "SUSE Bug 1245381 for CVE-2025-52893", "url": "https://bugzilla.suse.com/1245381" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52893" }, { "cve": "CVE-2025-52894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52894" } ], "notes": [ { "category": "general", "text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao\u0027s website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52894", "url": "https://www.suse.com/security/cve/CVE-2025-52894" }, { "category": "external", "summary": "SUSE Bug 1245389 for CVE-2025-52894", "url": "https://bugzilla.suse.com/1245389" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52894" }, { "cve": "CVE-2025-52900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52900" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. The file access permissions for files uploaded to or created from File Browser are never explicitly set by the application. The same is true for the database used by File Browser. On standard servers using File Browser prior to version 2.33.7 where the umask configuration has not been hardened before, this makes all the stated files readable by any operating system account. Version 2.33.7 fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52900", "url": "https://www.suse.com/security/cve/CVE-2025-52900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52900" }, { "cve": "CVE-2025-52901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52901" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.9, access tokens are used as GET parameters. The JSON Web Token (JWT) which is used as a session identifier will get leaked to anyone having access to the URLs accessed by the user. This will give an attacker full access to a user\u0027s account and, in consequence, to all sensitive files the user has access to. This issue has been patched in version 2.33.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52901", "url": "https://www.suse.com/security/cve/CVE-2025-52901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52901" }, { "cve": "CVE-2025-52902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52902" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. The Markdown preview function of File Browser prior to v2.33.7 is vulnerable to Stored Cross-Site-Scripting (XSS). Any JavaScript code that is part of a Markdown file uploaded by a user will be executed by the browser. Version 2.33.7 contains a fix for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52902", "url": "https://www.suse.com/security/cve/CVE-2025-52902" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52902" }, { "cve": "CVE-2025-52903", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52903" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0, the Command Execution feature of File Browser only allows the execution of shell command which have been predefined on a user-specific allowlist. Many tools allow the execution of arbitrary different commands, rendering this limitation void. The concrete impact depends on the commands being granted to the attacker, but the large number of standard commands allowing the execution of subcommands makes it likely that every user having the `Execute commands` permissions can exploit this vulnerability. Everyone who can exploit it will have full code execution rights with the uid of the server process. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application\u0027s configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. The fix is tracked on pull request 5199.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52903", "url": "https://www.suse.com/security/cve/CVE-2025-52903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52903" }, { "cve": "CVE-2025-52904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52904" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0 of the web application, all users have a scope assigned, and they only have access to the files within that scope. The Command Execution feature of Filebrowser allows the execution of shell commands which are not restricted to the scope, potentially giving an attacker read and write access to all files managed by the server. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application\u0027s configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. Fix is tracked on pull request 5199.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52904", "url": "https://www.suse.com/security/cve/CVE-2025-52904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52904" }, { "cve": "CVE-2025-52995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52995" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.10, the implementation of the allowlist is erroneous, allowing a user to execute more shell commands than they are authorized for. The concrete impact of this vulnerability depends on the commands configured, and the binaries installed on the server or in the container image. Due to the missing separation of scopes on the OS-level, this could give an attacker access to all files managed the application, including the File Browser database. This issue has been patched in version 2.33.10.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52995", "url": "https://www.suse.com/security/cve/CVE-2025-52995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52995" }, { "cve": "CVE-2025-52996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52996" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In versions 2.32.0 and prior, the implementation of password protected links is error-prone, resulting in potential unprotected sharing of a file through a direct download link. This link can either be shared unknowingly by a user or discovered from various locations such as the browser history or the log of a proxy server used. At time of publication, no known patched versions are available.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52996", "url": "https://www.suse.com/security/cve/CVE-2025-52996" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52996" }, { "cve": "CVE-2025-52997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52997" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.34.1, a missing password policy and brute-force protection makes the authentication process insecure. Attackers could mount a brute-force attack to retrieve the passwords of all accounts in a given instance. This issue has been patched in version 2.34.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52997", "url": "https://www.suse.com/security/cve/CVE-2025-52997" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52997" }, { "cve": "CVE-2025-53512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53512" } ], "notes": [ { "category": "general", "text": "The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53512", "url": "https://www.suse.com/security/cve/CVE-2025-53512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-53512" }, { "cve": "CVE-2025-53513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53513" } ], "notes": [ { "category": "general", "text": "The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53513", "url": "https://www.suse.com/security/cve/CVE-2025-53513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53513" }, { "cve": "CVE-2025-53547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53547" } ], "notes": [ { "category": "general", "text": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53547", "url": "https://www.suse.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "SUSE Bug 1246150 for CVE-2025-53547", "url": "https://bugzilla.suse.com/1246150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53547" }, { "cve": "CVE-2025-53632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53632" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 47d188f and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53632", "url": "https://www.suse.com/security/cve/CVE-2025-53632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53632" }, { "cve": "CVE-2025-53633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53633" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the size of the decoded content is not checked, potentially leading to zip bombs decompression. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 14042aa and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53633", "url": "https://www.suse.com/security/cve/CVE-2025-53633" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53633" }, { "cve": "CVE-2025-53634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53634" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. The HTTP Gateway processes headers, but with no timeout set. With a slow loris attack, an attacker could cause Denial of Service (DoS). Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 1385bd8 and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53634", "url": "https://www.suse.com/security/cve/CVE-2025-53634" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53634" }, { "cve": "CVE-2025-53826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53826" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.39.0, File Browser\u0027s authentication system issues long-lived JWT tokens that remain valid even after the user logs out. As of time of publication, no known patches exist.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53826", "url": "https://www.suse.com/security/cve/CVE-2025-53826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53826" }, { "cve": "CVE-2025-53893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53893" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.38.0, a Denial of Service (DoS) vulnerability exists in the file processing logic when reading a file on endpoint `Filebrowser-Server-IP:PORT/files/{file-name}` . While the server correctly handles and stores uploaded files, it attempts to load the entire content into memory during read operations without size checks or resource limits. This allows an authenticated user to upload a large file and trigger uncontrolled memory consumption on read, potentially crashing the server and making it unresponsive. As of time of publication, no known patches are available.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53893", "url": "https://www.suse.com/security/cve/CVE-2025-53893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53893" }, { "cve": "CVE-2025-53945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53945" } ], "notes": [ { "category": "general", "text": "apko allows users to build and publish OCI container images built from apk packages. Starting in version 0.27.0 and prior to version 0.29.5, critical files were inadvertently set to 0666, which could likely be abused for root escalation. Version 0.29.5 contains a fix for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53945", "url": "https://www.suse.com/security/cve/CVE-2025-53945" }, { "category": "external", "summary": "SUSE Bug 1246746 for CVE-2025-53945", "url": "https://bugzilla.suse.com/1246746" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53945" }, { "cve": "CVE-2025-54059", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-54059" } ], "notes": [ { "category": "general", "text": "melange allows users to build apk packages using declarative pipelines. Starting in version 0.23.0 and prior to version 0.29.5, SBOM files generated by melange in apks had file system permissions mode 666. This potentially allows an unprivileged user to tamper with apk SBOMs on a running image, potentially confusing security scanners. An attacker could also perform a DoS under special circumstances. Version 0.29.5 fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-54059", "url": "https://www.suse.com/security/cve/CVE-2025-54059" }, { "category": "external", "summary": "SUSE Bug 1246745 for CVE-2025-54059", "url": "https://bugzilla.suse.com/1246745" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-54059" }, { "cve": "CVE-2025-54379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-54379" } ], "notes": [ { "category": "general", "text": "LF Edge eKuiper is a lightweight IoT data analytics and stream processing engine running on resource-constraint edge devices. In versions before 2.2.1, there is a critical SQL Injection vulnerability in the getLast API functionality of the eKuiper project. This flaw allows unauthenticated remote attackers to execute arbitrary SQL statements on the underlying SQLite database by manipulating the table name input in an API request. Exploitation can lead to data theft, corruption, or deletion, and full database compromise. This is fixed in version 2.2.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-54379", "url": "https://www.suse.com/security/cve/CVE-2025-54379" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "not set" } ], "title": "CVE-2025-54379" }, { "cve": "CVE-2025-5689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5689" } ], "notes": [ { "category": "general", "text": "A flaw was found in the temporary user record that authd uses in the pre-auth NSS. As a result, a user login for the first time will be considered to be part of the root group in the context of that SSH session.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5689", "url": "https://www.suse.com/security/cve/CVE-2025-5689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-5689" }, { "cve": "CVE-2025-5981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5981" } ], "notes": [ { "category": "general", "text": "Arbitrary file write as the OSV-SCALIBR user on the host system via a path traversal vulnerability when using OSV-SCALIBR\u0027s unpack() function for container images. Particularly, when using the CLI flag --remote-image on untrusted container images.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5981", "url": "https://www.suse.com/security/cve/CVE-2025-5981" }, { "category": "external", "summary": "SUSE Bug 1244726 for CVE-2025-5981", "url": "https://bugzilla.suse.com/1244726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-5981" }, { "cve": "CVE-2025-6023", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6023" } ], "notes": [ { "category": "general", "text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6023", "url": "https://www.suse.com/security/cve/CVE-2025-6023" }, { "category": "external", "summary": "SUSE Bug 1246735 for CVE-2025-6023", "url": "https://bugzilla.suse.com/1246735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6023" }, { "cve": "CVE-2025-6032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6032" } ], "notes": [ { "category": "general", "text": "A flaw was found in Podman. The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry. This issue results in a Man In The Middle attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6032", "url": "https://www.suse.com/security/cve/CVE-2025-6032" }, { "category": "external", "summary": "SUSE Bug 1245320 for CVE-2025-6032", "url": "https://bugzilla.suse.com/1245320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6032" }, { "cve": "CVE-2025-6224", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6224" } ], "notes": [ { "category": "general", "text": "Certificate generation in juju/utils using the cert.NewLeaf function could include private information. If this certificate were then transferred over the network in plaintext, an attacker listening on that network could sniff the certificate and trivially extract the private key from it.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6224", "url": "https://www.suse.com/security/cve/CVE-2025-6224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6224" }, { "cve": "CVE-2025-6226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6226" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.6, 10.8.x \u003c= 10.8.1, 10.7.x \u003c= 10.7.3, 9.11.x \u003c= 9.11.16 fail to verify authorization when retrieving cached posts by PendingPostID which allows an authenticated user to read posts in private channels they don\u0027t have access to via guessing the PendingPostID of recently created posts.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6226", "url": "https://www.suse.com/security/cve/CVE-2025-6226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6226" }, { "cve": "CVE-2025-6227", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6227" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.7, 9.11.x \u003c= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite via the REST API.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6227", "url": "https://www.suse.com/security/cve/CVE-2025-6227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "low" } ], "title": "CVE-2025-6227" }, { "cve": "CVE-2025-6233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6233" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.8.x \u003c= 10.8.1, 10.7.x \u003c= 10.7.3, 10.5.x \u003c= 10.5.7, 9.11.x \u003c= 9.11.16 fail to sanitize input paths of file attachments in the bulk import JSONL file, which allows a system admin to read arbitrary system files via path traversal.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6233", "url": "https://www.suse.com/security/cve/CVE-2025-6233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6233" }, { "cve": "CVE-2025-6264", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6264" } ], "notes": [ { "category": "general", "text": "Velociraptor allows collection of VQL queries packaged into Artifacts from endpoints. These artifacts can be used to do anything and usually run with elevated permissions. To limit access to some dangerous artifact, Velociraptor allows for those to require high permissions like EXECVE to launch.\n\nThe Admin.Client.UpdateClientConfig is an artifact used to update the client\u0027s configuration. This artifact did not enforce an additional required permission, allowing users with COLLECT_CLIENT permissions (normally given by the \"Investigator\" role) to collect it from endpoints and update the configuration. \n\nThis can lead to arbitrary command execution and endpoint takeover.\n\nTo successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint (i.e. have the COLLECT_CLIENT given typically by the \"Investigator\u0027 role).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6264", "url": "https://www.suse.com/security/cve/CVE-2025-6264" }, { "category": "external", "summary": "SUSE Bug 1245123 for CVE-2025-6264", "url": "https://bugzilla.suse.com/1245123" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6264" }, { "cve": "CVE-2025-6624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6624" } ], "notes": [ { "category": "general", "text": "Versions of the package snyk before 1.1297.3 are vulnerable to Insertion of Sensitive Information into Log File through local Snyk CLI debug logs. Container Registry credentials provided via environment variables or command line arguments can be exposed when executing Snyk CLI in DEBUG or DEBUG/TRACE mode.\r\rThe issue affects the following Snyk commands:\r\r1. When snyk container test or snyk container monitor commands are run against a container registry, with debug mode enabled, the container registry credentials may be written into the local Snyk CLI debug log. This only happens with credentials specified in environment variables (SNYK_REGISTRY_USERNAME and SNYK_REGISTRY_PASSWORD), or in the CLI (--password/-p and --username/-u).\r\r2. When snyk auth command is executed with debug mode enabled AND the log level is set to TRACE, the Snyk access / refresh credential tokens used to connect the CLI to Snyk may be written into the local CLI debug logs.\r\r3. When snyk iac test is executed with a Remote IAC Custom rules bundle, debug mode enabled, AND the log level is set to TRACE, the docker registry token may be written into the local CLI debug logs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6624", "url": "https://www.suse.com/security/cve/CVE-2025-6624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6624" } ] }
opensuse-su-2025:15330-1
Vulnerability from csaf_opensuse
Published
2025-07-09 00:00
Modified
2025-07-09 00:00
Summary
go1.25-1.25rc2-1.1 on GA media
Notes
Title of the patch
go1.25-1.25rc2-1.1 on GA media
Description of the patch
These are all security issues fixed in the go1.25-1.25rc2-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15330
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "go1.25-1.25rc2-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the go1.25-1.25rc2-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15330", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15330-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" } ], "title": "go1.25-1.25rc2-1.1 on GA media", "tracking": { "current_release_date": "2025-07-09T00:00:00Z", "generator": { "date": "2025-07-09T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15330-1", "initial_release_date": "2025-07-09T00:00:00Z", "revision_history": [ { "date": "2025-07-09T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.25-1.25rc2-1.1.aarch64", "product": { "name": "go1.25-1.25rc2-1.1.aarch64", "product_id": "go1.25-1.25rc2-1.1.aarch64" } }, { "category": "product_version", "name": "go1.25-doc-1.25rc2-1.1.aarch64", "product": { "name": "go1.25-doc-1.25rc2-1.1.aarch64", "product_id": "go1.25-doc-1.25rc2-1.1.aarch64" } }, { "category": "product_version", "name": "go1.25-libstd-1.25rc2-1.1.aarch64", "product": { "name": "go1.25-libstd-1.25rc2-1.1.aarch64", "product_id": "go1.25-libstd-1.25rc2-1.1.aarch64" } }, { "category": "product_version", "name": "go1.25-race-1.25rc2-1.1.aarch64", "product": { "name": "go1.25-race-1.25rc2-1.1.aarch64", "product_id": "go1.25-race-1.25rc2-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.25-1.25rc2-1.1.ppc64le", "product": { "name": "go1.25-1.25rc2-1.1.ppc64le", "product_id": "go1.25-1.25rc2-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.25-doc-1.25rc2-1.1.ppc64le", "product": { "name": "go1.25-doc-1.25rc2-1.1.ppc64le", "product_id": "go1.25-doc-1.25rc2-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.25-libstd-1.25rc2-1.1.ppc64le", "product": { "name": "go1.25-libstd-1.25rc2-1.1.ppc64le", "product_id": "go1.25-libstd-1.25rc2-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.25-race-1.25rc2-1.1.ppc64le", "product": { "name": "go1.25-race-1.25rc2-1.1.ppc64le", "product_id": "go1.25-race-1.25rc2-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.25-1.25rc2-1.1.s390x", "product": { "name": "go1.25-1.25rc2-1.1.s390x", "product_id": "go1.25-1.25rc2-1.1.s390x" } }, { "category": "product_version", "name": "go1.25-doc-1.25rc2-1.1.s390x", "product": { "name": "go1.25-doc-1.25rc2-1.1.s390x", "product_id": "go1.25-doc-1.25rc2-1.1.s390x" } }, { "category": "product_version", "name": "go1.25-libstd-1.25rc2-1.1.s390x", "product": { "name": "go1.25-libstd-1.25rc2-1.1.s390x", "product_id": "go1.25-libstd-1.25rc2-1.1.s390x" } }, { "category": "product_version", "name": "go1.25-race-1.25rc2-1.1.s390x", "product": { "name": "go1.25-race-1.25rc2-1.1.s390x", "product_id": "go1.25-race-1.25rc2-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.25-1.25rc2-1.1.x86_64", "product": { "name": "go1.25-1.25rc2-1.1.x86_64", "product_id": "go1.25-1.25rc2-1.1.x86_64" } }, { "category": "product_version", "name": "go1.25-doc-1.25rc2-1.1.x86_64", "product": { "name": "go1.25-doc-1.25rc2-1.1.x86_64", "product_id": "go1.25-doc-1.25rc2-1.1.x86_64" } }, { "category": "product_version", "name": "go1.25-libstd-1.25rc2-1.1.x86_64", "product": { "name": "go1.25-libstd-1.25rc2-1.1.x86_64", "product_id": "go1.25-libstd-1.25rc2-1.1.x86_64" } }, { "category": "product_version", "name": "go1.25-race-1.25rc2-1.1.x86_64", "product": { "name": "go1.25-race-1.25rc2-1.1.x86_64", "product_id": "go1.25-race-1.25rc2-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.25-1.25rc2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.aarch64" }, "product_reference": "go1.25-1.25rc2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-1.25rc2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.ppc64le" }, "product_reference": "go1.25-1.25rc2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-1.25rc2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.s390x" }, "product_reference": "go1.25-1.25rc2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-1.25rc2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.x86_64" }, "product_reference": "go1.25-1.25rc2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-doc-1.25rc2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.aarch64" }, "product_reference": "go1.25-doc-1.25rc2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-doc-1.25rc2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.ppc64le" }, "product_reference": "go1.25-doc-1.25rc2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-doc-1.25rc2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.s390x" }, "product_reference": "go1.25-doc-1.25rc2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-doc-1.25rc2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.x86_64" }, "product_reference": "go1.25-doc-1.25rc2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-libstd-1.25rc2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.aarch64" }, "product_reference": "go1.25-libstd-1.25rc2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-libstd-1.25rc2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.ppc64le" }, "product_reference": "go1.25-libstd-1.25rc2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-libstd-1.25rc2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.s390x" }, "product_reference": "go1.25-libstd-1.25rc2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-libstd-1.25rc2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.x86_64" }, "product_reference": "go1.25-libstd-1.25rc2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-race-1.25rc2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.aarch64" }, "product_reference": "go1.25-race-1.25rc2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-race-1.25rc2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.ppc64le" }, "product_reference": "go1.25-race-1.25rc2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-race-1.25rc2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.s390x" }, "product_reference": "go1.25-race-1.25rc2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-race-1.25rc2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.x86_64" }, "product_reference": "go1.25-race-1.25rc2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-09T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4674" } ] }
opensuse-su-2025:15329-1
Vulnerability from csaf_opensuse
Published
2025-07-09 00:00
Modified
2025-07-09 00:00
Summary
go1.24-1.24.5-1.1 on GA media
Notes
Title of the patch
go1.24-1.24.5-1.1 on GA media
Description of the patch
These are all security issues fixed in the go1.24-1.24.5-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15329
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "go1.24-1.24.5-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the go1.24-1.24.5-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15329", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15329-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" } ], "title": "go1.24-1.24.5-1.1 on GA media", "tracking": { "current_release_date": "2025-07-09T00:00:00Z", "generator": { "date": "2025-07-09T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15329-1", "initial_release_date": "2025-07-09T00:00:00Z", "revision_history": [ { "date": "2025-07-09T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-1.1.aarch64", "product": { "name": "go1.24-1.24.5-1.1.aarch64", "product_id": "go1.24-1.24.5-1.1.aarch64" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-1.1.aarch64", "product": { "name": "go1.24-doc-1.24.5-1.1.aarch64", "product_id": "go1.24-doc-1.24.5-1.1.aarch64" } }, { "category": "product_version", "name": "go1.24-libstd-1.24.5-1.1.aarch64", "product": { "name": "go1.24-libstd-1.24.5-1.1.aarch64", "product_id": "go1.24-libstd-1.24.5-1.1.aarch64" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-1.1.aarch64", "product": { "name": "go1.24-race-1.24.5-1.1.aarch64", "product_id": "go1.24-race-1.24.5-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-1.1.ppc64le", "product": { "name": "go1.24-1.24.5-1.1.ppc64le", "product_id": "go1.24-1.24.5-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-1.1.ppc64le", "product": { "name": "go1.24-doc-1.24.5-1.1.ppc64le", "product_id": "go1.24-doc-1.24.5-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-libstd-1.24.5-1.1.ppc64le", "product": { "name": "go1.24-libstd-1.24.5-1.1.ppc64le", "product_id": "go1.24-libstd-1.24.5-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-1.1.ppc64le", "product": { "name": "go1.24-race-1.24.5-1.1.ppc64le", "product_id": "go1.24-race-1.24.5-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-1.1.s390x", "product": { "name": "go1.24-1.24.5-1.1.s390x", "product_id": "go1.24-1.24.5-1.1.s390x" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-1.1.s390x", "product": { "name": "go1.24-doc-1.24.5-1.1.s390x", "product_id": "go1.24-doc-1.24.5-1.1.s390x" } }, { "category": "product_version", "name": "go1.24-libstd-1.24.5-1.1.s390x", "product": { "name": "go1.24-libstd-1.24.5-1.1.s390x", "product_id": "go1.24-libstd-1.24.5-1.1.s390x" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-1.1.s390x", "product": { "name": "go1.24-race-1.24.5-1.1.s390x", "product_id": "go1.24-race-1.24.5-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-1.1.x86_64", "product": { "name": "go1.24-1.24.5-1.1.x86_64", "product_id": "go1.24-1.24.5-1.1.x86_64" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-1.1.x86_64", "product": { "name": "go1.24-doc-1.24.5-1.1.x86_64", "product_id": "go1.24-doc-1.24.5-1.1.x86_64" } }, { "category": "product_version", "name": "go1.24-libstd-1.24.5-1.1.x86_64", "product": { "name": "go1.24-libstd-1.24.5-1.1.x86_64", "product_id": "go1.24-libstd-1.24.5-1.1.x86_64" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-1.1.x86_64", "product": { "name": "go1.24-race-1.24.5-1.1.x86_64", "product_id": "go1.24-race-1.24.5-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-1.24.5-1.1.aarch64" }, "product_reference": "go1.24-1.24.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-1.24.5-1.1.ppc64le" }, "product_reference": "go1.24-1.24.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-1.24.5-1.1.s390x" }, "product_reference": "go1.24-1.24.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-1.24.5-1.1.x86_64" }, "product_reference": "go1.24-1.24.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.s390x" }, "product_reference": "go1.24-doc-1.24.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-libstd-1.24.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.aarch64" }, "product_reference": "go1.24-libstd-1.24.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-libstd-1.24.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.ppc64le" }, "product_reference": "go1.24-libstd-1.24.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-libstd-1.24.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.s390x" }, "product_reference": "go1.24-libstd-1.24.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-libstd-1.24.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.x86_64" }, "product_reference": "go1.24-libstd-1.24.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.s390x" }, "product_reference": "go1.24-race-1.24.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.24-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.24-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.24-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-09T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4674" } ] }
opensuse-su-2025:15328-1
Vulnerability from csaf_opensuse
Published
2025-07-09 00:00
Modified
2025-07-09 00:00
Summary
go1.23-1.23.11-1.1 on GA media
Notes
Title of the patch
go1.23-1.23.11-1.1 on GA media
Description of the patch
These are all security issues fixed in the go1.23-1.23.11-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15328
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "go1.23-1.23.11-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the go1.23-1.23.11-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15328", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15328-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" } ], "title": "go1.23-1.23.11-1.1 on GA media", "tracking": { "current_release_date": "2025-07-09T00:00:00Z", "generator": { "date": "2025-07-09T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15328-1", "initial_release_date": "2025-07-09T00:00:00Z", "revision_history": [ { "date": "2025-07-09T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-1.1.aarch64", "product": { "name": "go1.23-1.23.11-1.1.aarch64", "product_id": "go1.23-1.23.11-1.1.aarch64" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-1.1.aarch64", "product": { "name": "go1.23-doc-1.23.11-1.1.aarch64", "product_id": "go1.23-doc-1.23.11-1.1.aarch64" } }, { "category": "product_version", "name": "go1.23-libstd-1.23.11-1.1.aarch64", "product": { "name": "go1.23-libstd-1.23.11-1.1.aarch64", "product_id": "go1.23-libstd-1.23.11-1.1.aarch64" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-1.1.aarch64", "product": { "name": "go1.23-race-1.23.11-1.1.aarch64", "product_id": "go1.23-race-1.23.11-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-1.1.ppc64le", "product": { "name": "go1.23-1.23.11-1.1.ppc64le", "product_id": "go1.23-1.23.11-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-1.1.ppc64le", "product": { "name": "go1.23-doc-1.23.11-1.1.ppc64le", "product_id": "go1.23-doc-1.23.11-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-libstd-1.23.11-1.1.ppc64le", "product": { "name": "go1.23-libstd-1.23.11-1.1.ppc64le", "product_id": "go1.23-libstd-1.23.11-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-1.1.ppc64le", "product": { "name": "go1.23-race-1.23.11-1.1.ppc64le", "product_id": "go1.23-race-1.23.11-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-1.1.s390x", "product": { "name": "go1.23-1.23.11-1.1.s390x", "product_id": "go1.23-1.23.11-1.1.s390x" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-1.1.s390x", "product": { "name": "go1.23-doc-1.23.11-1.1.s390x", "product_id": "go1.23-doc-1.23.11-1.1.s390x" } }, { "category": "product_version", "name": "go1.23-libstd-1.23.11-1.1.s390x", "product": { "name": "go1.23-libstd-1.23.11-1.1.s390x", "product_id": "go1.23-libstd-1.23.11-1.1.s390x" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-1.1.s390x", "product": { "name": "go1.23-race-1.23.11-1.1.s390x", "product_id": "go1.23-race-1.23.11-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-1.1.x86_64", "product": { "name": "go1.23-1.23.11-1.1.x86_64", "product_id": "go1.23-1.23.11-1.1.x86_64" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-1.1.x86_64", "product": { "name": "go1.23-doc-1.23.11-1.1.x86_64", "product_id": "go1.23-doc-1.23.11-1.1.x86_64" } }, { "category": "product_version", "name": "go1.23-libstd-1.23.11-1.1.x86_64", "product": { "name": "go1.23-libstd-1.23.11-1.1.x86_64", "product_id": "go1.23-libstd-1.23.11-1.1.x86_64" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-1.1.x86_64", "product": { "name": "go1.23-race-1.23.11-1.1.x86_64", "product_id": "go1.23-race-1.23.11-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-1.23.11-1.1.aarch64" }, "product_reference": "go1.23-1.23.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-1.23.11-1.1.ppc64le" }, "product_reference": "go1.23-1.23.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-1.23.11-1.1.s390x" }, "product_reference": "go1.23-1.23.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-1.23.11-1.1.x86_64" }, "product_reference": "go1.23-1.23.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.s390x" }, "product_reference": "go1.23-doc-1.23.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-libstd-1.23.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.aarch64" }, "product_reference": "go1.23-libstd-1.23.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-libstd-1.23.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.ppc64le" }, "product_reference": "go1.23-libstd-1.23.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-libstd-1.23.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.s390x" }, "product_reference": "go1.23-libstd-1.23.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-libstd-1.23.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.x86_64" }, "product_reference": "go1.23-libstd-1.23.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.s390x" }, "product_reference": "go1.23-race-1.23.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.23-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.23-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.23-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-09T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4674" } ] }
suse-su-2025:02812-1
Vulnerability from csaf_suse
Published
2025-08-15 12:52
Modified
2025-08-15 12:52
Summary
Security update for go1.23-openssl
Notes
Title of the patch
Security update for go1.23-openssl
Description of the patch
This update for go1.23-openssl fixes the following issues:
Updated to go1.23.12 (released 2025-08-06) (bsc#1229122):
- CVE-2025-4674: Fixed unexpected command execution in untrusted VCS repositories in cmd/go (bsc#1246118)
- CVE-2025-47906: Fixed incorrect expansion of '', '.' and '..' in some PATH configurations in LookPath in osc/exec (bsc#1247719)
- CVE-2025-47907: Fixed incorrect results returned from Rows.Scan in database/sql (bsc#1247720)
Updated to version 1.23.12 cut from the go1.23-fips-release
branch at the revision tagged go1.23.12-1-openssl-fips (jsc#SLE-18320)
- Fix HKDF-Extract The latest OpenSSL in c9s/c10s requires nil
salt to be passed as a hash length buffer of zeros.
Other fixes:
- runtime: use-after-free of allpSnapshot in findRunnable
- runtime: segfaults in runtime.(*unwinder).next
- cmd/go: TestScript/build_trimpath_cgo fails to decode dwarf on release-branch.go1.23
- cmd/cgo/internal/testsanitizers: failures with signal: segmentation fault or exit status 66
- runtime: bad frame pointer during panic during duffcopy
- runtime: heap mspan limit is set too late, causing data race between span allocation and conservative scanning
- internal/trace: stress tests triggering suspected deadlock in tracer
- runtime/pprof: crash 'cannot read stack of running goroutine' in goroutine profile
- cmd/link: duplicated definition of symbol github.com/ebitengine/purego.syscall15XABI0 when running with ASAN
Patchnames
SUSE-2025-2812,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2812,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2812,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2812,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2812,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2812,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2812,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2812,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2812,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2812,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2812,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2812,SUSE-Storage-7.1-2025-2812
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.23-openssl", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.23-openssl fixes the following issues:\n\nUpdated to go1.23.12 (released 2025-08-06) (bsc#1229122): \n - CVE-2025-4674: Fixed unexpected command execution in untrusted VCS repositories in cmd/go (bsc#1246118) \n - CVE-2025-47906: Fixed incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations in LookPath in osc/exec (bsc#1247719) \n - CVE-2025-47907: Fixed incorrect results returned from Rows.Scan in database/sql (bsc#1247720) \n\nUpdated to version 1.23.12 cut from the go1.23-fips-release\nbranch at the revision tagged go1.23.12-1-openssl-fips (jsc#SLE-18320)\n - Fix HKDF-Extract The latest OpenSSL in c9s/c10s requires nil\n salt to be passed as a hash length buffer of zeros.\n \nOther fixes:\n - runtime: use-after-free of allpSnapshot in findRunnable\n - runtime: segfaults in runtime.(*unwinder).next\n - cmd/go: TestScript/build_trimpath_cgo fails to decode dwarf on release-branch.go1.23\n - cmd/cgo/internal/testsanitizers: failures with signal: segmentation fault or exit status 66\n - runtime: bad frame pointer during panic during duffcopy\n - runtime: heap mspan limit is set too late, causing data race between span allocation and conservative scanning\n - internal/trace: stress tests triggering suspected deadlock in tracer\n - runtime/pprof: crash \u0027cannot read stack of running goroutine\u0027 in goroutine profile\n - cmd/link: duplicated definition of symbol github.com/ebitengine/purego.syscall15XABI0 when running with ASAN \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2812,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2812,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2812,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2812,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2812,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2812,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2812,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2812,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2812,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2812,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2812,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2812,SUSE-Storage-7.1-2025-2812", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02812-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02812-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502812-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02812-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041227.html" }, { "category": "self", "summary": "SUSE Bug 1229122", "url": "https://bugzilla.suse.com/1229122" }, { "category": "self", "summary": "SUSE Bug 1246118", "url": "https://bugzilla.suse.com/1246118" }, { "category": "self", "summary": "SUSE Bug 1247719", "url": "https://bugzilla.suse.com/1247719" }, { "category": "self", "summary": "SUSE Bug 1247720", "url": "https://bugzilla.suse.com/1247720" }, { "category": "self", "summary": "SUSE Bug 1247816", "url": "https://bugzilla.suse.com/1247816" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47906 page", "url": "https://www.suse.com/security/cve/CVE-2025-47906/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47907 page", "url": "https://www.suse.com/security/cve/CVE-2025-47907/" } ], "title": "Security update for go1.23-openssl", "tracking": { "current_release_date": "2025-08-15T12:52:43Z", "generator": { "date": "2025-08-15T12:52:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02812-1", "initial_release_date": "2025-08-15T12:52:43Z", "revision_history": [ { "date": "2025-08-15T12:52:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "product": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "product_id": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "product": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "product_id": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "product": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "product_id": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150000.1.18.1.i586", "product": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.i586", "product_id": "go1.23-openssl-1.23.12-150000.1.18.1.i586" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.i586", "product": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.i586", "product_id": "go1.23-openssl-doc-1.23.12-150000.1.18.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "product": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "product_id": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "product": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "product_id": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "product": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "product_id": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150000.1.18.1.s390x", "product": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.s390x", "product_id": "go1.23-openssl-1.23.12-150000.1.18.1.s390x" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "product": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "product_id": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "product": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "product_id": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "product": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "product_id": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "product": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "product_id": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "product": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "product_id": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T12:52:43Z", "details": "important" } ], "title": "CVE-2025-4674" }, { "cve": "CVE-2025-47906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47906" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47906", "url": "https://www.suse.com/security/cve/CVE-2025-47906" }, { "category": "external", "summary": "SUSE Bug 1247719 for CVE-2025-47906", "url": "https://bugzilla.suse.com/1247719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T12:52:43Z", "details": "moderate" } ], "title": "CVE-2025-47906" }, { "cve": "CVE-2025-47907", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47907" } ], "notes": [ { "category": "general", "text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47907", "url": "https://www.suse.com/security/cve/CVE-2025-47907" }, { "category": "external", "summary": "SUSE Bug 1247720 for CVE-2025-47907", "url": "https://bugzilla.suse.com/1247720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T12:52:43Z", "details": "moderate" } ], "title": "CVE-2025-47907" } ] }
suse-su-2025:03158-1
Vulnerability from csaf_suse
Published
2025-09-11 03:04
Modified
2025-09-11 03:04
Summary
Security update for go1.24-openssl
Notes
Title of the patch
Security update for go1.24-openssl
Description of the patch
This security update of go1.24-openssl fixes the following issues:
Update to version 1.24.6 cut from the go1.24-fips-release
branch at the revision tagged go1.24.6-1-openssl-fips.
Refs jsc#SLE-18320
* Fix HKDF-Extract The latest OpenSSL in c9s/c10s requires nil
salt to be passed as a hash length buffer of zeros.
go1.24.6 (released 2025-08-06) includes security fixes to the
database/sql and os/exec packages, as well as bug fixes to the
runtime. ( boo#1236217 go1.24 release tracking)
CVE-2025-47906 CVE-2025-47907:
* go#74804 go#74466 boo#1247719 security: fix CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of '', '.' and '..' in some PATH configurations
* go#74833 go#74831 boo#1247720 security: fix CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan
* go#73800 runtime: RSS seems to have increased in Go 1.24 while the runtime accounting has not
* go#74416 runtime: use-after-free of allpSnapshot in findRunnable
* go#74694 runtime: segfaults in runtime.(*unwinder).next
* go#74760 os/user:nolibgcc: TestGroupIdsTestUser failures
go1.24.5 (released 2025-07-08) includes security fixes to the go
command, as well as bug fixes to the compiler, the linker, the , and
the go command. ( boo#1236217 go1.24 release tracking)
j
CVE-2025-4674:
* go#74381 go#74380 boo#1246118 security: fix CVE-2025-4674 cmd/go: disable support for multiple vcs in one module
* go#73908 runtime: bad frame pointer during panic during duffcopy
* go#74098 cmd/compile: regression on ppc64le bit operations
* go#74113 cmd/go: crash on unknown GOEXPERIMENT during toolchain selection
* go#74290 runtime: heap mspan limit is set too late, causing data race between span allocation and conservative scanning
* go#74294 internal/trace: stress tests triggering suspected deadlock in tracer
* go#74346 runtime: memlock not unlocked in all control flow paths in sysReserveAlignedSbrk
* go#74363 runtime/pprof: crash 'cannot read stack of running goroutine' in goroutine profile
* go#74403 cmd/link: duplicated definition of symbol github.com/ebitengine/purego.syscall15XABI0 when running with ASAN
go1.24.4 (released 2025-06-05) includes security fixes to the
crypto/x509, net/http, and os packages, as well as bug fixes to
the linker, the go command, and the hash/maphash and os packages.
( boo#1236217 go1.24 release tracking)
CVE-2025-22874 CVE-2025-0913 CVE-2025-4673
* go#73700 go#73702 boo#1244158 security: fix CVE-2025-22874 crypto/x509: ExtKeyUsageAny bypasses policy validation
* go#73720 go#73612 boo#1244157 security: fix CVE-2025-0913 os: inconsistent handling of O_CREATE|O_EXCL on Unix and Windows
* go#73906 go#73816 boo#1244156 security: fix CVE-2025-4673 net/http: sensitive headers not cleared on cross-origin redirect
* go#73570 os: Root.Mkdir creates directories with zero permissions on OpenBSD
* go#73669 hash/maphash: hashing channels with purego impl. of maphash.Comparable panics
* go#73678 runtime/debug: BuildSetting does not document DefaultGODEBUG
* go#73809 cmd/go: add fips140 module selection mechanism
* go#73832 cmd/link: Go 1.24.3 and 1.23.9 regression - duplicated definition of symbol dlopen
Patchnames
SUSE-2025-3158,SUSE-SLE-Module-Development-Tools-15-SP6-2025-3158,SUSE-SLE-Module-Development-Tools-15-SP7-2025-3158,openSUSE-SLE-15.6-2025-3158
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.24-openssl", "title": "Title of the patch" }, { "category": "description", "text": "\nThis security update of go1.24-openssl fixes the following issues:\n\nUpdate to version 1.24.6 cut from the go1.24-fips-release\nbranch at the revision tagged go1.24.6-1-openssl-fips.\nRefs jsc#SLE-18320\n\n* Fix HKDF-Extract The latest OpenSSL in c9s/c10s requires nil\n salt to be passed as a hash length buffer of zeros.\n\ngo1.24.6 (released 2025-08-06) includes security fixes to the\ndatabase/sql and os/exec packages, as well as bug fixes to the\nruntime. ( boo#1236217 go1.24 release tracking)\n\nCVE-2025-47906 CVE-2025-47907:\n\n* go#74804 go#74466 boo#1247719 security: fix CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations\n* go#74833 go#74831 boo#1247720 security: fix CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan\n\n* go#73800 runtime: RSS seems to have increased in Go 1.24 while the runtime accounting has not\n* go#74416 runtime: use-after-free of allpSnapshot in findRunnable\n* go#74694 runtime: segfaults in runtime.(*unwinder).next\n* go#74760 os/user:nolibgcc: TestGroupIdsTestUser failures\n\ngo1.24.5 (released 2025-07-08) includes security fixes to the go\ncommand, as well as bug fixes to the compiler, the linker, the , and\nthe go command. ( boo#1236217 go1.24 release tracking)\nj\nCVE-2025-4674:\n\n* go#74381 go#74380 boo#1246118 security: fix CVE-2025-4674 cmd/go: disable support for multiple vcs in one module\n\n* go#73908 runtime: bad frame pointer during panic during duffcopy\n* go#74098 cmd/compile: regression on ppc64le bit operations\n* go#74113 cmd/go: crash on unknown GOEXPERIMENT during toolchain selection\n* go#74290 runtime: heap mspan limit is set too late, causing data race between span allocation and conservative scanning\n* go#74294 internal/trace: stress tests triggering suspected deadlock in tracer\n* go#74346 runtime: memlock not unlocked in all control flow paths in sysReserveAlignedSbrk\n* go#74363 runtime/pprof: crash \u0027cannot read stack of running goroutine\u0027 in goroutine profile\n* go#74403 cmd/link: duplicated definition of symbol github.com/ebitengine/purego.syscall15XABI0 when running with ASAN\n\ngo1.24.4 (released 2025-06-05) includes security fixes to the\ncrypto/x509, net/http, and os packages, as well as bug fixes to\nthe linker, the go command, and the hash/maphash and os packages.\n( boo#1236217 go1.24 release tracking)\n\nCVE-2025-22874 CVE-2025-0913 CVE-2025-4673\n* go#73700 go#73702 boo#1244158 security: fix CVE-2025-22874 crypto/x509: ExtKeyUsageAny bypasses policy validation\n* go#73720 go#73612 boo#1244157 security: fix CVE-2025-0913 os: inconsistent handling of O_CREATE|O_EXCL on Unix and Windows\n* go#73906 go#73816 boo#1244156 security: fix CVE-2025-4673 net/http: sensitive headers not cleared on cross-origin redirect\n\n* go#73570 os: Root.Mkdir creates directories with zero permissions on OpenBSD\n* go#73669 hash/maphash: hashing channels with purego impl. of maphash.Comparable panics\n* go#73678 runtime/debug: BuildSetting does not document DefaultGODEBUG\n* go#73809 cmd/go: add fips140 module selection mechanism\n* go#73832 cmd/link: Go 1.24.3 and 1.23.9 regression - duplicated definition of symbol dlopen\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-3158,SUSE-SLE-Module-Development-Tools-15-SP6-2025-3158,SUSE-SLE-Module-Development-Tools-15-SP7-2025-3158,openSUSE-SLE-15.6-2025-3158", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_03158-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:03158-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503158-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:03158-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-September/041648.html" }, { "category": "self", "summary": "SUSE Bug 1236217", "url": "https://bugzilla.suse.com/1236217" }, { "category": "self", "summary": "SUSE Bug 1244156", "url": "https://bugzilla.suse.com/1244156" }, { "category": "self", "summary": "SUSE Bug 1244157", "url": "https://bugzilla.suse.com/1244157" }, { "category": "self", "summary": "SUSE Bug 1244158", "url": "https://bugzilla.suse.com/1244158" }, { "category": "self", "summary": "SUSE Bug 1246118", "url": "https://bugzilla.suse.com/1246118" }, { "category": "self", "summary": "SUSE Bug 1247719", "url": "https://bugzilla.suse.com/1247719" }, { "category": "self", "summary": "SUSE Bug 1247720", "url": "https://bugzilla.suse.com/1247720" }, { "category": "self", "summary": "SUSE CVE CVE-2025-0913 page", "url": "https://www.suse.com/security/cve/CVE-2025-0913/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22874 page", "url": "https://www.suse.com/security/cve/CVE-2025-22874/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4673 page", "url": "https://www.suse.com/security/cve/CVE-2025-4673/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47906 page", "url": "https://www.suse.com/security/cve/CVE-2025-47906/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47907 page", "url": "https://www.suse.com/security/cve/CVE-2025-47907/" } ], "title": "Security update for go1.24-openssl", "tracking": { "current_release_date": "2025-09-11T03:04:46Z", "generator": { "date": "2025-09-11T03:04:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:03158-1", "initial_release_date": "2025-09-11T03:04:46Z", "revision_history": [ { "date": "2025-09-11T03:04:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "product": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "product_id": "go1.24-openssl-1.24.6-150600.13.9.1.aarch64" } }, { "category": "product_version", "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "product": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "product_id": "go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64" } }, { "category": "product_version", "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "product": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "product_id": "go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.24-openssl-1.24.6-150600.13.9.1.i586", "product": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.i586", "product_id": "go1.24-openssl-1.24.6-150600.13.9.1.i586" } }, { "category": "product_version", "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.i586", "product": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.i586", "product_id": "go1.24-openssl-doc-1.24.6-150600.13.9.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "product": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "product_id": "go1.24-openssl-1.24.6-150600.13.9.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "product": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "product_id": "go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "product": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "product_id": "go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.24-openssl-1.24.6-150600.13.9.1.s390x", "product": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.s390x", "product_id": "go1.24-openssl-1.24.6-150600.13.9.1.s390x" } }, { "category": "product_version", "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "product": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "product_id": "go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x" } }, { "category": "product_version", "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "product": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "product_id": "go1.24-openssl-race-1.24.6-150600.13.9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "product": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "product_id": "go1.24-openssl-1.24.6-150600.13.9.1.x86_64" } }, { "category": "product_version", "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "product": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "product_id": "go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64" } }, { "category": "product_version", "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "product": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "product_id": "go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64" }, "product_reference": "go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le" }, "product_reference": "go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x" }, "product_reference": "go1.24-openssl-1.24.6-150600.13.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le" }, "product_reference": "go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x" }, "product_reference": "go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64" }, "product_reference": "go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le" }, "product_reference": "go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x" }, "product_reference": "go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64" }, "product_reference": "go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le" }, "product_reference": "go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x" }, "product_reference": "go1.24-openssl-1.24.6-150600.13.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le" }, "product_reference": "go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x" }, "product_reference": "go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64" }, "product_reference": "go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le" }, "product_reference": "go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x" }, "product_reference": "go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64" }, "product_reference": "go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le" }, "product_reference": "go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x" }, "product_reference": "go1.24-openssl-1.24.6-150600.13.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le" }, "product_reference": "go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x" }, "product_reference": "go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64" }, "product_reference": "go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le" }, "product_reference": "go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x" }, "product_reference": "go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-0913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-0913" } ], "notes": [ { "category": "general", "text": "os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. On Windows, when the target path was a symlink to a nonexistent location, OpenFile would create a file in that location. OpenFile now always returns an error when the O_CREATE and O_EXCL flags are both set and the target path is a symlink.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-0913", "url": "https://www.suse.com/security/cve/CVE-2025-0913" }, { "category": "external", "summary": "SUSE Bug 1244157 for CVE-2025-0913", "url": "https://bugzilla.suse.com/1244157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:04:46Z", "details": "moderate" } ], "title": "CVE-2025-0913" }, { "cve": "CVE-2025-22874", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22874" } ], "notes": [ { "category": "general", "text": "Calling Verify with a VerifyOptions.KeyUsages that contains ExtKeyUsageAny unintentionally disabledpolicy validation. This only affected certificate chains which contain policy graphs, which are rather uncommon.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22874", "url": "https://www.suse.com/security/cve/CVE-2025-22874" }, { "category": "external", "summary": "SUSE Bug 1244158 for CVE-2025-22874", "url": "https://bugzilla.suse.com/1244158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:04:46Z", "details": "important" } ], "title": "CVE-2025-22874" }, { "cve": "CVE-2025-4673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4673" } ], "notes": [ { "category": "general", "text": "Proxy-Authorization and Proxy-Authenticate headers persisted on cross-origin redirects potentially leaking sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4673", "url": "https://www.suse.com/security/cve/CVE-2025-4673" }, { "category": "external", "summary": "SUSE Bug 1244156 for CVE-2025-4673", "url": "https://bugzilla.suse.com/1244156" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:04:46Z", "details": "moderate" } ], "title": "CVE-2025-4673" }, { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:04:46Z", "details": "important" } ], "title": "CVE-2025-4674" }, { "cve": "CVE-2025-47906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47906" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47906", "url": "https://www.suse.com/security/cve/CVE-2025-47906" }, { "category": "external", "summary": "SUSE Bug 1247719 for CVE-2025-47906", "url": "https://bugzilla.suse.com/1247719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:04:46Z", "details": "moderate" } ], "title": "CVE-2025-47906" }, { "cve": "CVE-2025-47907", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47907" } ], "notes": [ { "category": "general", "text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47907", "url": "https://www.suse.com/security/cve/CVE-2025-47907" }, { "category": "external", "summary": "SUSE Bug 1247720 for CVE-2025-47907", "url": "https://bugzilla.suse.com/1247720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.6-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.24-openssl-race-1.24.6-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:04:46Z", "details": "moderate" } ], "title": "CVE-2025-47907" } ] }
suse-su-2025:02296-1
Vulnerability from csaf_suse
Published
2025-07-11 15:20
Modified
2025-07-11 15:20
Summary
Security update for go1.23
Notes
Title of the patch
Security update for go1.23
Description of the patch
This update for go1.23 fixes the following issues:
- Update to version go1.23.11
- CVE-2025-4674: Fixed potential command execution in untrusted VCS repositories. (bsc#1246118)
Patchnames
SUSE-2025-2296,SUSE-SLE-Module-Development-Tools-15-SP6-2025-2296,SUSE-SLE-Module-Development-Tools-15-SP7-2025-2296,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2296,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2296,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2296,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2296,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2296,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2296,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2296,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2296,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2296,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2296,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2296,SUSE-Storage-7.1-2025-2296,openSUSE-SLE-15.6-2025-2296
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.23", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.23 fixes the following issues:\n\n- Update to version go1.23.11\n- CVE-2025-4674: Fixed potential command execution in untrusted VCS repositories. (bsc#1246118)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2296,SUSE-SLE-Module-Development-Tools-15-SP6-2025-2296,SUSE-SLE-Module-Development-Tools-15-SP7-2025-2296,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2296,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2296,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2296,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2296,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2296,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2296,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2296,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2296,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2296,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2296,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2296,SUSE-Storage-7.1-2025-2296,openSUSE-SLE-15.6-2025-2296", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02296-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02296-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502296-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02296-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040692.html" }, { "category": "self", "summary": "SUSE Bug 1229122", "url": "https://bugzilla.suse.com/1229122" }, { "category": "self", "summary": "SUSE Bug 1246118", "url": "https://bugzilla.suse.com/1246118" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" } ], "title": "Security update for go1.23", "tracking": { "current_release_date": "2025-07-11T15:20:05Z", "generator": { "date": "2025-07-11T15:20:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02296-1", "initial_release_date": "2025-07-11T15:20:05Z", "revision_history": [ { "date": "2025-07-11T15:20:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-150000.1.37.1.aarch64", "product": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64", "product_id": "go1.23-1.23.11-150000.1.37.1.aarch64" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "product": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "product_id": "go1.23-doc-1.23.11-150000.1.37.1.aarch64" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "product": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "product_id": "go1.23-race-1.23.11-150000.1.37.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-150000.1.37.1.i586", "product": { "name": "go1.23-1.23.11-150000.1.37.1.i586", "product_id": "go1.23-1.23.11-150000.1.37.1.i586" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-150000.1.37.1.i586", "product": { "name": "go1.23-doc-1.23.11-150000.1.37.1.i586", "product_id": "go1.23-doc-1.23.11-150000.1.37.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-150000.1.37.1.ppc64le", "product": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le", "product_id": "go1.23-1.23.11-150000.1.37.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "product": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "product_id": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "product": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "product_id": "go1.23-race-1.23.11-150000.1.37.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-150000.1.37.1.s390x", "product": { "name": "go1.23-1.23.11-150000.1.37.1.s390x", "product_id": "go1.23-1.23.11-150000.1.37.1.s390x" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "product": { "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "product_id": "go1.23-doc-1.23.11-150000.1.37.1.s390x" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-150000.1.37.1.s390x", "product": { "name": "go1.23-race-1.23.11-150000.1.37.1.s390x", "product_id": "go1.23-race-1.23.11-150000.1.37.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-150000.1.37.1.x86_64", "product": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64", "product_id": "go1.23-1.23.11-150000.1.37.1.x86_64" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "product": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "product_id": "go1.23-doc-1.23.11-150000.1.37.1.x86_64" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "product": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "product_id": "go1.23-race-1.23.11-150000.1.37.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-11T15:20:05Z", "details": "critical" } ], "title": "CVE-2025-4674" } ] }
suse-su-2025:02837-1
Vulnerability from csaf_suse
Published
2025-08-18 08:35
Modified
2025-08-18 08:35
Summary
Security update for go1.24-openssl
Notes
Title of the patch
Security update for go1.24-openssl
Description of the patch
This update for go1.24-openssl fixes the following issues:
Updated to go1.24.6 (released 2025-08-06) (bsc#1236217):
- CVE-2025-4674: Fixed unexpected command execution in untrusted VCS repositories in cmd/go (bsc#1246118)
- CVE-2025-47906: Fixed incorrect expansion of '', '.' and '..' in some PATH configurations in LookPath in osc/exec (bsc#1247719)
- CVE-2025-47907: Fixed incorrect results returned from Rows.Scan in database/sql (bsc#1247720)
Updated to version 1.24.6 cut from the go1.24-fips-release
branch at the revision tagged go1.24.6-1-openssl-fips. (jsc#SLE-18320)
- Fix HKDF-Extract The latest OpenSSL in c9s/c10s requires nil
salt to be passed as a hash length buffer of zeros.
Other fixes:
- cmd/compile: regression on ppc64le bit operations
- cmd/go: crash on unknown GOEXPERIMENT during toolchain selection
- cmd/link: duplicated definition of symbol github.com/ebitengine/purego.syscall15XABI0 when running with ASAN
- internal/trace: stress tests triggering suspected deadlock in tracer
- os/user:nolibgcc: TestGroupIdsTestUser failures
- runtime/pprof: crash 'cannot read stack of running goroutine' in goroutine profile
- runtime: RSS seems to have increased in Go 1.24 while the runtime accounting has not
- runtime: bad frame pointer during panic during duffcopy
- runtime: heap mspan limit is set too late, causing data race between span allocation and conservative scanning
- runtime: memlock not unlocked in all control flow paths in sysReserveAlignedSbrk
- runtime: segfaults in runtime.(*unwinder).next
- runtime: use-after-free of allpSnapshot in findRunnable
Patchnames
SUSE-2025-2837,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2837,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2837,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2837,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2837,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2837,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2837,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2837,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2837,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2837,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2837,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2837,SUSE-Storage-7.1-2025-2837
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.24-openssl", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.24-openssl fixes the following issues:\n\nUpdated to go1.24.6 (released 2025-08-06) (bsc#1236217):\n - CVE-2025-4674: Fixed unexpected command execution in untrusted VCS repositories in cmd/go (bsc#1246118)\n - CVE-2025-47906: Fixed incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations in LookPath in osc/exec (bsc#1247719)\n - CVE-2025-47907: Fixed incorrect results returned from Rows.Scan in database/sql (bsc#1247720)\n\nUpdated to version 1.24.6 cut from the go1.24-fips-release\nbranch at the revision tagged go1.24.6-1-openssl-fips. (jsc#SLE-18320)\n- Fix HKDF-Extract The latest OpenSSL in c9s/c10s requires nil\n salt to be passed as a hash length buffer of zeros.\n \nOther fixes:\n - cmd/compile: regression on ppc64le bit operations\n - cmd/go: crash on unknown GOEXPERIMENT during toolchain selection\n - cmd/link: duplicated definition of symbol github.com/ebitengine/purego.syscall15XABI0 when running with ASAN\n - internal/trace: stress tests triggering suspected deadlock in tracer\n - os/user:nolibgcc: TestGroupIdsTestUser failures\n - runtime/pprof: crash \u0027cannot read stack of running goroutine\u0027 in goroutine profile\n - runtime: RSS seems to have increased in Go 1.24 while the runtime accounting has not\n - runtime: bad frame pointer during panic during duffcopy\n - runtime: heap mspan limit is set too late, causing data race between span allocation and conservative scanning\n - runtime: memlock not unlocked in all control flow paths in sysReserveAlignedSbrk\n - runtime: segfaults in runtime.(*unwinder).next\n - runtime: use-after-free of allpSnapshot in findRunnable\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2837,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2837,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2837,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2837,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2837,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2837,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2837,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2837,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2837,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2837,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2837,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2837,SUSE-Storage-7.1-2025-2837", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02837-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02837-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502837-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02837-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041246.html" }, { "category": "self", "summary": "SUSE Bug 1236217", "url": "https://bugzilla.suse.com/1236217" }, { "category": "self", "summary": "SUSE Bug 1246118", "url": "https://bugzilla.suse.com/1246118" }, { "category": "self", "summary": "SUSE Bug 1247719", "url": "https://bugzilla.suse.com/1247719" }, { "category": "self", "summary": "SUSE Bug 1247720", "url": "https://bugzilla.suse.com/1247720" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47906 page", "url": "https://www.suse.com/security/cve/CVE-2025-47906/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47907 page", "url": "https://www.suse.com/security/cve/CVE-2025-47907/" } ], "title": "Security update for go1.24-openssl", "tracking": { "current_release_date": "2025-08-18T08:35:56Z", "generator": { "date": "2025-08-18T08:35:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02837-1", "initial_release_date": "2025-08-18T08:35:56Z", "revision_history": [ { "date": "2025-08-18T08:35:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "product": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "product_id": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64" } }, { "category": "product_version", "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "product": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "product_id": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64" } }, { "category": "product_version", "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "product": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "product_id": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.24-openssl-1.24.6-150000.1.12.1.i586", "product": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.i586", "product_id": "go1.24-openssl-1.24.6-150000.1.12.1.i586" } }, { "category": "product_version", "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.i586", "product": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.i586", "product_id": "go1.24-openssl-doc-1.24.6-150000.1.12.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "product": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "product_id": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "product": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "product_id": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "product": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "product_id": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.24-openssl-1.24.6-150000.1.12.1.s390x", "product": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.s390x", "product_id": "go1.24-openssl-1.24.6-150000.1.12.1.s390x" } }, { "category": "product_version", "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "product": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "product_id": "go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x" } }, { "category": "product_version", "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "product": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "product_id": "go1.24-openssl-race-1.24.6-150000.1.12.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "product": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "product_id": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64" } }, { "category": "product_version", "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "product": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "product_id": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64" } }, { "category": "product_version", "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "product": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "product_id": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" }, "product_reference": "go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T08:35:56Z", "details": "important" } ], "title": "CVE-2025-4674" }, { "cve": "CVE-2025-47906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47906" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47906", "url": "https://www.suse.com/security/cve/CVE-2025-47906" }, { "category": "external", "summary": "SUSE Bug 1247719 for CVE-2025-47906", "url": "https://bugzilla.suse.com/1247719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T08:35:56Z", "details": "moderate" } ], "title": "CVE-2025-47906" }, { "cve": "CVE-2025-47907", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47907" } ], "notes": [ { "category": "general", "text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47907", "url": "https://www.suse.com/security/cve/CVE-2025-47907" }, { "category": "external", "summary": "SUSE Bug 1247720 for CVE-2025-47907", "url": "https://bugzilla.suse.com/1247720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.6-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.6-150000.1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-18T08:35:56Z", "details": "moderate" } ], "title": "CVE-2025-47907" } ] }
suse-su-2025:03159-1
Vulnerability from csaf_suse
Published
2025-09-11 03:05
Modified
2025-09-11 03:05
Summary
Security update for go1.23-openssl
Notes
Title of the patch
Security update for go1.23-openssl
Description of the patch
This update for go1.23-openssl fixes the following issues:
Update to version 1.23.12 cut from the go1.23-fips-release branch at
the revision tagged go1.23.12-1-openssl-fips. ( jsc#SLE-18320)
* Rebase to 1.23.12
* Fix HKDF-Extract The latest OpenSSL in c9s/c10s requires nil
salt to be passed as a hash length buffer of zeros.
Packaging improvements:
* Update go_bootstrap_version to go1.21 from go1.20 to shorten
the bootstrap chain. go1.21 can optionally be bootstrapped with
gccgo and serve as the inital version of go1.x.
* Refs boo#1247816 bootstrap go1.21 with gccgo
go1.23.12 (released 2025-08-06) includes security fixes to the
database/sql and os/exec packages, as well as bug fixes to the
runtime.
CVE-2025-47906 CVE-2025-47907:
* go#74803 go#74466 boo#1247719 security: fix CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of '', '.' and '..' in some PATH configurations
* go#74832 go#74831 boo#1247720 security: fix CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan
* go#74415 runtime: use-after-free of allpSnapshot in findRunnable
* go#74693 runtime: segfaults in runtime.(*unwinder).next
* go#74721 cmd/go: TestScript/build_trimpath_cgo fails to decode dwarf on release-branch.go1.23
* go#74726 cmd/cgo/internal/testsanitizers: failures with signal: segmentation fault or exit status 66
go1.23.11 (released 2025-07-08) includes security fixes to the go
command, as well as bug fixes to the compiler, the linker, and
the runtime.
CVE-2025-4674:
* go#74382 go#74380 boo#1246118 security: fix CVE-2025-4674 cmd/go: disable support for multiple vcs in one module
* go#73907 runtime: bad frame pointer during panic during duffcopy
* go#74289 runtime: heap mspan limit is set too late, causing data race between span allocation and conservative scanning
* go#74293 internal/trace: stress tests triggering suspected deadlock in tracer
* go#74362 runtime/pprof: crash 'cannot read stack of running goroutine' in goroutine profile
* go#74402 cmd/link: duplicated definition of symbol github.com/ebitengine/purego.syscall15XABI0 when running with ASAN
go1.23.10 (released 2025-06-05) includes security fixes to the
net/http and os packages, as well as bug fixes to the linker. (boo#1229122 go1.23 release tracking)
CVE-2025-0913 CVE-2025-4673:
* go#73719 go#73612 boo#1244157 security: fix CVE-2025-0913 os: inconsistent handling of O_CREATE|O_EXCL on Unix and Windows
* go#73905 go#73816 boo#1244156 security: fix CVE-2025-4673 net/http: sensitive headers not cleared on cross-origin redirect
* go#73677 runtime/debug: BuildSetting does not document DefaultGODEBUG
* go#73831 cmd/link: Go 1.24.3 and 1.23.9 regression - duplicated definition of symbol dlopen
go1.23.9 (released 2025-05-06) includes fixes to the runtime and
the linker. (boo#1229122 go1.23 release tracking)
* go#73091 cmd/link: linkname directive on userspace variable can override runtime variable
* go#73380 runtime, x/sys/unix: Connectx is broken on darwin/amd64
go1.23.8 (released 2025-04-01) includes security fixes to the
net/http package, as well as bug fixes to the runtime and the go
command.
CVE-2025-22871:
* go#72010 go#71988 boo#1240550 security: fix CVE-2025-22871 net/http: reject bare LF in chunked encoding
* go#72114 runtime: process hangs for mips hardware
* go#72871 runtime: cgo callback on extra M treated as external code after nested cgo callback returns
* go#72937 internal/godebugs: winsymlink and winreadlinkvolume have incorrect defaults for Go 1.22
go1.23.7 (released 2025-03-04) includes security fixes to the
net/http package, as well as bug fixes to cgo, the compiler, and
the reflect, runtime, and syscall packages.
CVE-2025-22870:
* go#71985 go#71984 boo#1238572 security: fix CVE-2025-22870 net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs
* go#71727 runtime: usleep computes wrong tv_nsec on s390x
* go#71839 runtime: recover added in range-over-func loop body doesn't stop panic propagation / segfaults printing error
* go#71848 os: spurious SIGCHILD on running child process
* go#71875 reflect: Value.Seq panicking on functional iterator methods
* go#71915 reflect: Value.Seq iteration value types not matching the type of given int types
* go#71962 runtime/cgo: does not build with -Wdeclaration-after-statement
go1.23.6 (released 2025-02-04) includes security fixes to the
crypto/elliptic package, as well as bug fixes to the compiler and
the go command.
CVE-2025-22866
* go#71423 go#71383 boo#1236801 security: fix CVE-2025-22866 crypto/internal/fips140/nistec: p256NegCond is variable time on ppc64le
* go#71263 cmd/go/internal/modfetch/codehost: test fails with git 2.47.1
* go#71230 cmd/compile: broken write barrier
go1.23.5 (released 2025-01-16) includes security fixes to the
crypto/x509 and net/http packages, as well as bug fixes to the
compiler, the runtime, and the net package.
CVE-2024-45341 CVE-2024-45336:
* go#71208 go#71156 boo#1236045 security: fix CVE-2024-45341 crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints
* go#71211 go#70530 boo#1236046 security: fix CVE-2024-45336 net/http: sensitive headers incorrectly sent after cross-domain redirect
* go#69988 runtime: severe performance drop for cgo calls in go1.22.5
* go#70517 cmd/compile/internal/importer: flip enable alias to true
* go#70789 os: io.Copy(net.Conn, os.Stdin) on MacOS terminate immediately without waiting for input
* go#71104 crypto/tls: TestVerifyConnection/TLSv12 failures
* go#71147 internal/trace: TestTraceCPUProfile/Stress failures
go1.23.4 (released 2024-12-03) includes fixes to the compiler,
the runtime, the trace command, and the syscall package.
* go#70644 crypto/rsa: new key generation prohibitively slow under race detector
* go#70645 proposal: go/types: add Scope.Node convenience getter
* go#70646 x/tools/gopls: unimported completion corrupts import decl (client=BBEdit)
* go#70648 crypto/tls: TestHandshakeClientECDHEECDSAAESGCM/TLSv12 failures
* go#70649 x/benchmarks/sweet/cmd/sweet: TestSweetEndToEnd failures
* go#70650 crypto/tls: TestGetClientCertificate/TLSv13 failures
* go#70651 x/tools/go/gcexportdata: simplify implementation assuming go >= 1.21
* go#70654 cmd/go: Incorrect output from go list
* go#70655 x/build/cmd/relui: add workflows for some remaining manual recurring Go major release cycle tasks
* go#70657 proposal: bufio: Scanner.IterText/Scanner.IterBytes
* go#70658 x/net/http2: stuck extended CONNECT requests
* go#70659 os: TestRootDirFS failures on linux-mips64 and linux-mips64le arch-mips
* go#70660 crypto/ecdsa: TestRFC6979 failures on s390x
* go#70664 x/mobile: target maccatalyst cannot find OpenGLES header
* go#70665 x/tools/gopls: refactor.extract.variable fails at package level
* go#70666 x/tools/gopls: panic in GetIfaceStubInfo
* go#70667 proposal: crypto/x509: support extracting X25519 public keys from certificates
* go#70668 proposal: x/mobile: better support for unrecovered panics
* go#70669 cmd/go: local failure in TestScript/build_trimpath_cgo
* go#70670 cmd/link: unused functions aren't getting deadcoded from the binary
* go#70674 x/pkgsite: package removal request for https://pkg.go.dev/github.com/uisdevsquad/go-test/debugmate
* go#70675 cmd/go/internal/lockedfile: mountrpc flake in TestTransform on plan9
* go#70677 all: remote file server I/O flakiness with 'Bad fid' errors on plan9
* go#70678 internal/poll: deadlock on 'Intel(R) Xeon(R) Platinum' when an FD is closed
* go#70679 mime/multipart: With go 1.23.3, mime/multipart does not link
Update to version 1.23.2.3 cut from the go1.23-fips-release
branch at the revision tagged go1.23.2-3-openssl-fips. ( jsc#SLE-18320)
* Add negative tests for openssl (#243)
go1.23.3 (released 2024-11-06) includes fixes to the linker, the runtime, and the net/http, os, and syscall packages.
* go#69258 runtime: corrupted GoroutineProfile stack traces
* go#69259 runtime: multi-arch build via qemu fails to exec go binary
* go#69640 os: os.checkPidfd() crashes with SIGSYS
* go#69746 runtime: TestGdbAutotmpTypes failures
* go#69848 cmd/compile: syscall.Syscall15: nosplit stack over 792 byte limit
* go#69865 runtime: MutexProfile missing root frames in go1.23
* go#69882 time,runtime: too many concurrent timer firings for short time.Ticker
* go#69978 time,runtime: too many concurrent timer firings for short, fast-resetting time.Timer
* go#69992 cmd/link: LC_UUID not generated by go linker, resulting in failure to access local network on macOS 15
* go#70001 net/http/pprof: coroutines + pprof makes the program panic
* go#70020 net/http: short writes with FileServer on macos
Patchnames
SUSE-2025-3159,SUSE-SLE-Module-Development-Tools-15-SP6-2025-3159,SUSE-SLE-Module-Development-Tools-15-SP7-2025-3159,openSUSE-SLE-15.6-2025-3159
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.23-openssl", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for go1.23-openssl fixes the following issues:\n\nUpdate to version 1.23.12 cut from the go1.23-fips-release branch at\nthe revision tagged go1.23.12-1-openssl-fips. ( jsc#SLE-18320)\n\n * Rebase to 1.23.12\n * Fix HKDF-Extract The latest OpenSSL in c9s/c10s requires nil\n salt to be passed as a hash length buffer of zeros.\n\nPackaging improvements:\n\n * Update go_bootstrap_version to go1.21 from go1.20 to shorten\n the bootstrap chain. go1.21 can optionally be bootstrapped with\n gccgo and serve as the inital version of go1.x.\n * Refs boo#1247816 bootstrap go1.21 with gccgo\n\ngo1.23.12 (released 2025-08-06) includes security fixes to the\ndatabase/sql and os/exec packages, as well as bug fixes to the\nruntime.\n\nCVE-2025-47906 CVE-2025-47907:\n * go#74803 go#74466 boo#1247719 security: fix CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations\n * go#74832 go#74831 boo#1247720 security: fix CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan\n\n * go#74415 runtime: use-after-free of allpSnapshot in findRunnable\n * go#74693 runtime: segfaults in runtime.(*unwinder).next\n * go#74721 cmd/go: TestScript/build_trimpath_cgo fails to decode dwarf on release-branch.go1.23\n * go#74726 cmd/cgo/internal/testsanitizers: failures with signal: segmentation fault or exit status 66\n\ngo1.23.11 (released 2025-07-08) includes security fixes to the go\ncommand, as well as bug fixes to the compiler, the linker, and\nthe runtime.\n\nCVE-2025-4674:\n * go#74382 go#74380 boo#1246118 security: fix CVE-2025-4674 cmd/go: disable support for multiple vcs in one module\n\n * go#73907 runtime: bad frame pointer during panic during duffcopy\n * go#74289 runtime: heap mspan limit is set too late, causing data race between span allocation and conservative scanning\n * go#74293 internal/trace: stress tests triggering suspected deadlock in tracer\n * go#74362 runtime/pprof: crash \u0027cannot read stack of running goroutine\u0027 in goroutine profile\n * go#74402 cmd/link: duplicated definition of symbol github.com/ebitengine/purego.syscall15XABI0 when running with ASAN\n\ngo1.23.10 (released 2025-06-05) includes security fixes to the\nnet/http and os packages, as well as bug fixes to the linker. (boo#1229122 go1.23 release tracking)\n\nCVE-2025-0913 CVE-2025-4673:\n * go#73719 go#73612 boo#1244157 security: fix CVE-2025-0913 os: inconsistent handling of O_CREATE|O_EXCL on Unix and Windows\n * go#73905 go#73816 boo#1244156 security: fix CVE-2025-4673 net/http: sensitive headers not cleared on cross-origin redirect\n\n * go#73677 runtime/debug: BuildSetting does not document DefaultGODEBUG\n * go#73831 cmd/link: Go 1.24.3 and 1.23.9 regression - duplicated definition of symbol dlopen\n\ngo1.23.9 (released 2025-05-06) includes fixes to the runtime and\nthe linker. (boo#1229122 go1.23 release tracking)\n\n * go#73091 cmd/link: linkname directive on userspace variable can override runtime variable\n * go#73380 runtime, x/sys/unix: Connectx is broken on darwin/amd64\n\ngo1.23.8 (released 2025-04-01) includes security fixes to the\nnet/http package, as well as bug fixes to the runtime and the go\ncommand.\n\n CVE-2025-22871:\n * go#72010 go#71988 boo#1240550 security: fix CVE-2025-22871 net/http: reject bare LF in chunked encoding\n\n * go#72114 runtime: process hangs for mips hardware\n * go#72871 runtime: cgo callback on extra M treated as external code after nested cgo callback returns\n * go#72937 internal/godebugs: winsymlink and winreadlinkvolume have incorrect defaults for Go 1.22\n\ngo1.23.7 (released 2025-03-04) includes security fixes to the\nnet/http package, as well as bug fixes to cgo, the compiler, and\nthe reflect, runtime, and syscall packages.\n\n CVE-2025-22870:\n * go#71985 go#71984 boo#1238572 security: fix CVE-2025-22870 net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs\n\n * go#71727 runtime: usleep computes wrong tv_nsec on s390x\n * go#71839 runtime: recover added in range-over-func loop body doesn\u0027t stop panic propagation / segfaults printing error\n * go#71848 os: spurious SIGCHILD on running child process\n * go#71875 reflect: Value.Seq panicking on functional iterator methods\n * go#71915 reflect: Value.Seq iteration value types not matching the type of given int types\n * go#71962 runtime/cgo: does not build with -Wdeclaration-after-statement\n\ngo1.23.6 (released 2025-02-04) includes security fixes to the\ncrypto/elliptic package, as well as bug fixes to the compiler and\nthe go command.\n\n CVE-2025-22866\n * go#71423 go#71383 boo#1236801 security: fix CVE-2025-22866 crypto/internal/fips140/nistec: p256NegCond is variable time on ppc64le\n\n * go#71263 cmd/go/internal/modfetch/codehost: test fails with git 2.47.1\n * go#71230 cmd/compile: broken write barrier\n\ngo1.23.5 (released 2025-01-16) includes security fixes to the\ncrypto/x509 and net/http packages, as well as bug fixes to the\ncompiler, the runtime, and the net package.\n\n CVE-2024-45341 CVE-2024-45336:\n * go#71208 go#71156 boo#1236045 security: fix CVE-2024-45341 crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints\n * go#71211 go#70530 boo#1236046 security: fix CVE-2024-45336 net/http: sensitive headers incorrectly sent after cross-domain redirect\n\n * go#69988 runtime: severe performance drop for cgo calls in go1.22.5\n * go#70517 cmd/compile/internal/importer: flip enable alias to true\n * go#70789 os: io.Copy(net.Conn, os.Stdin) on MacOS terminate immediately without waiting for input\n * go#71104 crypto/tls: TestVerifyConnection/TLSv12 failures\n * go#71147 internal/trace: TestTraceCPUProfile/Stress failures\n\ngo1.23.4 (released 2024-12-03) includes fixes to the compiler,\nthe runtime, the trace command, and the syscall package.\n\n * go#70644 crypto/rsa: new key generation prohibitively slow under race detector\n * go#70645 proposal: go/types: add Scope.Node convenience getter\n * go#70646 x/tools/gopls: unimported completion corrupts import decl (client=BBEdit)\n * go#70648 crypto/tls: TestHandshakeClientECDHEECDSAAESGCM/TLSv12 failures\n * go#70649 x/benchmarks/sweet/cmd/sweet: TestSweetEndToEnd failures\n * go#70650 crypto/tls: TestGetClientCertificate/TLSv13 failures\n * go#70651 x/tools/go/gcexportdata: simplify implementation assuming go \u003e= 1.21\n * go#70654 cmd/go: Incorrect output from go list\n * go#70655 x/build/cmd/relui: add workflows for some remaining manual recurring Go major release cycle tasks\n * go#70657 proposal: bufio: Scanner.IterText/Scanner.IterBytes\n * go#70658 x/net/http2: stuck extended CONNECT requests\n * go#70659 os: TestRootDirFS failures on linux-mips64 and linux-mips64le arch-mips\n * go#70660 crypto/ecdsa: TestRFC6979 failures on s390x\n * go#70664 x/mobile: target maccatalyst cannot find OpenGLES header\n * go#70665 x/tools/gopls: refactor.extract.variable fails at package level\n * go#70666 x/tools/gopls: panic in GetIfaceStubInfo\n * go#70667 proposal: crypto/x509: support extracting X25519 public keys from certificates\n * go#70668 proposal: x/mobile: better support for unrecovered panics\n * go#70669 cmd/go: local failure in TestScript/build_trimpath_cgo\n * go#70670 cmd/link: unused functions aren\u0027t getting deadcoded from the binary\n * go#70674 x/pkgsite: package removal request for https://pkg.go.dev/github.com/uisdevsquad/go-test/debugmate\n * go#70675 cmd/go/internal/lockedfile: mountrpc flake in TestTransform on plan9\n * go#70677 all: remote file server I/O flakiness with \u0027Bad fid\u0027 errors on plan9\n * go#70678 internal/poll: deadlock on \u0027Intel(R) Xeon(R) Platinum\u0027 when an FD is closed\n * go#70679 mime/multipart: With go 1.23.3, mime/multipart does not link\n\nUpdate to version 1.23.2.3 cut from the go1.23-fips-release\nbranch at the revision tagged go1.23.2-3-openssl-fips. ( jsc#SLE-18320)\n\n* Add negative tests for openssl (#243)\n\ngo1.23.3 (released 2024-11-06) includes fixes to the linker, the runtime, and the net/http, os, and syscall packages.\n\n * go#69258 runtime: corrupted GoroutineProfile stack traces\n * go#69259 runtime: multi-arch build via qemu fails to exec go binary\n * go#69640 os: os.checkPidfd() crashes with SIGSYS\n * go#69746 runtime: TestGdbAutotmpTypes failures\n * go#69848 cmd/compile: syscall.Syscall15: nosplit stack over 792 byte limit\n * go#69865 runtime: MutexProfile missing root frames in go1.23\n * go#69882 time,runtime: too many concurrent timer firings for short time.Ticker\n * go#69978 time,runtime: too many concurrent timer firings for short, fast-resetting time.Timer\n * go#69992 cmd/link: LC_UUID not generated by go linker, resulting in failure to access local network on macOS 15\n * go#70001 net/http/pprof: coroutines + pprof makes the program panic\n * go#70020 net/http: short writes with FileServer on macos\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-3159,SUSE-SLE-Module-Development-Tools-15-SP6-2025-3159,SUSE-SLE-Module-Development-Tools-15-SP7-2025-3159,openSUSE-SLE-15.6-2025-3159", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_03159-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:03159-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503159-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:03159-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-September/041646.html" }, { "category": "self", "summary": "SUSE Bug 1229122", "url": "https://bugzilla.suse.com/1229122" }, { "category": "self", "summary": "SUSE Bug 1236045", "url": "https://bugzilla.suse.com/1236045" }, { "category": "self", "summary": "SUSE Bug 1236046", "url": "https://bugzilla.suse.com/1236046" }, { "category": "self", "summary": "SUSE Bug 1236801", "url": "https://bugzilla.suse.com/1236801" }, { "category": "self", "summary": "SUSE Bug 1238572", "url": "https://bugzilla.suse.com/1238572" }, { "category": "self", "summary": "SUSE Bug 1240550", "url": "https://bugzilla.suse.com/1240550" }, { "category": "self", "summary": "SUSE Bug 1244156", "url": "https://bugzilla.suse.com/1244156" }, { "category": "self", "summary": "SUSE Bug 1244157", "url": "https://bugzilla.suse.com/1244157" }, { "category": "self", "summary": "SUSE Bug 1246118", "url": "https://bugzilla.suse.com/1246118" }, { "category": "self", "summary": "SUSE Bug 1247719", "url": "https://bugzilla.suse.com/1247719" }, { "category": "self", "summary": "SUSE Bug 1247720", "url": "https://bugzilla.suse.com/1247720" }, { "category": "self", "summary": "SUSE Bug 1247816", "url": "https://bugzilla.suse.com/1247816" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45336 page", "url": "https://www.suse.com/security/cve/CVE-2024-45336/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45341 page", "url": "https://www.suse.com/security/cve/CVE-2024-45341/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-0913 page", "url": "https://www.suse.com/security/cve/CVE-2025-0913/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22866 page", "url": "https://www.suse.com/security/cve/CVE-2025-22866/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22870 page", "url": "https://www.suse.com/security/cve/CVE-2025-22870/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22871 page", "url": "https://www.suse.com/security/cve/CVE-2025-22871/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4673 page", "url": "https://www.suse.com/security/cve/CVE-2025-4673/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47906 page", "url": "https://www.suse.com/security/cve/CVE-2025-47906/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47907 page", "url": "https://www.suse.com/security/cve/CVE-2025-47907/" } ], "title": "Security update for go1.23-openssl", "tracking": { "current_release_date": "2025-09-11T03:05:02Z", "generator": { "date": "2025-09-11T03:05:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:03159-1", "initial_release_date": "2025-09-11T03:05:02Z", "revision_history": [ { "date": "2025-09-11T03:05:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "product": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "product_id": "go1.23-openssl-1.23.12-150600.13.9.1.aarch64" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "product": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "product_id": "go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "product": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "product_id": "go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150600.13.9.1.i586", "product": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.i586", "product_id": "go1.23-openssl-1.23.12-150600.13.9.1.i586" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.i586", "product": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.i586", "product_id": "go1.23-openssl-doc-1.23.12-150600.13.9.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "product": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "product_id": "go1.23-openssl-1.23.12-150600.13.9.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "product": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "product_id": "go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "product": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "product_id": "go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150600.13.9.1.s390x", "product": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.s390x", "product_id": "go1.23-openssl-1.23.12-150600.13.9.1.s390x" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "product": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "product_id": "go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "product": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "product_id": "go1.23-openssl-race-1.23.12-150600.13.9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "product": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "product_id": "go1.23-openssl-1.23.12-150600.13.9.1.x86_64" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "product": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "product_id": "go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "product": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "product_id": "go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x" }, "product_reference": "go1.23-openssl-1.23.12-150600.13.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x" }, "product_reference": "go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x" }, "product_reference": "go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x" }, "product_reference": "go1.23-openssl-1.23.12-150600.13.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x" }, "product_reference": "go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x" }, "product_reference": "go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x" }, "product_reference": "go1.23-openssl-1.23.12-150600.13.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x" }, "product_reference": "go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x" }, "product_reference": "go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45336" } ], "notes": [ { "category": "general", "text": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45336", "url": "https://www.suse.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236045" }, { "category": "external", "summary": "SUSE Bug 1236046 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:05:02Z", "details": "moderate" } ], "title": "CVE-2024-45336" }, { "cve": "CVE-2024-45341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45341" } ], "notes": [ { "category": "general", "text": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45341", "url": "https://www.suse.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45341", "url": "https://bugzilla.suse.com/1236045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:05:02Z", "details": "moderate" } ], "title": "CVE-2024-45341" }, { "cve": "CVE-2025-0913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-0913" } ], "notes": [ { "category": "general", "text": "os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. On Windows, when the target path was a symlink to a nonexistent location, OpenFile would create a file in that location. OpenFile now always returns an error when the O_CREATE and O_EXCL flags are both set and the target path is a symlink.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-0913", "url": "https://www.suse.com/security/cve/CVE-2025-0913" }, { "category": "external", "summary": "SUSE Bug 1244157 for CVE-2025-0913", "url": "https://bugzilla.suse.com/1244157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:05:02Z", "details": "moderate" } ], "title": "CVE-2025-0913" }, { "cve": "CVE-2025-22866", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22866" } ], "notes": [ { "category": "general", "text": "Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22866", "url": "https://www.suse.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "SUSE Bug 1236801 for CVE-2025-22866", "url": "https://bugzilla.suse.com/1236801" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:05:02Z", "details": "moderate" } ], "title": "CVE-2025-22866" }, { "cve": "CVE-2025-22870", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22870" } ], "notes": [ { "category": "general", "text": "Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to \"*.example.com\", a request to \"[::1%25.example.com]:80` will incorrectly match and not be proxied.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22870", "url": "https://www.suse.com/security/cve/CVE-2025-22870" }, { "category": "external", "summary": "SUSE Bug 1238572 for CVE-2025-22870", "url": "https://bugzilla.suse.com/1238572" }, { "category": "external", "summary": "SUSE Bug 1238611 for CVE-2025-22870", "url": "https://bugzilla.suse.com/1238611" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:05:02Z", "details": "moderate" } ], "title": "CVE-2025-22870" }, { "cve": "CVE-2025-22871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22871" } ], "notes": [ { "category": "general", "text": "The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. This can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22871", "url": "https://www.suse.com/security/cve/CVE-2025-22871" }, { "category": "external", "summary": "SUSE Bug 1240550 for CVE-2025-22871", "url": "https://bugzilla.suse.com/1240550" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:05:02Z", "details": "moderate" } ], "title": "CVE-2025-22871" }, { "cve": "CVE-2025-4673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4673" } ], "notes": [ { "category": "general", "text": "Proxy-Authorization and Proxy-Authenticate headers persisted on cross-origin redirects potentially leaking sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4673", "url": "https://www.suse.com/security/cve/CVE-2025-4673" }, { "category": "external", "summary": "SUSE Bug 1244156 for CVE-2025-4673", "url": "https://bugzilla.suse.com/1244156" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:05:02Z", "details": "moderate" } ], "title": "CVE-2025-4673" }, { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:05:02Z", "details": "important" } ], "title": "CVE-2025-4674" }, { "cve": "CVE-2025-47906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47906" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47906", "url": "https://www.suse.com/security/cve/CVE-2025-47906" }, { "category": "external", "summary": "SUSE Bug 1247719 for CVE-2025-47906", "url": "https://bugzilla.suse.com/1247719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:05:02Z", "details": "moderate" } ], "title": "CVE-2025-47906" }, { "cve": "CVE-2025-47907", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47907" } ], "notes": [ { "category": "general", "text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47907", "url": "https://www.suse.com/security/cve/CVE-2025-47907" }, { "category": "external", "summary": "SUSE Bug 1247720 for CVE-2025-47907", "url": "https://bugzilla.suse.com/1247720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-doc-1.23.12-150600.13.9.1.x86_64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.aarch64", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.ppc64le", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.s390x", "openSUSE Leap 15.6:go1.23-openssl-race-1.23.12-150600.13.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-11T03:05:02Z", "details": "moderate" } ], "title": "CVE-2025-47907" } ] }
suse-su-2025:02295-1
Vulnerability from csaf_suse
Published
2025-07-11 15:18
Modified
2025-07-11 15:18
Summary
Security update for go1.24
Notes
Title of the patch
Security update for go1.24
Description of the patch
This update for go1.24 fixes the following issues:
- Update to version go1.24.5
- CVE-2025-4674: Fixed potential command execution in untrusted VCS repositories. (bsc#1246118)
Patchnames
SUSE-2025-2295,SUSE-SLE-Module-Development-Tools-15-SP6-2025-2295,SUSE-SLE-Module-Development-Tools-15-SP7-2025-2295,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2295,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2295,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2295,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2295,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2295,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2295,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2295,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2295,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2295,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2295,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2295,SUSE-Storage-7.1-2025-2295,openSUSE-SLE-15.6-2025-2295
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.24", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.24 fixes the following issues:\n\n- Update to version go1.24.5\n- CVE-2025-4674: Fixed potential command execution in untrusted VCS repositories. (bsc#1246118)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2295,SUSE-SLE-Module-Development-Tools-15-SP6-2025-2295,SUSE-SLE-Module-Development-Tools-15-SP7-2025-2295,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2295,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2295,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2295,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2295,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2295,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2295,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2295,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2295,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2295,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2295,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2295,SUSE-Storage-7.1-2025-2295,openSUSE-SLE-15.6-2025-2295", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02295-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02295-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502295-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02295-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040693.html" }, { "category": "self", "summary": "SUSE Bug 1236217", "url": "https://bugzilla.suse.com/1236217" }, { "category": "self", "summary": "SUSE Bug 1246118", "url": "https://bugzilla.suse.com/1246118" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" } ], "title": "Security update for go1.24", "tracking": { "current_release_date": "2025-07-11T15:18:49Z", "generator": { "date": "2025-07-11T15:18:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02295-1", "initial_release_date": "2025-07-11T15:18:49Z", "revision_history": [ { "date": "2025-07-11T15:18:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-150000.1.29.1.aarch64", "product": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64", "product_id": "go1.24-1.24.5-150000.1.29.1.aarch64" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "product": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "product_id": "go1.24-doc-1.24.5-150000.1.29.1.aarch64" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "product": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "product_id": "go1.24-race-1.24.5-150000.1.29.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-150000.1.29.1.i586", "product": { "name": "go1.24-1.24.5-150000.1.29.1.i586", "product_id": "go1.24-1.24.5-150000.1.29.1.i586" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-150000.1.29.1.i586", "product": { "name": "go1.24-doc-1.24.5-150000.1.29.1.i586", "product_id": "go1.24-doc-1.24.5-150000.1.29.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-150000.1.29.1.ppc64le", "product": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le", "product_id": "go1.24-1.24.5-150000.1.29.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "product": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "product_id": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "product": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "product_id": "go1.24-race-1.24.5-150000.1.29.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-150000.1.29.1.s390x", "product": { "name": "go1.24-1.24.5-150000.1.29.1.s390x", "product_id": "go1.24-1.24.5-150000.1.29.1.s390x" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "product": { "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "product_id": "go1.24-doc-1.24.5-150000.1.29.1.s390x" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-150000.1.29.1.s390x", "product": { "name": "go1.24-race-1.24.5-150000.1.29.1.s390x", "product_id": "go1.24-race-1.24.5-150000.1.29.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-150000.1.29.1.x86_64", "product": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64", "product_id": "go1.24-1.24.5-150000.1.29.1.x86_64" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "product": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "product_id": "go1.24-doc-1.24.5-150000.1.29.1.x86_64" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "product": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "product_id": "go1.24-race-1.24.5-150000.1.29.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-11T15:18:49Z", "details": "critical" } ], "title": "CVE-2025-4674" } ] }
rhsa-2025:13941
Vulnerability from csaf_redhat
Published
2025-08-18 00:42
Modified
2025-09-10 15:34
Summary
Red Hat Security Advisory: golang security update
Notes
Topic
An update for golang is now available for Red Hat Enterprise Linux 10.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The golang packages provide the Go programming language compiler.
Security Fix(es):
* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for golang is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:13941", "url": "https://access.redhat.com/errata/RHSA-2025:13941" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13941.json" } ], "title": "Red Hat Security Advisory: golang security update", "tracking": { "current_release_date": "2025-09-10T15:34:19+00:00", "generator": { "date": "2025-09-10T15:34:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:13941", "initial_release_date": "2025-08-18T00:42:23+00:00", "revision_history": [ { "date": "2025-08-18T00:42:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-08-18T00:42:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T15:34:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:10.0" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el10_0.aarch64", "product": { "name": "go-toolset-0:1.24.6-1.el10_0.aarch64", "product_id": "go-toolset-0:1.24.6-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el10_0.aarch64", "product": { "name": "golang-0:1.24.6-1.el10_0.aarch64", "product_id": "golang-0:1.24.6-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el10_0.aarch64", "product": { "name": "golang-bin-0:1.24.6-1.el10_0.aarch64", "product_id": "golang-bin-0:1.24.6-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el10_0.aarch64", "product": { "name": "golang-race-0:1.24.6-1.el10_0.aarch64", "product_id": "golang-race-0:1.24.6-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el10_0?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el10_0.ppc64le", "product": { "name": "go-toolset-0:1.24.6-1.el10_0.ppc64le", "product_id": "go-toolset-0:1.24.6-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el10_0.ppc64le", "product": { "name": "golang-0:1.24.6-1.el10_0.ppc64le", "product_id": "golang-0:1.24.6-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el10_0.ppc64le", "product": { "name": "golang-bin-0:1.24.6-1.el10_0.ppc64le", "product_id": "golang-bin-0:1.24.6-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el10_0.ppc64le", "product": { "name": "golang-race-0:1.24.6-1.el10_0.ppc64le", "product_id": "golang-race-0:1.24.6-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el10_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el10_0.x86_64", "product": { "name": "go-toolset-0:1.24.6-1.el10_0.x86_64", "product_id": "go-toolset-0:1.24.6-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el10_0.x86_64", "product": { "name": "golang-0:1.24.6-1.el10_0.x86_64", "product_id": "golang-0:1.24.6-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el10_0.x86_64", "product": { "name": "golang-bin-0:1.24.6-1.el10_0.x86_64", "product_id": "golang-bin-0:1.24.6-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el10_0.x86_64", "product": { "name": "golang-race-0:1.24.6-1.el10_0.x86_64", "product_id": "golang-race-0:1.24.6-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el10_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el10_0.s390x", "product": { "name": "go-toolset-0:1.24.6-1.el10_0.s390x", "product_id": "go-toolset-0:1.24.6-1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el10_0.s390x", "product": { "name": "golang-0:1.24.6-1.el10_0.s390x", "product_id": "golang-0:1.24.6-1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el10_0.s390x", "product": { "name": "golang-bin-0:1.24.6-1.el10_0.s390x", "product_id": "golang-bin-0:1.24.6-1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el10_0.s390x", "product": { "name": "golang-race-0:1.24.6-1.el10_0.s390x", "product_id": "golang-race-0:1.24.6-1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el10_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.24.6-1.el10_0.src", "product": { "name": "golang-0:1.24.6-1.el10_0.src", "product_id": "golang-0:1.24.6-1.el10_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el10_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-docs-0:1.24.6-1.el10_0.noarch", "product": { "name": "golang-docs-0:1.24.6-1.el10_0.noarch", "product_id": "golang-docs-0:1.24.6-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.24.6-1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.24.6-1.el10_0.noarch", "product": { "name": "golang-misc-0:1.24.6-1.el10_0.noarch", "product_id": "golang-misc-0:1.24.6-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.24.6-1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.24.6-1.el10_0.noarch", "product": { "name": "golang-src-0:1.24.6-1.el10_0.noarch", "product_id": "golang-src-0:1.24.6-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.24.6-1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.24.6-1.el10_0.noarch", "product": { "name": "golang-tests-0:1.24.6-1.el10_0.noarch", "product_id": "golang-tests-0:1.24.6-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.24.6-1.el10_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.aarch64" }, "product_reference": "go-toolset-0:1.24.6-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.ppc64le" }, "product_reference": "go-toolset-0:1.24.6-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.s390x" }, "product_reference": "go-toolset-0:1.24.6-1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.x86_64" }, "product_reference": "go-toolset-0:1.24.6-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.aarch64" }, "product_reference": "golang-0:1.24.6-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.ppc64le" }, "product_reference": "golang-0:1.24.6-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.s390x" }, "product_reference": "golang-0:1.24.6-1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el10_0.src as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.src" }, "product_reference": "golang-0:1.24.6-1.el10_0.src", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.x86_64" }, "product_reference": "golang-0:1.24.6-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.aarch64" }, "product_reference": "golang-bin-0:1.24.6-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.ppc64le" }, "product_reference": "golang-bin-0:1.24.6-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.s390x" }, "product_reference": "golang-bin-0:1.24.6-1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.x86_64" }, "product_reference": "golang-bin-0:1.24.6-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.24.6-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-docs-0:1.24.6-1.el10_0.noarch" }, "product_reference": "golang-docs-0:1.24.6-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.24.6-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-misc-0:1.24.6-1.el10_0.noarch" }, "product_reference": "golang-misc-0:1.24.6-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.aarch64" }, "product_reference": "golang-race-0:1.24.6-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.ppc64le" }, "product_reference": "golang-race-0:1.24.6-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.s390x" }, "product_reference": "golang-race-0:1.24.6-1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.x86_64" }, "product_reference": "golang-race-0:1.24.6-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.24.6-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-src-0:1.24.6-1.el10_0.noarch" }, "product_reference": "golang-src-0:1.24.6-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.24.6-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-tests-0:1.24.6-1.el10_0.noarch" }, "product_reference": "golang-tests-0:1.24.6-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "discovery_date": "2025-07-29T22:00:54.774680+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2384329" } ], "notes": [ { "category": "description", "text": "A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.", "title": "Vulnerability description" }, { "category": "summary", "text": "cmd/go: Go VCS Command Execution Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Important rather than Moderate because it enables arbitrary command execution at the tooling level before any code is built or reviewed, effectively compromising the software supply chain at its earliest stage. Unlike flaws that require user interaction with the code itself, this issue is triggered simply by running go operations on a malicious repository\u2014an action routinely performed by developers and automated build systems. The problem lies in cmd/go\u2019s unsafe interpretation of cross-VCS metadata, allowing an attacker to inject commands that execute with the privileges of the go process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-src-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.24.6-1.el10_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "RHBZ#2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674" }, { "category": "external", "summary": "https://go.dev/cl/686515", "url": "https://go.dev/cl/686515" }, { "category": "external", "summary": "https://go.dev/issue/74380", "url": "https://go.dev/issue/74380" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3828", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "release_date": "2025-07-29T21:19:08.519000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-18T00:42:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-src-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.24.6-1.el10_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:13941" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-src-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.24.6-1.el10_0.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-src-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.24.6-1.el10_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cmd/go: Go VCS Command Execution Vulnerability" } ] }
rhsa-2025:13936
Vulnerability from csaf_redhat
Published
2025-08-18 00:31
Modified
2025-09-10 15:34
Summary
Red Hat Security Advisory: golang security update
Notes
Topic
An update for golang is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The golang packages provide the Go programming language compiler.
Security Fix(es):
* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for golang is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:13936", "url": "https://access.redhat.com/errata/RHSA-2025:13936" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13936.json" } ], "title": "Red Hat Security Advisory: golang security update", "tracking": { "current_release_date": "2025-09-10T15:34:18+00:00", "generator": { "date": "2025-09-10T15:34:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:13936", "initial_release_date": "2025-08-18T00:31:32+00:00", "revision_history": [ { "date": "2025-08-18T00:31:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-08-18T00:31:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T15:34:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.21.13-10.el9_4.aarch64", "product": { "name": "go-toolset-0:1.21.13-10.el9_4.aarch64", "product_id": "go-toolset-0:1.21.13-10.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.21.13-10.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.21.13-10.el9_4.aarch64", "product": { "name": "golang-0:1.21.13-10.el9_4.aarch64", "product_id": "golang-0:1.21.13-10.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.21.13-10.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.21.13-10.el9_4.aarch64", "product": { "name": "golang-bin-0:1.21.13-10.el9_4.aarch64", "product_id": "golang-bin-0:1.21.13-10.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.21.13-10.el9_4?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.21.13-10.el9_4.ppc64le", "product": { "name": "go-toolset-0:1.21.13-10.el9_4.ppc64le", "product_id": "go-toolset-0:1.21.13-10.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.21.13-10.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.21.13-10.el9_4.ppc64le", "product": { "name": "golang-0:1.21.13-10.el9_4.ppc64le", "product_id": "golang-0:1.21.13-10.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.21.13-10.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.21.13-10.el9_4.ppc64le", "product": { "name": "golang-bin-0:1.21.13-10.el9_4.ppc64le", "product_id": "golang-bin-0:1.21.13-10.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.21.13-10.el9_4?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.21.13-10.el9_4.x86_64", "product": { "name": "go-toolset-0:1.21.13-10.el9_4.x86_64", "product_id": "go-toolset-0:1.21.13-10.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.21.13-10.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.21.13-10.el9_4.x86_64", "product": { "name": "golang-0:1.21.13-10.el9_4.x86_64", "product_id": "golang-0:1.21.13-10.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.21.13-10.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.21.13-10.el9_4.x86_64", "product": { "name": "golang-bin-0:1.21.13-10.el9_4.x86_64", "product_id": "golang-bin-0:1.21.13-10.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.21.13-10.el9_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.21.13-10.el9_4.s390x", "product": { "name": "go-toolset-0:1.21.13-10.el9_4.s390x", "product_id": "go-toolset-0:1.21.13-10.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.21.13-10.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.21.13-10.el9_4.s390x", "product": { "name": "golang-0:1.21.13-10.el9_4.s390x", "product_id": "golang-0:1.21.13-10.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.21.13-10.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.21.13-10.el9_4.s390x", "product": { "name": "golang-bin-0:1.21.13-10.el9_4.s390x", "product_id": "golang-bin-0:1.21.13-10.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.21.13-10.el9_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.21.13-10.el9_4.src", "product": { "name": "golang-0:1.21.13-10.el9_4.src", "product_id": "golang-0:1.21.13-10.el9_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.21.13-10.el9_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-docs-0:1.21.13-10.el9_4.noarch", "product": { "name": "golang-docs-0:1.21.13-10.el9_4.noarch", "product_id": "golang-docs-0:1.21.13-10.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.21.13-10.el9_4?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.21.13-10.el9_4.noarch", "product": { "name": "golang-misc-0:1.21.13-10.el9_4.noarch", "product_id": "golang-misc-0:1.21.13-10.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.21.13-10.el9_4?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.21.13-10.el9_4.noarch", "product": { "name": "golang-src-0:1.21.13-10.el9_4.noarch", "product_id": "golang-src-0:1.21.13-10.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.21.13-10.el9_4?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.21.13-10.el9_4.noarch", "product": { "name": "golang-tests-0:1.21.13-10.el9_4.noarch", "product_id": "golang-tests-0:1.21.13-10.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.21.13-10.el9_4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.21.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.aarch64" }, "product_reference": "go-toolset-0:1.21.13-10.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.21.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.ppc64le" }, "product_reference": "go-toolset-0:1.21.13-10.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.21.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.s390x" }, "product_reference": "go-toolset-0:1.21.13-10.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.21.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.x86_64" }, "product_reference": "go-toolset-0:1.21.13-10.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.21.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.aarch64" }, "product_reference": "golang-0:1.21.13-10.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.21.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.ppc64le" }, "product_reference": "golang-0:1.21.13-10.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.21.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.s390x" }, "product_reference": "golang-0:1.21.13-10.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.21.13-10.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.src" }, "product_reference": "golang-0:1.21.13-10.el9_4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.21.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.x86_64" }, "product_reference": "golang-0:1.21.13-10.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.21.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.aarch64" }, "product_reference": "golang-bin-0:1.21.13-10.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.21.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.ppc64le" }, "product_reference": "golang-bin-0:1.21.13-10.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.21.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.s390x" }, "product_reference": "golang-bin-0:1.21.13-10.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.21.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.x86_64" }, "product_reference": "golang-bin-0:1.21.13-10.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.21.13-10.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-10.el9_4.noarch" }, "product_reference": "golang-docs-0:1.21.13-10.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.21.13-10.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-10.el9_4.noarch" }, "product_reference": "golang-misc-0:1.21.13-10.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.21.13-10.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-10.el9_4.noarch" }, "product_reference": "golang-src-0:1.21.13-10.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.21.13-10.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-10.el9_4.noarch" }, "product_reference": "golang-tests-0:1.21.13-10.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "discovery_date": "2025-07-29T22:00:54.774680+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2384329" } ], "notes": [ { "category": "description", "text": "A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.", "title": "Vulnerability description" }, { "category": "summary", "text": "cmd/go: Go VCS Command Execution Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Important rather than Moderate because it enables arbitrary command execution at the tooling level before any code is built or reviewed, effectively compromising the software supply chain at its earliest stage. Unlike flaws that require user interaction with the code itself, this issue is triggered simply by running go operations on a malicious repository\u2014an action routinely performed by developers and automated build systems. The problem lies in cmd/go\u2019s unsafe interpretation of cross-VCS metadata, allowing an attacker to inject commands that execute with the privileges of the go process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.src", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-10.el9_4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "RHBZ#2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674" }, { "category": "external", "summary": "https://go.dev/cl/686515", "url": "https://go.dev/cl/686515" }, { "category": "external", "summary": "https://go.dev/issue/74380", "url": "https://go.dev/issue/74380" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3828", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "release_date": "2025-07-29T21:19:08.519000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-18T00:31:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.src", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-10.el9_4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:13936" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.src", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-10.el9_4.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.src", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-10.el9_4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cmd/go: Go VCS Command Execution Vulnerability" } ] }
rhsa-2025:13940
Vulnerability from csaf_redhat
Published
2025-08-18 00:52
Modified
2025-09-10 15:34
Summary
Red Hat Security Advisory: go-toolset:rhel8 security update
Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:13940", "url": "https://access.redhat.com/errata/RHSA-2025:13940" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13940.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security update", "tracking": { "current_release_date": "2025-09-10T15:34:19+00:00", "generator": { "date": "2025-09-10T15:34:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:13940", "initial_release_date": "2025-08-18T00:52:32+00:00", "revision_history": [ { "date": "2025-08-18T00:52:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-08-18T00:52:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T15:34:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.src.rpm-go-toolset:rhel8", "product": { "name": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.src.rpm (go-toolset:rhel8)", "product_id": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.src.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=src\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8", "product": { "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm (go-toolset:rhel8)", "product_id": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=src\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8", "product": { "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm (go-toolset:rhel8)", "product_id": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=src\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-docs-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "product": { "name": "golang-docs-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm (go-toolset:rhel8)", "product_id": "golang-docs-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "golang-misc-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "product": { "name": "golang-misc-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm (go-toolset:rhel8)", "product_id": "golang-misc-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "golang-src-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "product": { "name": "golang-src-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm (go-toolset:rhel8)", "product_id": "golang-src-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "golang-tests-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "product": { "name": "golang-tests-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm (go-toolset:rhel8)", "product_id": "golang-tests-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "product": { "name": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm (go-toolset:rhel8)", "product_id": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "product": { "name": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm (go-toolset:rhel8)", "product_id": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "product": { "name": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm (go-toolset:rhel8)", "product_id": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "product": { "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm (go-toolset:rhel8)", "product_id": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "product": { "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm (go-toolset:rhel8)", "product_id": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "product": { "name": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm (go-toolset:rhel8)", "product_id": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "product": { "name": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm (go-toolset:rhel8)", "product_id": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "product": { "name": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm (go-toolset:rhel8)", "product_id": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "product": { "name": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm (go-toolset:rhel8)", "product_id": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "product": { "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm (go-toolset:rhel8)", "product_id": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "product": { "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm (go-toolset:rhel8)", "product_id": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "product": { "name": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm (go-toolset:rhel8)", "product_id": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "product": { "name": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm (go-toolset:rhel8)", "product_id": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "product": { "name": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm (go-toolset:rhel8)", "product_id": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "product": { "name": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm (go-toolset:rhel8)", "product_id": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "product": { "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm (go-toolset:rhel8)", "product_id": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "product": { "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm (go-toolset:rhel8)", "product_id": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "product": { "name": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm (go-toolset:rhel8)", "product_id": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "product": { "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm (go-toolset:rhel8)", "product_id": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "product": { "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm (go-toolset:rhel8)", "product_id": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "product": { "name": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm (go-toolset:rhel8)", "product_id": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8" }, "product_reference": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8" }, "product_reference": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.src.rpm-go-toolset:rhel8" }, "product_reference": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.src.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8" }, "product_reference": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8" }, "product_reference": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8" }, "product_reference": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8" }, "product_reference": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8" }, "product_reference": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8" }, "product_reference": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8" }, "product_reference": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8" }, "product_reference": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8" }, "product_reference": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8" }, "product_reference": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8" }, "product_reference": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8" }, "product_reference": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "golang-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8" }, "product_reference": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8" }, "product_reference": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8" }, "product_reference": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-docs-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8" }, "product_reference": "golang-docs-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-misc-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8" }, "product_reference": "golang-misc-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-src-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8" }, "product_reference": "golang-src-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-tests-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8" }, "product_reference": "golang-tests-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "discovery_date": "2025-07-29T22:00:54.774680+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2384329" } ], "notes": [ { "category": "description", "text": "A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.", "title": "Vulnerability description" }, { "category": "summary", "text": "cmd/go: Go VCS Command Execution Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Important rather than Moderate because it enables arbitrary command execution at the tooling level before any code is built or reviewed, effectively compromising the software supply chain at its earliest stage. Unlike flaws that require user interaction with the code itself, this issue is triggered simply by running go operations on a malicious repository\u2014an action routinely performed by developers and automated build systems. The problem lies in cmd/go\u2019s unsafe interpretation of cross-VCS metadata, allowing an attacker to inject commands that execute with the privileges of the go process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.src.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-docs-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-misc-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-src-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-tests-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "RHBZ#2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674" }, { "category": "external", "summary": "https://go.dev/cl/686515", "url": "https://go.dev/cl/686515" }, { "category": "external", "summary": "https://go.dev/issue/74380", "url": "https://go.dev/issue/74380" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3828", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "release_date": "2025-07-29T21:19:08.519000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-18T00:52:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.src.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-docs-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-misc-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-src-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-tests-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:13940" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.src.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-docs-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-misc-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-src-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-tests-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.src.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.src.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.aarch64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.s390x.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7.x86_64.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-docs-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-misc-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-src-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8", "AppStream-8.10.0.Z.MAIN.EUS:golang-tests-1.24.6-1.module+el8.10.0+23407+428597c7.noarch.rpm-go-toolset:rhel8" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cmd/go: Go VCS Command Execution Vulnerability" } ] }
rhsa-2025:13939
Vulnerability from csaf_redhat
Published
2025-08-18 00:24
Modified
2025-09-10 15:34
Summary
Red Hat Security Advisory: golang security update
Notes
Topic
An update for golang is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The golang packages provide the Go programming language compiler.
Security Fix(es):
* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for golang is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:13939", "url": "https://access.redhat.com/errata/RHSA-2025:13939" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13939.json" } ], "title": "Red Hat Security Advisory: golang security update", "tracking": { "current_release_date": "2025-09-10T15:34:19+00:00", "generator": { "date": "2025-09-10T15:34:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:13939", "initial_release_date": "2025-08-18T00:24:18+00:00", "revision_history": [ { "date": "2025-08-18T00:24:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-08-18T00:24:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T15:34:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.19.13-18.el9_2.src", "product": { "name": "golang-0:1.19.13-18.el9_2.src", "product_id": "golang-0:1.19.13-18.el9_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.19.13-18.el9_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.19.13-18.el9_2.aarch64", "product": { "name": "golang-0:1.19.13-18.el9_2.aarch64", "product_id": "golang-0:1.19.13-18.el9_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.19.13-18.el9_2?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.19.13-18.el9_2.aarch64", "product": { "name": "golang-bin-0:1.19.13-18.el9_2.aarch64", "product_id": "golang-bin-0:1.19.13-18.el9_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.19.13-18.el9_2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.19.13-18.el9_2.ppc64le", "product": { "name": "golang-0:1.19.13-18.el9_2.ppc64le", "product_id": "golang-0:1.19.13-18.el9_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.19.13-18.el9_2?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.19.13-18.el9_2.ppc64le", "product": { "name": "golang-bin-0:1.19.13-18.el9_2.ppc64le", "product_id": "golang-bin-0:1.19.13-18.el9_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.19.13-18.el9_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.19.13-18.el9_2.x86_64", "product": { "name": "golang-0:1.19.13-18.el9_2.x86_64", "product_id": "golang-0:1.19.13-18.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.19.13-18.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.19.13-18.el9_2.x86_64", "product": { "name": "golang-bin-0:1.19.13-18.el9_2.x86_64", "product_id": "golang-bin-0:1.19.13-18.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.19.13-18.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.19.13-18.el9_2.x86_64", "product": { "name": "golang-race-0:1.19.13-18.el9_2.x86_64", "product_id": "golang-race-0:1.19.13-18.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.19.13-18.el9_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.19.13-18.el9_2.s390x", "product": { "name": "golang-0:1.19.13-18.el9_2.s390x", "product_id": "golang-0:1.19.13-18.el9_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.19.13-18.el9_2?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.19.13-18.el9_2.s390x", "product": { "name": "golang-bin-0:1.19.13-18.el9_2.s390x", "product_id": "golang-bin-0:1.19.13-18.el9_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.19.13-18.el9_2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-docs-0:1.19.13-18.el9_2.noarch", "product": { "name": "golang-docs-0:1.19.13-18.el9_2.noarch", "product_id": "golang-docs-0:1.19.13-18.el9_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.19.13-18.el9_2?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.19.13-18.el9_2.noarch", "product": { "name": "golang-misc-0:1.19.13-18.el9_2.noarch", "product_id": "golang-misc-0:1.19.13-18.el9_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.19.13-18.el9_2?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.19.13-18.el9_2.noarch", "product": { "name": "golang-src-0:1.19.13-18.el9_2.noarch", "product_id": "golang-src-0:1.19.13-18.el9_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.19.13-18.el9_2?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.19.13-18.el9_2.noarch", "product": { "name": "golang-tests-0:1.19.13-18.el9_2.noarch", "product_id": "golang-tests-0:1.19.13-18.el9_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.19.13-18.el9_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.19.13-18.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.aarch64" }, "product_reference": "golang-0:1.19.13-18.el9_2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.19.13-18.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.ppc64le" }, "product_reference": "golang-0:1.19.13-18.el9_2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.19.13-18.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.s390x" }, "product_reference": "golang-0:1.19.13-18.el9_2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.19.13-18.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.src" }, "product_reference": "golang-0:1.19.13-18.el9_2.src", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.19.13-18.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.x86_64" }, "product_reference": "golang-0:1.19.13-18.el9_2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.19.13-18.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.aarch64" }, "product_reference": "golang-bin-0:1.19.13-18.el9_2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.19.13-18.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.ppc64le" }, "product_reference": "golang-bin-0:1.19.13-18.el9_2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.19.13-18.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.s390x" }, "product_reference": "golang-bin-0:1.19.13-18.el9_2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.19.13-18.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.x86_64" }, "product_reference": "golang-bin-0:1.19.13-18.el9_2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.19.13-18.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-docs-0:1.19.13-18.el9_2.noarch" }, "product_reference": "golang-docs-0:1.19.13-18.el9_2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.19.13-18.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-misc-0:1.19.13-18.el9_2.noarch" }, "product_reference": "golang-misc-0:1.19.13-18.el9_2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.19.13-18.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-race-0:1.19.13-18.el9_2.x86_64" }, "product_reference": "golang-race-0:1.19.13-18.el9_2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.19.13-18.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-src-0:1.19.13-18.el9_2.noarch" }, "product_reference": "golang-src-0:1.19.13-18.el9_2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.19.13-18.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-tests-0:1.19.13-18.el9_2.noarch" }, "product_reference": "golang-tests-0:1.19.13-18.el9_2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "discovery_date": "2025-07-29T22:00:54.774680+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2384329" } ], "notes": [ { "category": "description", "text": "A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.", "title": "Vulnerability description" }, { "category": "summary", "text": "cmd/go: Go VCS Command Execution Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Important rather than Moderate because it enables arbitrary command execution at the tooling level before any code is built or reviewed, effectively compromising the software supply chain at its earliest stage. Unlike flaws that require user interaction with the code itself, this issue is triggered simply by running go operations on a malicious repository\u2014an action routinely performed by developers and automated build systems. The problem lies in cmd/go\u2019s unsafe interpretation of cross-VCS metadata, allowing an attacker to inject commands that execute with the privileges of the go process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.src", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-docs-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-misc-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-race-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-src-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-tests-0:1.19.13-18.el9_2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "RHBZ#2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674" }, { "category": "external", "summary": "https://go.dev/cl/686515", "url": "https://go.dev/cl/686515" }, { "category": "external", "summary": "https://go.dev/issue/74380", "url": "https://go.dev/issue/74380" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3828", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "release_date": "2025-07-29T21:19:08.519000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-18T00:24:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.src", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-docs-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-misc-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-race-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-src-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-tests-0:1.19.13-18.el9_2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:13939" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.src", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-docs-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-misc-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-race-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-src-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-tests-0:1.19.13-18.el9_2.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.src", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-docs-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-misc-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-race-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-src-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-tests-0:1.19.13-18.el9_2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cmd/go: Go VCS Command Execution Vulnerability" } ] }
rhsa-2025:13935
Vulnerability from csaf_redhat
Published
2025-08-18 00:53
Modified
2025-09-10 15:34
Summary
Red Hat Security Advisory: golang security update
Notes
Topic
An update for golang is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The golang packages provide the Go programming language compiler.
Security Fix(es):
* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for golang is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:13935", "url": "https://access.redhat.com/errata/RHSA-2025:13935" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "external", "summary": "RHEL-108935", "url": "https://issues.redhat.com/browse/RHEL-108935" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13935.json" } ], "title": "Red Hat Security Advisory: golang security update", "tracking": { "current_release_date": "2025-09-10T15:34:18+00:00", "generator": { "date": "2025-09-10T15:34:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:13935", "initial_release_date": "2025-08-18T00:53:52+00:00", "revision_history": [ { "date": "2025-08-18T00:53:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-08-18T00:53:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T15:34:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el9_6.aarch64", "product": { "name": "go-toolset-0:1.24.6-1.el9_6.aarch64", "product_id": "go-toolset-0:1.24.6-1.el9_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el9_6?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el9_6.aarch64", "product": { "name": "golang-0:1.24.6-1.el9_6.aarch64", "product_id": "golang-0:1.24.6-1.el9_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el9_6?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el9_6.aarch64", "product": { "name": "golang-bin-0:1.24.6-1.el9_6.aarch64", "product_id": "golang-bin-0:1.24.6-1.el9_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el9_6?arch=aarch64" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el9_6.aarch64", "product": { "name": "golang-race-0:1.24.6-1.el9_6.aarch64", "product_id": "golang-race-0:1.24.6-1.el9_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el9_6?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el9_6.ppc64le", "product": { "name": "go-toolset-0:1.24.6-1.el9_6.ppc64le", "product_id": "go-toolset-0:1.24.6-1.el9_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el9_6?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el9_6.ppc64le", "product": { "name": "golang-0:1.24.6-1.el9_6.ppc64le", "product_id": "golang-0:1.24.6-1.el9_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el9_6?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el9_6.ppc64le", "product": { "name": "golang-bin-0:1.24.6-1.el9_6.ppc64le", "product_id": "golang-bin-0:1.24.6-1.el9_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el9_6?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el9_6.ppc64le", "product": { "name": "golang-race-0:1.24.6-1.el9_6.ppc64le", "product_id": "golang-race-0:1.24.6-1.el9_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el9_6?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el9_6.x86_64", "product": { "name": "go-toolset-0:1.24.6-1.el9_6.x86_64", "product_id": "go-toolset-0:1.24.6-1.el9_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el9_6?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el9_6.x86_64", "product": { "name": "golang-0:1.24.6-1.el9_6.x86_64", "product_id": "golang-0:1.24.6-1.el9_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el9_6?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el9_6.x86_64", "product": { "name": "golang-bin-0:1.24.6-1.el9_6.x86_64", "product_id": "golang-bin-0:1.24.6-1.el9_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el9_6?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el9_6.x86_64", "product": { "name": "golang-race-0:1.24.6-1.el9_6.x86_64", "product_id": "golang-race-0:1.24.6-1.el9_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el9_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el9_6.s390x", "product": { "name": "go-toolset-0:1.24.6-1.el9_6.s390x", "product_id": "go-toolset-0:1.24.6-1.el9_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el9_6?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el9_6.s390x", "product": { "name": "golang-0:1.24.6-1.el9_6.s390x", "product_id": "golang-0:1.24.6-1.el9_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el9_6?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el9_6.s390x", "product": { "name": "golang-bin-0:1.24.6-1.el9_6.s390x", "product_id": "golang-bin-0:1.24.6-1.el9_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el9_6?arch=s390x" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el9_6.s390x", "product": { "name": "golang-race-0:1.24.6-1.el9_6.s390x", "product_id": "golang-race-0:1.24.6-1.el9_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el9_6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.24.6-1.el9_6.src", "product": { "name": "golang-0:1.24.6-1.el9_6.src", "product_id": "golang-0:1.24.6-1.el9_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el9_6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-docs-0:1.24.6-1.el9_6.noarch", "product": { "name": "golang-docs-0:1.24.6-1.el9_6.noarch", "product_id": "golang-docs-0:1.24.6-1.el9_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.24.6-1.el9_6?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.24.6-1.el9_6.noarch", "product": { "name": "golang-misc-0:1.24.6-1.el9_6.noarch", "product_id": "golang-misc-0:1.24.6-1.el9_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.24.6-1.el9_6?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.24.6-1.el9_6.noarch", "product": { "name": "golang-src-0:1.24.6-1.el9_6.noarch", "product_id": "golang-src-0:1.24.6-1.el9_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.24.6-1.el9_6?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.24.6-1.el9_6.noarch", "product": { "name": "golang-tests-0:1.24.6-1.el9_6.noarch", "product_id": "golang-tests-0:1.24.6-1.el9_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.24.6-1.el9_6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.aarch64" }, "product_reference": "go-toolset-0:1.24.6-1.el9_6.aarch64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.ppc64le" }, "product_reference": "go-toolset-0:1.24.6-1.el9_6.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.s390x" }, "product_reference": "go-toolset-0:1.24.6-1.el9_6.s390x", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.x86_64" }, "product_reference": "go-toolset-0:1.24.6-1.el9_6.x86_64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.aarch64" }, "product_reference": "golang-0:1.24.6-1.el9_6.aarch64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.ppc64le" }, "product_reference": "golang-0:1.24.6-1.el9_6.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.s390x" }, "product_reference": "golang-0:1.24.6-1.el9_6.s390x", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.src" }, "product_reference": "golang-0:1.24.6-1.el9_6.src", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.x86_64" }, "product_reference": "golang-0:1.24.6-1.el9_6.x86_64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.aarch64" }, "product_reference": "golang-bin-0:1.24.6-1.el9_6.aarch64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.ppc64le" }, "product_reference": "golang-bin-0:1.24.6-1.el9_6.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.s390x" }, "product_reference": "golang-bin-0:1.24.6-1.el9_6.s390x", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.x86_64" }, "product_reference": "golang-bin-0:1.24.6-1.el9_6.x86_64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.24.6-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-docs-0:1.24.6-1.el9_6.noarch" }, "product_reference": "golang-docs-0:1.24.6-1.el9_6.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.24.6-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-misc-0:1.24.6-1.el9_6.noarch" }, "product_reference": "golang-misc-0:1.24.6-1.el9_6.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.aarch64" }, "product_reference": "golang-race-0:1.24.6-1.el9_6.aarch64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.ppc64le" }, "product_reference": "golang-race-0:1.24.6-1.el9_6.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.s390x" }, "product_reference": "golang-race-0:1.24.6-1.el9_6.s390x", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.x86_64" }, "product_reference": "golang-race-0:1.24.6-1.el9_6.x86_64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.24.6-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-src-0:1.24.6-1.el9_6.noarch" }, "product_reference": "golang-src-0:1.24.6-1.el9_6.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.24.6-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-tests-0:1.24.6-1.el9_6.noarch" }, "product_reference": "golang-tests-0:1.24.6-1.el9_6.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "discovery_date": "2025-07-29T22:00:54.774680+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2384329" } ], "notes": [ { "category": "description", "text": "A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.", "title": "Vulnerability description" }, { "category": "summary", "text": "cmd/go: Go VCS Command Execution Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Important rather than Moderate because it enables arbitrary command execution at the tooling level before any code is built or reviewed, effectively compromising the software supply chain at its earliest stage. Unlike flaws that require user interaction with the code itself, this issue is triggered simply by running go operations on a malicious repository\u2014an action routinely performed by developers and automated build systems. The problem lies in cmd/go\u2019s unsafe interpretation of cross-VCS metadata, allowing an attacker to inject commands that execute with the privileges of the go process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.src", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-docs-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-misc-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-src-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-tests-0:1.24.6-1.el9_6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "RHBZ#2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674" }, { "category": "external", "summary": "https://go.dev/cl/686515", "url": "https://go.dev/cl/686515" }, { "category": "external", "summary": "https://go.dev/issue/74380", "url": "https://go.dev/issue/74380" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3828", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "release_date": "2025-07-29T21:19:08.519000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-18T00:53:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.src", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-docs-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-misc-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-src-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-tests-0:1.24.6-1.el9_6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:13935" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.src", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-docs-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-misc-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-src-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-tests-0:1.24.6-1.el9_6.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.src", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-docs-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-misc-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-src-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-tests-0:1.24.6-1.el9_6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cmd/go: Go VCS Command Execution Vulnerability" } ] }
rhsa-2025:14093
Vulnerability from csaf_redhat
Published
2025-08-19 13:27
Modified
2025-09-10 15:34
Summary
Red Hat Security Advisory: go-toolset:rhel8 security update
Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:14093", "url": "https://access.redhat.com/errata/RHSA-2025:14093" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14093.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security update", "tracking": { "current_release_date": "2025-09-10T15:34:25+00:00", "generator": { "date": "2025-09-10T15:34:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:14093", "initial_release_date": "2025-08-19T13:27:32+00:00", "revision_history": [ { "date": "2025-08-19T13:27:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-08-19T13:27:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T15:34:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm-go-toolset:rhel8", "product": { "name": "delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm (go-toolset:rhel8)", "product_id": "delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.9.1-1.module%2Bel8.8.0%2B16778%2B5fbb74f5?arch=src\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } }, { "category": "product_version", "name": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm-go-toolset:rhel8", "product": { "name": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm (go-toolset:rhel8)", "product_id": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.19.13-3.module%2Bel8.8.0%2B22903%2B37387f31?arch=src\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } }, { "category": "product_version", "name": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm-go-toolset:rhel8", "product": { "name": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm (go-toolset:rhel8)", "product_id": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.19.13-16.module%2Bel8.8.0%2B23410%2B958e78d9?arch=src\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "product": { "name": "delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm (go-toolset:rhel8)", "product_id": "delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.9.1-1.module%2Bel8.8.0%2B16778%2B5fbb74f5?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } }, { "category": "product_version", "name": "delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "product": { "name": "delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm (go-toolset:rhel8)", "product_id": "delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.9.1-1.module%2Bel8.8.0%2B16778%2B5fbb74f5?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } }, { "category": "product_version", "name": "delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "product": { "name": "delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm (go-toolset:rhel8)", "product_id": "delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.9.1-1.module%2Bel8.8.0%2B16778%2B5fbb74f5?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } }, { "category": "product_version", "name": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm-go-toolset:rhel8", "product": { "name": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm (go-toolset:rhel8)", "product_id": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.19.13-3.module%2Bel8.8.0%2B22903%2B37387f31?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } }, { "category": "product_version", "name": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "product": { "name": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm (go-toolset:rhel8)", "product_id": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.19.13-16.module%2Bel8.8.0%2B23410%2B958e78d9?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } }, { "category": "product_version", "name": "golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "product": { "name": "golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm (go-toolset:rhel8)", "product_id": "golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.19.13-16.module%2Bel8.8.0%2B23410%2B958e78d9?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } }, { "category": "product_version", "name": "golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "product": { "name": "golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm (go-toolset:rhel8)", "product_id": "golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.19.13-16.module%2Bel8.8.0%2B23410%2B958e78d9?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "product": { "name": "golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm (go-toolset:rhel8)", "product_id": "golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.19.13-16.module%2Bel8.8.0%2B23410%2B958e78d9?arch=noarch\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } }, { "category": "product_version", "name": "golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "product": { "name": "golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm (go-toolset:rhel8)", "product_id": "golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.19.13-16.module%2Bel8.8.0%2B23410%2B958e78d9?arch=noarch\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } }, { "category": "product_version", "name": "golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "product": { "name": "golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm (go-toolset:rhel8)", "product_id": "golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.19.13-16.module%2Bel8.8.0%2B23410%2B958e78d9?arch=noarch\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } }, { "category": "product_version", "name": "golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "product": { "name": "golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm (go-toolset:rhel8)", "product_id": "golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.19.13-16.module%2Bel8.8.0%2B23410%2B958e78d9?arch=noarch\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.ppc64le.rpm-go-toolset:rhel8", "product": { "name": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.ppc64le.rpm (go-toolset:rhel8)", "product_id": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.ppc64le.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.19.13-3.module%2Bel8.8.0%2B22903%2B37387f31?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } }, { "category": "product_version", "name": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8", "product": { "name": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm (go-toolset:rhel8)", "product_id": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.19.13-16.module%2Bel8.8.0%2B23410%2B958e78d9?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } }, { "category": "product_version", "name": "golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8", "product": { "name": "golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm (go-toolset:rhel8)", "product_id": "golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.19.13-16.module%2Bel8.8.0%2B23410%2B958e78d9?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8080020250814081429:6b4b45d8" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm-go-toolset:rhel8" }, "product_reference": "delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.ppc64le.rpm-go-toolset:rhel8" }, "product_reference": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.ppc64le.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm-go-toolset:rhel8" }, "product_reference": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8" }, "product_reference": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm-go-toolset:rhel8" }, "product_reference": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8" }, "product_reference": "golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8" }, "product_reference": "golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8" }, "product_reference": "golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8" }, "product_reference": "golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8" }, "product_reference": "golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm-go-toolset:rhel8" }, "product_reference": "delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm-go-toolset:rhel8" }, "product_reference": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm-go-toolset:rhel8" }, "product_reference": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8" }, "product_reference": "golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8" }, "product_reference": "golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8" }, "product_reference": "golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8" }, "product_reference": "golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8" }, "product_reference": "golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "discovery_date": "2025-07-29T22:00:54.774680+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2384329" } ], "notes": [ { "category": "description", "text": "A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.", "title": "Vulnerability description" }, { "category": "summary", "text": "cmd/go: Go VCS Command Execution Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Important rather than Moderate because it enables arbitrary command execution at the tooling level before any code is built or reviewed, effectively compromising the software supply chain at its earliest stage. Unlike flaws that require user interaction with the code itself, this issue is triggered simply by running go operations on a malicious repository\u2014an action routinely performed by developers and automated build systems. The problem lies in cmd/go\u2019s unsafe interpretation of cross-VCS metadata, allowing an attacker to inject commands that execute with the privileges of the go process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.E4S:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "RHBZ#2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674" }, { "category": "external", "summary": "https://go.dev/cl/686515", "url": "https://go.dev/cl/686515" }, { "category": "external", "summary": "https://go.dev/issue/74380", "url": "https://go.dev/issue/74380" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3828", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "release_date": "2025-07-29T21:19:08.519000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-19T13:27:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.E4S:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:14093" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.E4S:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.E4S:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.ppc64le.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.E4S:golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-debuginfo-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:delve-debugsource-1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:go-toolset-1.19.13-3.module+el8.8.0+22903+37387f31.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.src.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-bin-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-docs-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-misc-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-race-1.19.13-16.module+el8.8.0+23410+958e78d9.x86_64.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-src-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8", "AppStream-8.8.0.Z.TUS:golang-tests-1.19.13-16.module+el8.8.0+23410+958e78d9.noarch.rpm-go-toolset:rhel8" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cmd/go: Go VCS Command Execution Vulnerability" } ] }
fkie_cve-2025-4674
Vulnerability from fkie_nvd
Published
2025-07-29 22:15
Modified
2025-08-06 16:15
Severity ?
Summary
The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via "go get", are not affected.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected." }, { "lang": "es", "value": "El comando \"go\" puede ejecutar comandos inesperados al operar en repositorios VCS no confiables. Esto ocurre cuando existe una configuraci\u00f3n de VCS potencialmente peligrosa en los repositorios. Esto puede ocurrir cuando un repositorio se obtuvo mediante un VCS (p. ej., Git), pero contiene metadatos para otro VCS (p. ej., Mercurial). Los m\u00f3dulos obtenidos mediante la l\u00ednea de comandos \"go get\" no se ven afectados." } ], "id": "CVE-2025-4674", "lastModified": "2025-08-06T16:15:30.087", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 6.0, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-07-29T22:15:25.380", "references": [ { "source": "security@golang.org", "url": "https://go.dev/cl/686515" }, { "source": "security@golang.org", "url": "https://go.dev/issue/74380" }, { "source": "security@golang.org", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "source": "security@golang.org", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "sourceIdentifier": "security@golang.org", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-73" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…